+ All Categories
Home > Documents > Research Article Mobility Based Key Management...

Research Article Mobility Based Key Management...

Date post: 22-Apr-2018
Category:
Upload: trinhhuong
View: 218 times
Download: 3 times
Share this document with a friend
11
Research Article Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks B. Madhusudhanan, 1 S. Chitra, 2 and C. Rajan 3 1 Department of Computer Science, Er.Perumal Manimekalai College of Engineering, Hosur 635117, India 2 Er.Perumal Manimekalai College of Engineering, Hosur 635117, India 3 Department of Information Technology, KSR College of Technology, Tiruchengode 637211, India Correspondence should be addressed to C. Rajan; [email protected] Received 12 September 2014; Accepted 1 January 2015 Academic Editor: Hai Jiang Copyright © 2015 B. Madhusudhanan et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key- based encryption technique is utilized to transmit a multicast data. e rekeying process is performed periodically by the initiator node. e rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality. 1. Introduction A set of wireless communication nodes performing self- configuration in a dynamic mode for formation of network excluding fixed infrastructure or centralized supervision is termed as mobile ad hoc network (MANET) [1]. It defines the set of wireless heterogeneous mobile nodes that performs communication with each other over multihop paths devoid of fixed infrastructure [2]. e key aim of MANETs is to extend the mobility criteria in autonomous, mobile, and wireless domain. e nodes in MANET perform as both hosts as well as routers for sending the packet to each other [3]. During ad hoc routing, every node in the network is permitted to discover its multihop path via the network to any other node [1]. e application of the MANET includes military battlefields, emergency search, and rescue locations, and so forth which requires quick deployment and active reconfiguration. Here the members make use of mobile devices for sharing the information [1]. e process of broadcasting the packets to a group of zero or more hosts recognized by a single destination address is termed as multicasting [1]. is implies that message is transmitted from one sender to several receivers or from multiple senders to multiple receivers. e merit of multicast technique is that it offers service to multiple users exclusive of network and resources overloading in the server [4]. e mul- ticast technique is utilized by the application such as routing, neighbor discovery, key distribution and topology control. is technique is also used in identical data transmission from a single sender to several receivers that minimizes the network traffic and energy consumption [5]. e multicasting approach can enhance the efficiency of the wireless links for transmitting the multiple copies of messages in order to utilize the inbuilt broadcast nature of wireless transmission. us, multicast takes a major responsi- bility in MANET. e major aim of multicast routing protocol is to reduce the control overhead and processing overhead, enhancing the potentiality of multicast routing protocol, Hindawi Publishing Corporation e Scientific World Journal Volume 2015, Article ID 801632, 10 pages http://dx.doi.org/10.1155/2015/801632
Transcript

Research ArticleMobility Based Key Management Technique forMulticast Security in Mobile Ad Hoc Networks

B Madhusudhanan1 S Chitra2 and C Rajan3

1Department of Computer Science ErPerumal Manimekalai College of Engineering Hosur 635117 India2ErPerumal Manimekalai College of Engineering Hosur 635117 India3Department of Information Technology KSR College of Technology Tiruchengode 637211 India

Correspondence should be addressed to C Rajan crajanksrgmailcom

Received 12 September 2014 Accepted 1 January 2015

Academic Editor Hai Jiang

Copyright copy 2015 B Madhusudhanan et al This is an open access article distributed under the Creative Commons AttributionLicense which permits unrestricted use distribution and reproduction in any medium provided the original work is properlycited

In MANET multicasting forward and backward secrecy result in increased packet drop rate owing to mobility Frequent rekeyingcauses large message overhead which increases energy consumption and end-to-end delay Particularly the prevailing group keymanagement techniques cause frequent mobility and disconnections So there is a need to design a multicast key managementtechnique to overcome these problems In this paper we propose the mobility based key management technique for multicastsecurity in MANET Initially the nodes are categorized according to their stability index which is estimated based on the linkavailability andmobility Amulticast tree is constructed such that for every weak node there is a strong parent node A session key-based encryption technique is utilized to transmit a multicast data The rekeying process is performed periodically by the initiatornodeThe rekeying interval is fixed depending on the node category so that this technique greatlyminimizes the rekeying overheadBy simulation results we show that our proposed approach reduces the packet drop rate and improves the data confidentiality

1 Introduction

A set of wireless communication nodes performing self-configuration in a dynamic mode for formation of networkexcluding fixed infrastructure or centralized supervision istermed as mobile ad hoc network (MANET) [1] It definesthe set of wireless heterogeneous mobile nodes that performscommunication with each other over multihop paths devoidof fixed infrastructure [2] The key aim of MANETs is toextend the mobility criteria in autonomous mobile andwireless domain The nodes in MANET perform as bothhosts as well as routers for sending the packet to each other[3] During ad hoc routing every node in the network ispermitted to discover its multihop path via the network toany other node [1] The application of the MANET includesmilitary battlefields emergency search and rescue locationsand so forth which requires quick deployment and activereconfiguration Here the members make use of mobiledevices for sharing the information [1]

The process of broadcasting the packets to a group ofzero or more hosts recognized by a single destination addressis termed as multicasting [1] This implies that message istransmitted from one sender to several receivers or frommultiple senders to multiple receivers The merit of multicasttechnique is that it offers service tomultiple users exclusive ofnetwork and resources overloading in the server [4]Themul-ticast technique is utilized by the application such as routingneighbor discovery key distribution and topology controlThis technique is also used in identical data transmissionfrom a single sender to several receivers that minimizes thenetwork traffic and energy consumption [5]

The multicasting approach can enhance the efficiencyof the wireless links for transmitting the multiple copies ofmessages in order to utilize the inbuilt broadcast nature ofwireless transmissionThusmulticast takes amajor responsi-bility inMANETThemajor aimofmulticast routing protocolis to reduce the control overhead and processing overheadenhancing the potentiality of multicast routing protocol

