SlideShare a Scribd company logo
International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 14
Group Secret Key Generation in Wireless Networks:
Algorithms and Rate Optimization
V.REKHA1 , A.KIRUTHIKA2 , R.KAVINILA3
1
( Department of CS , Dhanalakshmi Srinivasan College of Arts & Science for Women, Perambalur-621 212.)
I. INTRODUCTION
In contrast to the channel model based
techniques, recently the source model based PHY
security approach has received a considerable
attention, where correlative source observations
between legitimate users are exploited to generate
common randomness and information-theoretically
secure symmetric keys. The works in aimed to find
information theoretic secrecy key capacities in a
variety of source models, however, they have not
provided methods to obtain the source observations.
Due to channel reciprocity in time-division duplex
(TDD) systems, the correlative observations can be
obtained via estimates of the wireless fading
channels between the legitimate users, which
demonstrate the advantages of the source model
based key generation approach to support secure
multimedia service. Along this direction, many
works have investigated this channel reciprocity
based key generation problem In addition, it is
exploited the fact that the eavesdropper channels
are independent from channels between the
legitimate users as long as the eavesdroppers are
half wave length away from the legitimate users,
which is a general case in wireless networks The
key generation problem between a group of
terminals is more challenging due to the different
random channels associated with these terminals.
The information-theoretic secret key capacity for
the group key generation in the multi-terminal
source model was first provided in Since then,
several tree-based algorithms have been developed
to achieve the group secret key capacity for the
multi-terminal pair wise independent network .
II.PROBLEM DESCRIPTION
2.1 EXISTING SYSTEM
Several pair wise key generation technique has
been developed to achieve the group secret key
capacity for the multi-terminal pair wise
independent network. An algorithm was more
practical for real systems at the expense of some
scarification in the group key rate. Specifically a
tree based group key algorithm divide each pair
RESEARCH ARTICLE OPEN ACCESS
Abstract:
A group key generation algorithm investigates group secret key generation problems for
different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A
new group key generation strategy with low complexity is proposed, which combines the well-
established point-to-point pair wise key generation technique, the multisegment scheme, and the onetime
pad. In particular, this group key generation process is studied for three types of communication
networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network.
Three group key generation algorithms are developed for these communication networks, respectively.
The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third
algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address
the time allocation problem in the channel estimation step to maximize the group key rates. This non-
convex max – min time allocation problem is first reformulated into a series of geometric programming,
and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also
provided to validate the performance of the proposed key generation algorithms and the time allocation
algorithm.
International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 15
wise key into multiple one-bit segments. Then, in
order to propagate these one-bit segments, the
nodes adopt a transmission scheduler via repeatedly
finding spanning trees in the corresponding multi
graphs.An optimization problem dot not solve in
pair-wise key based generation algorithm.
DISADVANTAGES
 Performance is not validating.
 Cannot prevent group key rate.
 Only generate pair-wise independent keys.
2.2 PROPOSED SYSTEM
A new group key generation algorithms for
three types of wireless topologies, namely, the
three-node network, the multi-node ring network,
the multi-node mesh network.Firstly, A proposed
scheme is demonstrated using a simple three-node
wireless network, where three legitimate nodes
wish to agree on a common group key without
revealing this key to an external eavesdropper.The
proposed key generation protocol is extended to the
mesh wireless network, where a wireless link exists
between every two nodes. To realize optimal or
order-optimal group key rates, the propose key
generation strategy is based on the careful
combination of the well established point-to-point
pair wise key generation technique, the Multi-
segment and one-time pad.The propose algorithms
not only design the segment-pairing scheme to
perform the one-time pad, but also analyze the
optimal rate allocated for each segment. A group
key generation algorithm only divide each pair wise
key into a small number of segments with optimal
rate allocation, such that only a simple round-robin
scheduler is adopted by the nods to transmit one-
time pads of these segments in the group key
agreement. To solve the key rate optimization
problem with respect to optimal time allocation for
these three type of networks, which is non-trivial
due to the non-convex characteristic.
ADVANTAGE
 Low complexity.
 High authenticates transferring data.
 Highly Secured
III. MODULE DESCRIPTION
1. Authentication Server Module
2. Player Initialization Module
3. Group Formation Module
