GROUP KEY BASED NODE LINK ESTABLISHMENT AND RECTIFYING USING SONLR METHOD FOR WIRELESS NETWORK

This paper proposes and specifies a new method for distributing and managing secure group keys in Wireless environments, which applies for the Secure Optimized Node Link Routing method (SONLR). Our Method manages group keys taking into consideration the frequent network partitions and the absence of infrastructure. The analysis shows that the method is energy efficient for high key replacement rates and frequent network partitions. When using physical routing to solve the multicast problem, the most challenging question is to decide when the message should be replicated into different packets. The best solution is to route the message using a common path among all destinations, and then to replicate it at the end of this path. Of course, the difficulty lies in determining the best common path by using only local information at each hop. We have using an Energy Efficient Group key management for secure data processing on network. A provably secure method in the new key management paradigm and perform extensive experiments in the context of wireless networks. In the proposed method after insertion of the public group encryption key in the first run, the subsequent encryption by the sender and the decryption by each receiver are both of constant complexity, even in the case of member changes or system updates for rekeying. So during data transfer if any node link or node is failure means the key is replace for another node so neighborhood node to take all process in network using SONRL.

[1]  Hervé Rivano,et al.  Capillary networks: a novel networking paradigm for urban environments , 2012, UrbaNe '12.

[2]  Wenjing Lou,et al.  PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[3]  K. J. Ray Liu,et al.  A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.

[4]  I. Young,et al.  Experimental and theoretical study of magneto-inductive waves supported by one-dimensional arrays of ''swiss rolls'' , 2004 .

[5]  Ian F. Akyildiz,et al.  On capacity of magnetic induction-based wireless underground sensor networks , 2012, 2012 Proceedings IEEE INFOCOM.

[6]  Nina F. Thornhill,et al.  Wireless communication in process automation: A survey of opportunities, requirements, concerns and challenges , 2010 .

[7]  Yongdae Kim,et al.  Secure Group Communication Using Robust Contributory Key Agreement , 2001 .

[8]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Hsiao-Hwa Chen,et al.  A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study , 2009, IEEE Transactions on Vehicular Technology.

[10]  Ian F. Akyildiz,et al.  Signal propagation techniques for wireless underground communication networks , 2009, Phys. Commun..