Hindawi Publishing Corporatione Scientific World JournalVolume 2015 Article ID 801632 10 pageshttpdxdoiorg1011552015801632

2 The Scientific World Journal

upholding the dynamic topology and avoids network loopsand so on

Security in Multicasting in MANET The basic features ofsecurity in MANET are as follows confidentiality guaranteesthat the network information cannot be revealed to the illegalunit Integrity is essential to maintain the data to be transmit-ted among nodes without any change or degradation Avail-ability means that the services are demanded are availablein timely manner without any potential issues in the systemThe lack of authentication can cause the attacker masqueradeany node and rules over the whole network Nonrepudiationguarantees that the message forwarded cannot be refused bythe message instigator [3]

Key ManagementThe methods of making distributing andupdating the keys for a secure group communication applica-tion are termed as keymanagement [6] Encryption and reen-cryption are completed with the assistance of Traffic Encryp-tion Keys (TEKs) and Key Encryption Keys (KEKs) In asecure multicast communication each member possesses akey to encode and decrypt the multicast data The methodof updating and distributing the keys to the group memberscorresponds to rekeying operation When each membershipchanges the rekey process is performedHowever throughoutcontinual membership modulation key management needsseveral exchanges per unit time for upholding forward andbackward secrecies [7]The securemulticasting is categorizedinto two types such as centralized and distributed schemeTheGroupController (GC) performs group keymanagementand only small loads are applied on the users of the group incase of centralized scheme For distributed scheme the keymanagement is performed by each user to reinforce the loadon the user [4]

2 Related Work

Chang and Kuo [8] have proposed a two-step secure authen-tication approach for multicast MANETs A Markov chaintrust model determines the Trust Value (TV) and the nodewith the highest TV is selected as CA server The securityanalysis guarantees that this approach achieves a secure reli-able authentication in multicast MANETs Numerical resultsshow that the analytical TV is very close to that of simulationunder various situations The speed of convergence of theanalytical TV shows that the analyzed result is independentof initial values and trust classes Huang and Medhi [9] haveprojected a secure group key management scheme for hier-archical mobile ad hoc networks to enhance each scalabilityand survivability of group key management for large-scalewireless ad hoc networks A multilevel security model and adecentralized group key management infrastructure to comeback through such amulti-level security model are projectedThis approach reduces the key management overhead andimproves resilience to any single point failure problem

Bouassida and Bouali [10] have introduced an evaluationmethod for group key management protocols (GKMP)Theyhave compared four main existing group key protocols

namely scalable and efficient group rekeying protocol (GKM-PAN) for ad hoc networks Distributed Multicast GroupSecurity Architecture (DMGSA) BALADE and Hierarchi-cal group key management protocol (Hi-GDH) In theabove approaches GKMPAN is an example for centralizedapproach DMGSA approach belongs to distributed typekey management scheme BALADE protocol and Hi-GDHstand for decentralized approach They have discussed theneed for performance evaluation of GKMPrsquos in the contextof MANETrsquos Lin et al [11] have proposed a new groupkey management protocol to reduce the communicationand computation overhead of group key rekeying caused bymembership changes The protocol can handle synchronousand asynchronous rekeying operations and a new 119896-nodeinsertion algorithm is designed to further optimize the keytree in batch update operationsWith strong encryption func-tion and key derivation function this protocol is provablysecure Simulation result shows that compared to LKH OFTand ELK SKD requires the least communication bandwidthand computation power and it is efficient with binary keytrees and asynchronous rekeying

3 Proposed Work

The proposed technique uses Link Quality (LQ) and Rep-utation of nodes to identify them as strong or weak nodesThemulticast tree constructed with secure communication isbased on the classified nodes and described in the subsectionsin detail

31 Estimating Received Signal Strength Here the proposedwork makes use of the Friis free space propagation model tomeasure the received signal strength value The received sig-nal strength (RSS) is computed using the following formula[12]

RSS = 120572 lowast 120579 lowast 119878tx (1)

where 120572 is a constant that relies on the wavelength and theantennas 120579 is the channel gain 119878tx is the signal power of thetransmitter

RSS can be expressed in terms of the dB and dBm (dBmilliWatts) as follows

RSS [dBm] = 10log10120572 + 120579 [dB] + 119878tx [dBm] (2)

311 Link Quality Link Quality (LQ) is estimated by ratio ofthe number of bits in error to the number of bits received (biterror rate) [13]

LQ =119887rx119887error

(3)

This value gets updated for every packet received at anode over a certain period It depends on parameters such asthe interference effect of the wireless channel additive whiteGaussian noise and signal transmission range

The Scientific World Journal 3

312 Stability Index Stability index (SI119894119895) is computed for

a link to a neighbor based on the received signal strengthmobility and link quality (using Sections 311 312 and 313)[13] SI

119894119895of a link between node 119894 and node 119895 is defined as

follows

SI119894119895=RSSLQ

(4)

313 Estimation of Reputation of Nodes Consider nodes 119894and 119895

The recent satisfaction index (119875119894119895) for node 119894 about node 119895

is computed as follows

119875119894119895= 119891 (119894 119895) minus 119890 (119894 119895) (5)

where 119891(119894 119895) is the percentage of packets originated from119894 that were forwarded by node 119895 over the total number ofpackets offered to node 119895

119890(119894 119895) is the percentage of packets that were expired overthe total number of packets offered to node 119895

Thus 119875119894119895can be considered as the direct reputation of

node 119895

Rep119894119895= Rep

119894119895-pr lowast119882hist + 119875119894119895lowast (1 minus119882hist) (6)

where Rep119894119895-prev is the reputation value that node 119894 had for

node 119895 before incorporating the most recent satisfactionindex

119882hist is a constant that reflects the level of confidence thatnode 119894 has in the past observed reputation for its neighbor 119895

The reputation index REP119894119895

is normalized using thefollowing equation

REP119894119895=

REP119894119895

max119905(REP119894119895) (7)

max119905is the function that reports the maximum observation

of REP119894119895over time [14]