4. Key Generation Module
5. Cryptography Module
3.1 AUTHENTICATION SERVER
MODULE:
An authentication server is an application that
facilitates authentication of an entity that attempts
to access a network. Such an entity may be a user or
another server. An authentication server can reside
in a dedicated computer, an Ethernet switch, an
access point or a network access server.
3.2 PLAYER INITIALIZATION
MODULE:
In the Player initialization process, the
player is used to initialize there ID, Port number
and there IP Address. By initialize there details they
can form the group, without initialize they cannot
form the group.
3.3 GROUP FORMATION MODULE:
In the Group formation, the no of player will
be create an object and each player will share their
object to the no of player in the in round1. In which
we can view the alive players in round1.
3.4 KEY GENERATION MODULE:
The common secret key for a group of users
can be generated based on the channel of each pair
of users. A two segment key generation algorithm is
used to generate a common secret key for secured
communication.
3.5 CRYPTOGRAPHY MODULE:
In message service process with the help of the
session key, the group member can share the data.
With the help of encryption engine will send in the
encrypt format. At the receiver share the secret key
help of decryption engine will receive in the decrypt
format.
International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 16
IV.SYSTEM ARCHITECTURE:
V.CONCLUSION
A new key generation strategy with low-
complexity has been proposed for different types of
wireless networks, which is based on the careful
combination of well established point-to-point pair
wise key generation technique, the multi-segment
scheme, and the one-time pad.Each pair wise key is
divided into two segments for the three-node
network, whereas each pair wise key is divided into
M − 1 segments for the M-node ring network.Both
of these algorithms are optimal in terms of the
achieved group key rates. Moreover, the proposed
two-segment based algorithm for the three-node
scenario has been extended to the M-node mesh
wireless network and shown to achieve the optimal
multiplexing gain M/2. Next, the optimal time
allocation problems have been solved for some
cases where the original non-convex max-min
problem is reformulated into a series of geometric
programming and an iterative algorithm has been
developed by exploiting single condensation
method.
FUTURE ENHANCEMENT
The proposed protocol provides
authentication of the participants using segments
with Public Key Infrastructure, which may be
difficult in certain environments. It may be possible
to provide authentication using different number of
segment values is integrated signature scheme for
group key agreement, with overall reduced
computational and communicational loads. Also
such security issues as, perfect forward secrecy,
replay attack, forgery attack, key compromise
impersonation, key control, etc. are yet to be
studied for the proposed protocol
ACKNOWLEDGEMENT
The author deeply indebted to honorable First and
foremost I bow my heads to almighty for blessing
me to complete my project work successfully by
overcoming all hurdles. I express my immense
gratitude to correspondent SHRI A.SRINIVASAN.
vice chairman SHRI A.SRINIVASAN(Founder
chairman),SHRI P.NEELRAJ(Secreatry)
Dhanalakshmi Srinivasan Group of institutions,
perambalur for giving me opportunity to work and
avail the facilities of the college campus. The
author heartfelt and sincere thanks to principalDr.
ARUNADINAKARAN, Vice Principal prof.
S.H.AFROZE, HoD Mrs.
V.VANEESWARI,(Dept.of CS& IT) Project Guide
Ms.A.KIRUTHIKA,(Dept of CS &IT ) of
dhanalakshmi Srinivasan College of Arts & Science
for women, Perambalur. The author also thanks to
Parents, Family Members, Friends, Relatives for
their support , freedom and motivation
REFERENCES
1. Microsoft C#.NET Programmer’s book
(Tata McGraw Hill Edition) 2002 -CHRIS
GOODE, JOHN KAUFFMAN
2. C#.Net 2.0 for everyday Apps by Doug
Lowe in Wiley Publishing Inc.,
3. Programming C# : Building .NET
Applications with C# Jesse Liberty
(O'Reilly)
International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 17
4. “Microsoft SQL Server 2000
Programming” by Example Copyright ©
2001 by Que Corporation, Fernando G.
Guerrero and Carlos Eduardo Rojas.
5. “SQL: The Complete Reference” by
James R. Groff and Paul N. Weinberg,
Osborne/McGraw-Hill © 1999.
6. “Professional ADO.NET Programming”
by BipinJoshi, Paul Dickinson,Fabio Claudo
Ferracchiati, Wrox.Press.
BIOGRAPHICAL NOTES
Ms.REKHA.Vis
presently pursuing ComputerScienceM.Sc.,Final
year the Department of Science From
Dhanalakshmi Srinivasan College of Arts and
Science for Women, Perambalur, Tamil Nadu ,India
Ms.KIRUTHIKA.A - Received M.C.A., M.Phil
Degree in Computer Science. She is currently
working asAssistant Professor in Department of
Computer Science in DhanalakshmiSrinivasan
College of Arts and Science for Women,
Perambalur Tamil Nadu, India.She has Published
papers in IJSTM & IJIRCCE journals and also
Published two books Namely ” Computer Basics
and Internet ” and “Introduction to Languages
C,C++,Java” Her research areas are
Networking,Web Technology and Cloud Computing.
DhanalakshmiSrinivasan College of Arts and
Science for Women,Perambalur, Tamil nadu, India.
Ms.KAVINILAis
presently pursuing ComputerScienceM.Sc.,Final
year the Department of Science From
Dhanalakshmi Srinivasan College of Arts and
Science for Women, Perambalur, Tamil Nadu ,India

