A Reliable Group Key Management Framework Using Fuzzy Logic for MANETs

Spontaneous group communication can be attained by deploying Mobile Ad Hoc Networks (or MANETs). The limitations thrown by these networks, motivate the necessity of a group key management framework to secure data traffic. In this context, significant research work done in the last decade and proved that the trust based frameworks deliver better performance than others. Trust value can be evaluated based on direct and indirect interactions with other nodes in the network. The threshold trust value does binary classification about a node is genuine or fake (misbehavior) and further communication includes or excludes. However, in many automated systems, the result for a given input cannot be just categorized as binary output. Instead of a binary, it is more spontaneous and natural to use a fuzzy set based classification which gives the degree of genuineness. To realize this concept, we propose a reliable group key management framework by adding fuzzy logic rules in this paper. The clustering scheme with Fuzzy classifier aids, to eliminate the pretended nodes over a span of time in order to evade internal attacks. Moreover, it saves the energy of each node due to lightweight framework and less key management overhead. Our simulation outcomes prove that our method is more reliable compared to existing frameworks.

[1]  Sivakumar Ponnusamy,et al.  Mobile Agents based Reliable and Energy Efficient Routing Protocol for MANET , 2016 .

[2]  Kamal Kumar Chauhan,et al.  Securing Mobile Ad hoc Networks:Key Management and Routing , 2012, ArXiv.

[3]  Reham Abdellatif Abouhogail,et al.  Security Assessment for Key Management in Mobile Ad Hoc Networks , 2014 .

[4]  Byrav Ramamurthy,et al.  CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[5]  Valérie Issarny,et al.  An efficient group key agreement protocol for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[6]  Mark Manulis,et al.  Contributory group key agreement protocols, revisited for mobile ad-hoc groups , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[7]  Lotfi A. Zadeh,et al.  A Simple View of the Dempster-Shafer Theory of Evidence and Its Implication for the Rule of Combination , 1985, AI Mag..

[8]  Jin-Hee Cho,et al.  Trust threshold based public key management in mobile ad hoc networks , 2016, Ad Hoc Networks.

[9]  Omar Cheikhrouhou,et al.  Secure Group Communication in Wireless Sensor Networks: A survey , 2016, J. Netw. Comput. Appl..

[10]  Hamamache Kheddouci,et al.  ECGK: An efficient clustering scheme for group key management in MANETs , 2010, Comput. Commun..

[11]  Farokh B. Bastani,et al.  Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).

[12]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[13]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[14]  Lingling Li,et al.  A New Algorithm of Closeness Degree for Fuzzy Pattern Recognition , 2010 .

[15]  Omar Cheikhrouhou,et al.  Secure Group communication in Wireless Sensor Networks , 2013 .

[16]  Guy Pujolle,et al.  Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[17]  Shouhuai Xu,et al.  GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks , 2006 .

[18]  J. Mendel Fuzzy logic systems for engineering: a tutorial , 1995, Proc. IEEE.

[19]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[20]  Xiaoding Wang,et al.  Strategy and simulation of trust cluster based key management protocol for ad hoc networks , 2009, 2009 4th International Conference on Computer Science & Education.

[21]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[22]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[23]  Radhakrishnan Shanmugasundaram,et al.  Authentication in Wireless Sensor Networks Using Dynamic Keying Technique , 2016 .

[24]  Gene Tsudik,et al.  Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.

[25]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..