32 Classifying the Nodes Thenodes are categorized into twotypes namely strong and weak nodes The steps involved inselecting the nodes are as follows

(1) Each node deployed in the network periodicallyexchanges a HELLO packet with its neighbor nodes

(2) By exchanging the hello packets every nodemeasuresthe RSS link quality and mobility119872

119895(119894) of its neigh-

bor nodes (explained in Sections 311 and 312)(3) Based on the measurement of RSS link quality and

119872119895(119894) each node computes the stability index (SI) of

its neighbor nodes (explained in Section 313) and thevalues are stored in the neighbor table (NT)

(4) The SI of each neighbor119873119894is checked such that

Let SIth be the predefined threshold value of StabilityIndexIf SI119894lt SIth

1

3

7

2

6

5

4

9

8 10

17

12

15

14

11

2013

1618

19

Strong nodes

Weak nodes

Figure 1 Selection of strong and weak nodes

ThenThe nodes are marked as weak nodes (119873119908119894) and

stored in NTElse The nodes are marked as strong nodes (119873

119904119894) and

stored in NTEnd if

For example consider the network in Figure 1 The nodes 78 15 and 16 are marked as strong nodes as their stabilityindex is greater than the threshold value Remaining nodesare marked as weak nodes as their stability index is less thanthe threshold value

33Multicast Tree Construction Themulticast tree construc-tion phase involves two phases

Phase 1 Each 119873119908119894

sends a child request message (CREQ) toeach predetermined strong neighbor (119873

119904119895) stored in NT

119873119908119894

CREQ997888997888997888997888rarr 119873

119904119895 (8)

Upon receiving the CREQ message 119873119904119895sends a child

reply message (CREP) to119873119908119894

119873119908119894

CREPlarr997888997888997888997888 119873

119904119895 (9)

Every 119873119908119894

upon receiving CREP joins with 119873119904119895as child

nodes and respective119873119904119895becomes the parent node Thus for

every weak node there is at least a strong parent 119873119904119895then

stores its child nodes information in a table

For example consider the network in Figure 2 The weaknodes 2 and 5 get attachedwith the strong node 7Thus nodes2 and 5 become the child nodes for the strong parent node7 In the similar manner other strong nodes 8 15 and 16chooses their child nodes

Phase 2 Amulticast tree can be constructed and maintainedusing the periodic ldquoJOIN TREErdquo messages

Each strong node119873119904119895periodically sends a ldquoJOIN TREErdquo

message to the multicast source 119878

119873119904119895

JOIN TREE997888997888997888997888997888997888997888997888rarr 119878 (10)

4 The Scientific World Journal

1

7

3

6

2

9 11

1715

4

5

8

1214

10

2013

1618

19

S

Figure 2 Phase 1 selection of child nodes

7 8 15 16

2 5 4 10 11

6 12 14 17

13 18 19

S

Figure 3 Multicast tree

119878 constructs a multicast tree consisting of the paths thatldquoJOIN TREErdquo pass through There is only one path from the119878 to each119873

119904119895of the multicast group

Figure 3 shows an example of amulticast tree constructedon a MANET The parent nodes 7 8 15 and 16 sendsJOIN TREE message to 119878 119878 constructs a multicast treeconsisting of the paths traversed by ldquoJOIN TREErdquo message

331 Secure Multicast Communication When any node 119873119894

wants to transmitmulticast data to destination119863 in a securedmanner it performs the following steps

(1) Initially 119873119894bounds the multicast data with hash

message authentication code (119876) for ensuring the dataintegrity which is represented as 119876(data)

(2) 119873119894and 119863 cooperatively compute the session key 119870

119894119863

and119873119894utilizes119870

119894119863to encrypt119876[data]This encrypted

data is represented as119870119894119863[119876(data)] Here the session

key is generated using Elliptic Curve Diffie-HellmanKey Management Agreement protocol (ECDH) [15]

(3) Every member node holds a group key GK119894119873119894again

encrypts119870119894119863[119876(data)] with GK

119894and it is represented

as GK119894119870119894119863[119876(data)] GK

119894is the multicast group key

where 119894 = 1 2 119899(4) When any node along the path 119873

119894-119863 receives the

GK119894119870119894[119876(data)] it decrypts the data using GK

119894

and encrypts it with GK119894again and forwards the

encrypted data

7

2 5

SGK7KN2S[Q(data)]

GK2KN2S[Q(data)]

Q(data)

Figure 4 Secure data transmission

(5) When 119863 receives the encrypted data it decrypts thedata using its respective GK

119894and session key119870

119894119863and

verifies the integrity of 119876(data)For example consider the network in Figure 4

The node1198732wants to transmit the data packet to 119878 The data

to be transmitted will be in the form 119876(data)Initially119873

2and 119878 cooperatively compute the session key

1198701198732119878

and 1198732encrypts 119876(data) with 119870

1198732119878which is repre-

sented as 1198701198732119878

[119876(data)] 1198732again encrypts 119870

1198732119878[119876(data)]

with group key GK2which is given as GK

21198701198732119878

[119876(data)]This encrypted data is forwarded to119873

7

1198737decrypts the data using the GK

2and encrypts again

with GK7and forwards it to 119878which will be in following form

GK71198701198732119878 [119876 (data)] (11)

When 119878 is receiving the encrypted data it decryptsthe information victimization GK

7and session key KN2S

and verifies the integrity of 119876(data) If any changes happenthroughout the transmissions the receiving node detects themodifications in real time by validating the 119876 The securedtransmission of information between a node and thereforethe supply is illustrated in Figure 4

34 Detection of Attacker Nodes When the data is notdelivered at a reliable rate and optimum path quality itis predicted that attack is detected The attack detectiontechnique depends on the capacity of 119868 to detect the differenceamong the predicted PDR (PrP) and recognized PDR (ReP)The estimation of PrP and ReP is as follows