More Related Content

What's hot

A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...
eSAT Journals
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
Mumbai Academisc
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
Selva Raj
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
Hop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wireHop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wire
Selva Raj
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copyHop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copy
Selva Raj
 
Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...
Eswar Publications
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
ijctet
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computing
inventionjournals
 
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
eSAT Publishing House
 
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNSecure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
IJMTST Journal
 
C241721
C241721C241721
C241721
irjes
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
eSAT Publishing House
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation
 

What's hot (20)

A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Hop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wireHop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wire
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copyHop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copy
 
Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computing
 
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
 
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNSecure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
 
C241721
C241721C241721
C241721
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 

Similar to IJET-V3I2P3

Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
IAEME Publication
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Eswar Publications
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
acijjournal
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
sarathanjabam
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor NetworksRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ijceronline
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
JPINFOTECH JAYAPRAKASH
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd Iaetsd
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Publishing House
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
ijsrd.com
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
IJCNCJournal
 

Similar to IJET-V3I2P3 (20)

Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor NetworksRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Privacy preserving data sharing with a...
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 

More from IJET - International Journal of Engineering and Techniques

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 

Recently uploaded (20)

gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 

IJET-V3I2P3

  • 1. International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 14 Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization V.REKHA1 , A.KIRUTHIKA2 , R.KAVINILA3 1 ( Department of CS , Dhanalakshmi Srinivasan College of Arts & Science for Women, Perambalur-621 212.) I. INTRODUCTION In contrast to the channel model based techniques, recently the source model based PHY security approach has received a considerable attention, where correlative source observations between legitimate users are exploited to generate common randomness and information-theoretically secure symmetric keys. The works in aimed to find information theoretic secrecy key capacities in a variety of source models, however, they have not provided methods to obtain the source observations. Due to channel reciprocity in time-division duplex (TDD) systems, the correlative observations can be obtained via estimates of the wireless fading channels between the legitimate users, which demonstrate the advantages of the source model based key generation approach to support secure multimedia service. Along this direction, many works have investigated this channel reciprocity based key generation problem In addition, it is exploited the fact that the eavesdropper channels are independent from channels between the legitimate users as long as the eavesdroppers are half wave length away from the legitimate users, which is a general case in wireless networks The key generation problem between a group of terminals is more challenging due to the different random channels associated with these terminals. The information-theoretic secret