PrP can be estimated from the Success Probability Prod-uct metric (SPP) at the concerned route

SPP for a path of 119899 links among 119878 and119863 is given by

SPP119878rarr119863

=

119894

prod

119894=1

SPP119894 (12)

where the metric for each link 119894 on the path is SPP119894= Prsucc

ReP of a route is determined by testing the continuityof the sequence number in received data packets That is by

The Scientific World Journal 5

dividing the number of received packets by the number ofpackets sent by the source over an interval of time

ReP in terms of performance of packet delivery is givenby the following equation

ReP =119875119903

119875119904

(13)

where 119875119903is the average number of packets received by all

receivers and 119875119904is the number of packets sent by the source

Even if the attacker nodes drop all data packets initiatornodes have the capacity to determine the ReP with theinclusion of the backup data packet authenticated by thesource

If |PrP minus ReP| gt 120578

ThenThe malicious behavior is detected by 119868 since theparticular route does not deliver the data at consistentlevel with optimal path qualityEnd if

341 Isolation of Attacker Nodes The steps involved in theisolation of attacker nodes are as follows

Step 1 While detecting themalicious behavior it temporarilyrecriminates the suspicious node by flooding a failure noticein the network that includes ID of recriminated and recrimi-nator nodes and the period of recrimination

Step 2 Until the recrimination is valid metrics broadcastedby the recriminated node will not be taken into account andwill be discarded during routing process

Step 3 In case of transient network variations the temporaryrecrimination scheme is taken into consideration

Step 4 In temporary recrimination strategy initially thetime period of recrimination is computed in relative to theobserved difference among PrP and ReP This is performedwith the intention that the recriminations caused by increaseinmetric values aswell asmalicious data dropping rate retainsfor longer duration than the recriminations caused by thetransient network variations

Step 5 In order to avoid the recrimination caused by attack-ers a node is not permitted to announce a new recriminationprior to the expiry of the already announced recrimination

Step 6 If the best metric is broadcasted by a recriminatednode

Then the initiator node activates the recriminated nodein addition to the best nonrecriminated node

Step 6 reveals that the valid paths can still be utilized inspite of false recrimination of the strong nodes

35 Rekeying Technique Among the chosen119873119904119895 some nodes

have to be designated as initiators which initiates the

Rkyint Rkymin Rkymax Rkyt

Figure 5 Rekeying time interval

re-process In this section suppose that initiators are selectedby centralized node considering reputation index (RI) ofnodes The initiators are selected based on the RI of nodes(explained in Section 313)

The direct reputation of node119873119904119895is given as

Rep119908119904

= Rep119908119904-pr lowast 119911 + 119875

119908119904lowast (1 minus 119911) (14)

where Rep119908119904-pr is the reputation value of 119873

119904119895contained in

119873119908119894prior to the addition of recent satisfaction index 119911 is the

constant that replicates the level of confidence possessed by119873119908119894

for its 119873119904119895 119875119908119904

is the recent satisfaction index for 119873119908119894

about119873119904119895

Thus119873119904119895with high Rep

119908119904values are selected as initiators

The selected initiator starts the rekeying process periodicallyusing the rekeying interval Rkyint Rkyint is the fixed param-eter and rekeying procedure is demonstrated as follows

Let Rkyint be the initial timeLet Rkymax represent the maximum thresholds forrekeying intervalLet Rkymin indicate the minimum thresholds forrekeying intervalLet Rky

119905represent the stop time

According to the rekeying interval rekeying process isperformed using the following cases Figure 5 shows therekeying time interval

Case 1If Rkyint gt Rkymin

thenthe rekeying is performed for requested weaknodes from NT by the initiator

End if

Case 2If Rkyint gt Rkymax

thenthe rekeying is performed for requested strongnodes from NT by the initiator

End if

Case 3If Rkyint = Rky

119905

ThenRekeying is stopped and the timer is refreshedto start the new session

End if

6 The Scientific World Journal

The rekeying is performed in the weak node withinminimum rekeying interval since they possess minimumstability index which causes them to frequently join orleave the network In the strong nodes rekeying is per-formed at the maximum rekeying interval since they havemaximum stability index and their possibility to join orleave the network is less This periodic rekeying reduces therepeated rekeying process that further reduces the overheadIn rekeying technique the multicast group key (GK

119894) is

rekeyed considering the three cases given aboveThe rekeyingalgorithm functions as follows [16]

According to the cases given above rekeying processis triggered Initially node 119873

119894performs the ECDH key

management agreement from leaf node to the source ofmulticast tree to obtain subgroup key cooperatively as

119870119873119894

+ 119870119873119894+1

+ sdot sdot sdot + 119870119873119899minus1

119875 (15)

Here 119870119873119894

is the leaf node 119870119873119899minus1

is the source and 119875 isthe key generator in Diffe-Hellman Finally the generatedsubgroup chain reaches the source and it computes the newgroup key for the groupOnce the new group key is generatedby the source it unicasts it to the members securely

Considering the tree structure given in Figure 4 node1198732

and1198735are leaf nodes119873

7is the parent node of nodes 2 and 5

and 119878 is themulticast source Assume1198732invokes the rekeying

process and then the sequential process of rekeying is givenbelow

Step 1 1198732generates subgroup key as 119870

1198732+ 1198701198735119875 and

transmits to1198737

Step 2 Node1198737computes the subgroup key as 119870

1198732+ 1198701198735

+

1198701198737119875 and forwards to the source

Step 3 Finally the source computes cooperative subgroupkey as119870

1198732+1198701198735

+1198701198737

+119870119878119875 and then generates new group

key as1198701015840119894the source then unicasts the new group key securely

to its member nodes

4 Simulation Results

The proposed technique was simulated under different sce-narios using varying number of receivers and varying themobility of the nodes

41 Simulation Model and Parameters To analyze the per-formance of the proposed work NS2 [17] was used In oursimulation the channel capacity of mobile hosts is set tothe same value 2Mbps We use the distributed coordinationfunction (DCF) of IEEE 80211 for wireless LANs as theMAClayer protocol For multicasting we used Multicast AODV(MAODV) [16] routing protocol Simulations were carriedout in 1500 meter times 1500 meter region for 50 seconds simu-lation timeWe assume each node moves independently withthe same average speed All nodes have the same transmissionrange of 250 meters In our simulation the speed variedfrom 5 to 25ms and performance measured The simulatedtraffic is Constant Bit Rate (CBR) In this simulation we

Table 1 Simulation parameters

Number of receiver nodes 10 20 30 40 50Area size 1500 times 1500Mac 80211Radio range 250mSimulation time 50 secTraffic source CBRRate 250KbMobility model Random way pointSpeed 5 10 15 20 and 25

consider both the node capture and insider attacks In nodecapture attack a malicious attacker steals the credentials andsecret keys from the legitimate nodes An insider attacker is amalicious authenticated group member which may intimatefalse trust relations and injects false trust reporting It mayalso inject packets 119899 the network to disturb communicationsand consume the network resources Our simulation settingsand parameters are summarized in Table 1

42 Performance Metrics We compare our Mobility BasedKey Management Technique (MBKM) with the traditionalGKMPAN [10] and efficient clustering scheme for groupkey management (ECGK) [18] We evaluate mainly theperformance according to the following metrics

Average Packet Delivery Ratio It is the ratio of the number ofpackets received successfully and the total number of packetssent

Overhead It is the control overhead (in terms of packets)occurred in keying and rekeying operations

Packet Drop It is the average number of packets dropped ateach receiver

Detection Accuracy It is the ratio of number of attacksdetected to the number of attacks performed

Resilience It is the ratio of fraction of data compromised tothe fraction of nodes compromised

421 Based on Receivers In our first experiment we vary thenumber of receivers per group as 10 20 30 40 and 50 withspeed 5ms

(i) Comparison with GKMPAN The proposed MBKM tech-nique is compared with GKMPAN and the above perfor-mance metrics are evaluated by varying the group size

Figures 6 and 8 present the packet delivery ratio andpacket drop of both techniques respectively when the groupsize is increased from 10 to 50 From the figure we cansee that MBKM has 89 less packet drop than the existingGKMPAN techniques since it assures high reliability usingthe strong nodes Because of this reduced packet drop thedelivery ratio of the proposed MBKM is 2357 higherthan the GKMPAN technique Figure 7 presents the control

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

2 The Scientific World Journal

upholding the dynamic topology and avoids network loopsand so on

Security in Multicasting in MANET The basic features ofsecurity in MANET are as follows confidentiality guaranteesthat the network information cannot be revealed to the illegalunit Integrity is essential to maintain the data to be transmit-ted among nodes without any change or degradation Avail-ability means that the services are demanded are availablein timely manner without any potential issues in the systemThe lack of authentication can cause the attacker masqueradeany node and rules over the whole network Nonrepudiationguarantees that the message forwarded cannot be refused bythe message instigator [3]

Key ManagementThe methods of making distributing andupdating the keys for a secure group communication applica-tion are termed as keymanagement [6] Encryption and reen-cryption are completed with the assistance of Traffic Encryp-tion Keys (TEKs) and Key Encryption Keys (KEKs) In asecure multicast communication each member possesses akey to encode and decrypt the multicast data The methodof updating and distributing the keys to the group memberscorresponds to rekeying operation When each membershipchanges the rekey process is performedHowever throughoutcontinual membership modulation key management needsseveral exchanges per unit time for upholding forward andbackward secrecies [7]The securemulticasting is categorizedinto two types such as centralized and distributed schemeTheGroupController (GC) performs group keymanagementand only small loads are applied on the users of the group incase of centralized scheme For distributed scheme the keymanagement is performed by each user to reinforce the loadon the user [4]

2 Related Work

Chang and Kuo [8] have proposed a two-step secure authen-tication approach for multicast MANETs A Markov chaintrust model determines the Trust Value (TV) and the nodewith the highest TV is selected as CA server The securityanalysis guarantees that this approach achieves a secure reli-able authentication in multicast MANETs Numerical resultsshow that the analytical TV is very close to that of simulationunder various situations The speed of convergence of theanalytical TV shows that the analyzed result is independentof initial values and trust classes Huang and Medhi [9] haveprojected a secure group key management scheme for hier-archical mobile ad hoc networks to enhance each scalabilityand survivability of group key management for large-scalewireless ad hoc networks A multilevel security model and adecentralized group key management infrastructure to comeback through such amulti-level security model are projectedThis approach reduces the key management overhead andimproves resilience to any single point failure problem

Bouassida and Bouali [10] have introduced an evaluationmethod for group key management protocols (GKMP)Theyhave compared four main existing group key protocols

namely scalable and efficient group rekeying protocol (GKM-PAN) for ad hoc networks Distributed Multicast GroupSecurity Architecture (DMGSA) BALADE and Hierarchi-cal group key management protocol (Hi-GDH) In theabove approaches GKMPAN is an example for centralizedapproach DMGSA approach belongs to distributed typekey management scheme BALADE protocol and Hi-GDHstand for decentralized approach They have discussed theneed for performance evaluation of GKMPrsquos in the contextof MANETrsquos Lin et al [11] have proposed a new groupkey management protocol to reduce the communicationand computation overhead of group key rekeying caused bymembership changes The protocol can handle synchronousand asynchronous rekeying operations and a new 119896-nodeinsertion algorithm is designed to further optimize the keytree in batch update operationsWith strong encryption func-tion and key derivation function this protocol is provablysecure Simulation result shows that compared to LKH OFTand ELK SKD requires the least communication bandwidthand computation power and it is efficient with binary keytrees and asynchronous rekeying