key capacity for the group key generation in the multi-terminal source model was first provided in Since then, several tree-based algorithms have been developed to achieve the group secret key capacity for the multi-terminal pair wise independent network . II.PROBLEM DESCRIPTION 2.1 EXISTING SYSTEM Several pair wise key generation technique has been developed to achieve the group secret key capacity for the multi-terminal pair wise independent network. An algorithm was more practical for real systems at the expense of some scarification in the group key rate. Specifically a tree based group key algorithm divide each pair RESEARCH ARTICLE OPEN ACCESS Abstract: A group key generation algorithm investigates group secret key generation problems for different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A new group key generation strategy with low complexity is proposed, which combines the well- established point-to-point pair wise key generation technique, the multisegment scheme, and the onetime pad. In particular, this group key generation process is studied for three types of communication networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network. Three group key generation algorithms are developed for these communication networks, respectively. The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address the time allocation problem in the channel estimation step to maximize the group key rates. This non- convex max – min time allocation problem is first reformulated into a series of geometric programming, and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also provided to validate the performance of the proposed key generation algorithms and the time allocation algorithm.
  • 2. International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 15 wise key into multiple one-bit segments. Then, in order to propagate these one-bit segments, the nodes adopt a transmission scheduler via repeatedly finding spanning trees in the corresponding multi graphs.An optimization problem dot not solve in pair-wise key based generation algorithm. DISADVANTAGES  Performance is not validating.  Cannot prevent group key rate.  Only generate pair-wise independent keys. 2.2 PROPOSED SYSTEM A new group key generation algorithms for three types of wireless topologies, namely, the three-node network, the multi-node ring network, the multi-node mesh network.Firstly, A proposed scheme is demonstrated using a simple three-node wireless network, where three legitimate nodes wish to agree on a common group key without revealing this key to an external eavesdropper.The proposed key generation protocol is extended to the mesh wireless network, where a wireless link exists between every two nodes. To realize optimal or order-optimal group key rates, the propose key generation strategy is based on the careful combination of the well established point-to-point pair wise key generation technique, the Multi- segment and one-time pad.The propose algorithms not only design the segment-pairing scheme to perform the one-time pad, but also analyze the optimal rate allocated for each segment. A group key generation algorithm only divide each pair wise key into a small number of segments with optimal rate allocation, such that only a simple round-robin scheduler is adopted by the nods to transmit one- time pads of these segments in the group key agreement. To solve the key rate optimization problem with respect to optimal time allocation for these three type of networks, which is non-trivial due to the non-convex characteristic. ADVANTAGE  Low complexity.  High authenticates transferring data.  Highly Secured III. MODULE DESCRIPTION 1. Authentication Server Module 2. Player Initialization Module 3. Group Formation Module 4. Key Generation Module 5. Cryptography Module 3.1 AUTHENTICATION SERVER MODULE: An authentication server is an application that facilitates authentication of an entity that attempts to access a network. Such an entity may be a user or another server. An authentication server can reside in a dedicated computer, an Ethernet switch, an access point or a network access server. 3.2 PLAYER INITIALIZATION MODULE: In the Player initialization process, the player is used to initialize there ID, Port number and there IP Address. By initialize there details they can form the group, without initialize they cannot form the group. 3.3 GROUP FORMATION MODULE: In the Group formation, the no of player will be create an object and each player will share their object to the no of player in the in round1. In which we can view the alive players in round1. 3.4 KEY GENERATION MODULE: The common secret key for a group of users can be generated based on the channel of each pair of users. A two segment key generation algorithm is used to generate a common secret key for secured communication. 3.5 CRYPTOGRAPHY MODULE: In message service process with the help of the session key, the group member can share the data. With the help of encryption engine will send in the encrypt format. At the receiver share the secret key help of decryption engine will receive in the decrypt format.