3 Proposed Work

The proposed technique uses Link Quality (LQ) and Rep-utation of nodes to identify them as strong or weak nodesThemulticast tree constructed with secure communication isbased on the classified nodes and described in the subsectionsin detail

31 Estimating Received Signal Strength Here the proposedwork makes use of the Friis free space propagation model tomeasure the received signal strength value The received sig-nal strength (RSS) is computed using the following formula[12]

RSS = 120572 lowast 120579 lowast 119878tx (1)

where 120572 is a constant that relies on the wavelength and theantennas 120579 is the channel gain 119878tx is the signal power of thetransmitter

RSS can be expressed in terms of the dB and dBm (dBmilliWatts) as follows

RSS [dBm] = 10log10120572 + 120579 [dB] + 119878tx [dBm] (2)

311 Link Quality Link Quality (LQ) is estimated by ratio ofthe number of bits in error to the number of bits received (biterror rate) [13]

LQ =119887rx119887error

(3)

This value gets updated for every packet received at anode over a certain period It depends on parameters such asthe interference effect of the wireless channel additive whiteGaussian noise and signal transmission range

The Scientific World Journal 3

312 Stability Index Stability index (SI119894119895) is computed for

a link to a neighbor based on the received signal strengthmobility and link quality (using Sections 311 312 and 313)[13] SI

119894119895of a link between node 119894 and node 119895 is defined as

follows

SI119894119895=RSSLQ

(4)

313 Estimation of Reputation of Nodes Consider nodes 119894and 119895

The recent satisfaction index (119875119894119895) for node 119894 about node 119895

is computed as follows

119875119894119895= 119891 (119894 119895) minus 119890 (119894 119895) (5)

where 119891(119894 119895) is the percentage of packets originated from119894 that were forwarded by node 119895 over the total number ofpackets offered to node 119895

119890(119894 119895) is the percentage of packets that were expired overthe total number of packets offered to node 119895

Thus 119875119894119895can be considered as the direct reputation of

node 119895

Rep119894119895= Rep

119894119895-pr lowast119882hist + 119875119894119895lowast (1 minus119882hist) (6)

where Rep119894119895-prev is the reputation value that node 119894 had for

node 119895 before incorporating the most recent satisfactionindex

119882hist is a constant that reflects the level of confidence thatnode 119894 has in the past observed reputation for its neighbor 119895

The reputation index REP119894119895

is normalized using thefollowing equation

REP119894119895=

REP119894119895

max119905(REP119894119895) (7)

max119905is the function that reports the maximum observation

of REP119894119895over time [14]

32 Classifying the Nodes Thenodes are categorized into twotypes namely strong and weak nodes The steps involved inselecting the nodes are as follows

(1) Each node deployed in the network periodicallyexchanges a HELLO packet with its neighbor nodes

(2) By exchanging the hello packets every nodemeasuresthe RSS link quality and mobility119872

119895(119894) of its neigh-

bor nodes (explained in Sections 311 and 312)(3) Based on the measurement of RSS link quality and

119872119895(119894) each node computes the stability index (SI) of

its neighbor nodes (explained in Section 313) and thevalues are stored in the neighbor table (NT)

(4) The SI of each neighbor119873119894is checked such that

Let SIth be the predefined threshold value of StabilityIndexIf SI119894lt SIth

1

3

7

2

6

5

4

9

8 10

17

12

15

14

11

2013

1618

19

Strong nodes

Weak nodes

Figure 1 Selection of strong and weak nodes

ThenThe nodes are marked as weak nodes (119873119908119894) and

stored in NTElse The nodes are marked as strong nodes (119873

119904119894) and

stored in NTEnd if

For example consider the network in Figure 1 The nodes 78 15 and 16 are marked as strong nodes as their stabilityindex is greater than the threshold value Remaining nodesare marked as weak nodes as their stability index is less thanthe threshold value

33Multicast Tree Construction Themulticast tree construc-tion phase involves two phases

Phase 1 Each 119873119908119894

sends a child request message (CREQ) toeach predetermined strong neighbor (119873

119904119895) stored in NT

119873119908119894

CREQ997888997888997888997888rarr 119873

119904119895 (8)

Upon receiving the CREQ message 119873119904119895sends a child

reply message (CREP) to119873119908119894

119873119908119894

CREPlarr997888997888997888997888 119873

119904119895 (9)

Every 119873119908119894

upon receiving CREP joins with 119873119904119895as child

nodes and respective119873119904119895becomes the parent node Thus for

every weak node there is at least a strong parent 119873119904119895then

stores its child nodes information in a table

For example consider the network in Figure 2 The weaknodes 2 and 5 get attachedwith the strong node 7Thus nodes2 and 5 become the child nodes for the strong parent node7 In the similar manner other strong nodes 8 15 and 16chooses their child nodes

Phase 2 Amulticast tree can be constructed and maintainedusing the periodic ldquoJOIN TREErdquo messages

Each strong node119873119904119895periodically sends a ldquoJOIN TREErdquo

message to the multicast source 119878

119873119904119895

JOIN TREE997888997888997888997888997888997888997888997888rarr 119878 (10)

4 The Scientific World Journal

1

7

3

6

2

9 11

1715

4

5

8

1214

10

2013

1618

19

S

Figure 2 Phase 1 selection of child nodes

7 8 15 16

2 5 4 10 11

6 12 14 17

13 18 19

S

Figure 3 Multicast tree

119878 constructs a multicast tree consisting of the paths thatldquoJOIN TREErdquo pass through There is only one path from the119878 to each119873

119904119895of the multicast group

Figure 3 shows an example of amulticast tree constructedon a MANET The parent nodes 7 8 15 and 16 sendsJOIN TREE message to 119878 119878 constructs a multicast treeconsisting of the paths traversed by ldquoJOIN TREErdquo message

331 Secure Multicast Communication When any node 119873119894

wants to transmitmulticast data to destination119863 in a securedmanner it performs the following steps

(1) Initially 119873119894bounds the multicast data with hash

message authentication code (119876) for ensuring the dataintegrity which is represented as 119876(data)

(2) 119873119894and 119863 cooperatively compute the session key 119870

119894119863

and119873119894utilizes119870

119894119863to encrypt119876[data]This encrypted

data is represented as119870119894119863[119876(data)] Here the session

key is generated using Elliptic Curve Diffie-HellmanKey Management Agreement protocol (ECDH) [15]

(3) Every member node holds a group key GK119894119873119894again

encrypts119870119894119863[119876(data)] with GK

119894and it is represented

as GK119894119870119894119863[119876(data)] GK

119894is the multicast group key

where 119894 = 1 2 119899(4) When any node along the path 119873

119894-119863 receives the

GK119894119870119894[119876(data)] it decrypts the data using GK

119894

and encrypts it with GK119894again and forwards the

encrypted data

7

2 5

SGK7KN2S[Q(data)]

GK2KN2S[Q(data)]

Q(data)

Figure 4 Secure data transmission

(5) When 119863 receives the encrypted data it decrypts thedata using its respective GK

119894and session key119870

119894119863and

verifies the integrity of 119876(data)For example consider the network in Figure 4

The node1198732wants to transmit the data packet to 119878 The data

to be transmitted will be in the form 119876(data)Initially119873

2and 119878 cooperatively compute the session key

1198701198732119878

and 1198732encrypts 119876(data) with 119870

1198732119878which is repre-

sented as 1198701198732119878

[119876(data)] 1198732again encrypts 119870

1198732119878[119876(data)]

with group key GK2which is given as GK

21198701198732119878

[119876(data)]This encrypted data is forwarded to119873

7

1198737decrypts the data using the GK

2and encrypts again

with GK7and forwards it to 119878which will be in following form

GK71198701198732119878 [119876 (data)] (11)

When 119878 is receiving the encrypted data it decryptsthe information victimization GK

7and session key KN2S

and verifies the integrity of 119876(data) If any changes happenthroughout the transmissions the receiving node detects themodifications in real time by validating the 119876 The securedtransmission of information between a node and thereforethe supply is illustrated in Figure 4

34 Detection of Attacker Nodes When the data is notdelivered at a reliable rate and optimum path quality itis predicted that attack is detected The attack detectiontechnique depends on the capacity of 119868 to detect the differenceamong the predicted PDR (PrP) and recognized PDR (ReP)The estimation of PrP and ReP is as follows

PrP can be estimated from the Success Probability Prod-uct metric (SPP) at the concerned route

SPP for a path of 119899 links among 119878 and119863 is given by

SPP119878rarr119863

=

119894

prod

119894=1

SPP119894 (12)

where the metric for each link 119894 on the path is SPP119894= Prsucc

ReP of a route is determined by testing the continuityof the sequence number in received data packets That is by

The Scientific World Journal 5

dividing the number of received packets by the number ofpackets sent by the source over an interval of time

ReP in terms of performance of packet delivery is givenby the following equation

ReP =119875119903

119875119904

(13)

where 119875119903is the average number of packets received by all

receivers and 119875119904is the number of packets sent by the source

Even if the attacker nodes drop all data packets initiatornodes have the capacity to determine the ReP with theinclusion of the backup data packet authenticated by thesource

If |PrP minus ReP| gt 120578

ThenThe malicious behavior is detected by 119868 since theparticular route does not deliver the data at consistentlevel with optimal path qualityEnd if

341 Isolation of Attacker Nodes The steps involved in theisolation of attacker nodes are as follows

Step 1 While detecting themalicious behavior it temporarilyrecriminates the suspicious node by flooding a failure noticein the network that includes ID of recriminated and recrimi-nator nodes and the period of recrimination

Step 2 Until the recrimination is valid metrics broadcastedby the recriminated node will not be taken into account andwill be discarded during routing process

Step 3 In case of transient network variations the temporaryrecrimination scheme is taken into consideration

Step 4 In temporary recrimination strategy initially thetime period of recrimination is computed in relative to theobserved difference among PrP and ReP This is performedwith the intention that the recriminations caused by increaseinmetric values aswell asmalicious data dropping rate retainsfor longer duration than the recriminations caused by thetransient network variations

Step 5 In order to avoid the recrimination caused by attack-ers a node is not permitted to announce a new recriminationprior to the expiry of the already announced recrimination

Step 6 If the best metric is broadcasted by a recriminatednode

Then the initiator node activates the recriminated nodein addition to the best nonrecriminated node

Step 6 reveals that the valid paths can still be utilized inspite of false recrimination of the strong nodes

35 Rekeying Technique Among the chosen119873119904119895 some nodes

have to be designated as initiators which initiates the

Rkyint Rkymin Rkymax Rkyt

Figure 5 Rekeying time interval

re-process In this section suppose that initiators are selectedby centralized node considering reputation index (RI) ofnodes The initiators are selected based on the RI of nodes(explained in Section 313)

The direct reputation of node119873119904119895is given as

Rep119908119904

= Rep119908119904-pr lowast 119911 + 119875

119908119904lowast (1 minus 119911) (14)

where Rep119908119904-pr is the reputation value of 119873

119904119895contained in

119873119908119894prior to the addition of recent satisfaction index 119911 is the

constant that replicates the level of confidence possessed by119873119908119894

for its 119873119904119895 119875119908119904

is the recent satisfaction index for 119873119908119894

about119873119904119895

Thus119873119904119895with high Rep

119908119904values are selected as initiators

The selected initiator starts the rekeying process periodicallyusing the rekeying interval Rkyint Rkyint is the fixed param-eter and rekeying procedure is demonstrated as follows

Let Rkyint be the initial timeLet Rkymax represent the maximum thresholds forrekeying intervalLet Rkymin indicate the minimum thresholds forrekeying intervalLet Rky

119905represent the stop time

According to the rekeying interval rekeying process isperformed using the following cases Figure 5 shows therekeying time interval