  • 3. International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 16 IV.SYSTEM ARCHITECTURE: V.CONCLUSION A new key generation strategy with low- complexity has been proposed for different types of wireless networks, which is based on the careful combination of well established point-to-point pair wise key generation technique, the multi-segment scheme, and the one-time pad.Each pair wise key is divided into two segments for the three-node network, whereas each pair wise key is divided into M − 1 segments for the M-node ring network.Both of these algorithms are optimal in terms of the achieved group key rates. Moreover, the proposed two-segment based algorithm for the three-node scenario has been extended to the M-node mesh wireless network and shown to achieve the optimal multiplexing gain M/2. Next, the optimal time allocation problems have been solved for some cases where the original non-convex max-min problem is reformulated into a series of geometric programming and an iterative algorithm has been developed by exploiting single condensation method. FUTURE ENHANCEMENT The proposed protocol provides authentication of the participants using segments with Public Key Infrastructure, which may be difficult in certain environments. It may be possible to provide authentication using different number of segment values is integrated signature scheme for group key agreement, with overall reduced computational and communicational loads. Also such security issues as, perfect forward secrecy, replay attack, forgery attack, key compromise impersonation, key control, etc. are yet to be studied for the proposed protocol ACKNOWLEDGEMENT The author deeply indebted to honorable First and foremost I bow my heads to almighty for blessing me to complete my project work successfully by overcoming all hurdles. I express my immense gratitude to correspondent SHRI A.SRINIVASAN. vice chairman SHRI A.SRINIVASAN(Founder chairman),SHRI P.NEELRAJ(Secreatry) Dhanalakshmi Srinivasan Group of institutions, perambalur for giving me opportunity to work and avail the facilities of the college campus. The author heartfelt and sincere thanks to principalDr. ARUNADINAKARAN, Vice Principal prof. S.H.AFROZE, HoD Mrs. V.VANEESWARI,(Dept.of CS& IT) Project Guide Ms.A.KIRUTHIKA,(Dept of CS &IT ) of dhanalakshmi Srinivasan College of Arts & Science for women, Perambalur. The author also thanks to Parents, Family Members, Friends, Relatives for their support , freedom and motivation REFERENCES 1. Microsoft C#.NET Programmer’s book (Tata McGraw Hill Edition) 2002 -CHRIS GOODE, JOHN KAUFFMAN 2. C#.Net 2.0 for everyday Apps by Doug Lowe in Wiley Publishing Inc., 3. Programming C# : Building .NET Applications with C# Jesse Liberty (O'Reilly)
  • 4. International Journal of Engineering and Techniques - Volume 3 Issue 2, Mar – Apr 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 17 4. “Microsoft SQL Server 2000 Programming” by Example Copyright © 2001 by Que Corporation, Fernando G. Guerrero and Carlos Eduardo Rojas. 5. “SQL: The Complete Reference” by James R. Groff and Paul N. Weinberg, Osborne/McGraw-Hill © 1999. 6. “Professional ADO.NET Programming” by BipinJoshi, Paul Dickinson,Fabio Claudo Ferracchiati, Wrox.Press. BIOGRAPHICAL NOTES Ms.REKHA.Vis presently pursuing ComputerScienceM.Sc.,Final year the Department of Science From Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur, Tamil Nadu ,India Ms.KIRUTHIKA.A - Received M.C.A., M.Phil Degree in Computer Science. She is currently working asAssistant Professor in Department of Computer Science in DhanalakshmiSrinivasan College of Arts and Science for Women, Perambalur Tamil Nadu, India.She has Published papers in IJSTM & IJIRCCE journals and also Published two books Namely ” Computer Basics and Internet ” and “Introduction to Languages C,C++,Java” Her research areas are Networking,Web Technology and Cloud Computing. DhanalakshmiSrinivasan College of Arts and Science for Women,Perambalur, Tamil nadu, India. Ms.KAVINILAis presently pursuing ComputerScienceM.Sc.,Final year the Department of Science From Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur, Tamil Nadu ,India