Case 1If Rkyint gt Rkymin

thenthe rekeying is performed for requested weaknodes from NT by the initiator

End if

Case 2If Rkyint gt Rkymax

thenthe rekeying is performed for requested strongnodes from NT by the initiator

End if

Case 3If Rkyint = Rky

119905

ThenRekeying is stopped and the timer is refreshedto start the new session

End if

6 The Scientific World Journal

The rekeying is performed in the weak node withinminimum rekeying interval since they possess minimumstability index which causes them to frequently join orleave the network In the strong nodes rekeying is per-formed at the maximum rekeying interval since they havemaximum stability index and their possibility to join orleave the network is less This periodic rekeying reduces therepeated rekeying process that further reduces the overheadIn rekeying technique the multicast group key (GK

119894) is

rekeyed considering the three cases given aboveThe rekeyingalgorithm functions as follows [16]

According to the cases given above rekeying processis triggered Initially node 119873

119894performs the ECDH key

management agreement from leaf node to the source ofmulticast tree to obtain subgroup key cooperatively as

119870119873119894

+ 119870119873119894+1

+ sdot sdot sdot + 119870119873119899minus1

119875 (15)

Here 119870119873119894

is the leaf node 119870119873119899minus1

is the source and 119875 isthe key generator in Diffe-Hellman Finally the generatedsubgroup chain reaches the source and it computes the newgroup key for the groupOnce the new group key is generatedby the source it unicasts it to the members securely

Considering the tree structure given in Figure 4 node1198732

and1198735are leaf nodes119873

7is the parent node of nodes 2 and 5

and 119878 is themulticast source Assume1198732invokes the rekeying

process and then the sequential process of rekeying is givenbelow

Step 1 1198732generates subgroup key as 119870

1198732+ 1198701198735119875 and

transmits to1198737

Step 2 Node1198737computes the subgroup key as 119870

1198732+ 1198701198735

+

1198701198737119875 and forwards to the source

Step 3 Finally the source computes cooperative subgroupkey as119870

1198732+1198701198735

+1198701198737

+119870119878119875 and then generates new group

key as1198701015840119894the source then unicasts the new group key securely

to its member nodes

4 Simulation Results

The proposed technique was simulated under different sce-narios using varying number of receivers and varying themobility of the nodes

41 Simulation Model and Parameters To analyze the per-formance of the proposed work NS2 [17] was used In oursimulation the channel capacity of mobile hosts is set tothe same value 2Mbps We use the distributed coordinationfunction (DCF) of IEEE 80211 for wireless LANs as theMAClayer protocol For multicasting we used Multicast AODV(MAODV) [16] routing protocol Simulations were carriedout in 1500 meter times 1500 meter region for 50 seconds simu-lation timeWe assume each node moves independently withthe same average speed All nodes have the same transmissionrange of 250 meters In our simulation the speed variedfrom 5 to 25ms and performance measured The simulatedtraffic is Constant Bit Rate (CBR) In this simulation we

Table 1 Simulation parameters

Number of receiver nodes 10 20 30 40 50Area size 1500 times 1500Mac 80211Radio range 250mSimulation time 50 secTraffic source CBRRate 250KbMobility model Random way pointSpeed 5 10 15 20 and 25

consider both the node capture and insider attacks In nodecapture attack a malicious attacker steals the credentials andsecret keys from the legitimate nodes An insider attacker is amalicious authenticated group member which may intimatefalse trust relations and injects false trust reporting It mayalso inject packets 119899 the network to disturb communicationsand consume the network resources Our simulation settingsand parameters are summarized in Table 1

42 Performance Metrics We compare our Mobility BasedKey Management Technique (MBKM) with the traditionalGKMPAN [10] and efficient clustering scheme for groupkey management (ECGK) [18] We evaluate mainly theperformance according to the following metrics

Average Packet Delivery Ratio It is the ratio of the number ofpackets received successfully and the total number of packetssent

Overhead It is the control overhead (in terms of packets)occurred in keying and rekeying operations

Packet Drop It is the average number of packets dropped ateach receiver

Detection Accuracy It is the ratio of number of attacksdetected to the number of attacks performed

Resilience It is the ratio of fraction of data compromised tothe fraction of nodes compromised

421 Based on Receivers In our first experiment we vary thenumber of receivers per group as 10 20 30 40 and 50 withspeed 5ms

(i) Comparison with GKMPAN The proposed MBKM tech-nique is compared with GKMPAN and the above perfor-mance metrics are evaluated by varying the group size

Figures 6 and 8 present the packet delivery ratio andpacket drop of both techniques respectively when the groupsize is increased from 10 to 50 From the figure we cansee that MBKM has 89 less packet drop than the existingGKMPAN techniques since it assures high reliability usingthe strong nodes Because of this reduced packet drop thedelivery ratio of the proposed MBKM is 2357 higherthan the GKMPAN technique Figure 7 presents the control

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World Journal 3

312 Stability Index Stability index (SI119894119895) is computed for

a link to a neighbor based on the received signal strengthmobility and link quality (using Sections 311 312 and 313)[13] SI

119894119895of a link between node 119894 and node 119895 is defined as

follows

SI119894119895=RSSLQ

(4)

313 Estimation of Reputation of Nodes Consider nodes 119894and 119895

The recent satisfaction index (119875119894119895) for node 119894 about node 119895

is computed as follows

119875119894119895= 119891 (119894 119895) minus 119890 (119894 119895) (5)

where 119891(119894 119895) is the percentage of packets originated from119894 that were forwarded by node 119895 over the total number ofpackets offered to node 119895

119890(119894 119895) is the percentage of packets that were expired overthe total number of packets offered to node 119895

Thus 119875119894119895can be considered as the direct reputation of

node 119895

Rep119894119895= Rep

119894119895-pr lowast119882hist + 119875119894119895lowast (1 minus119882hist) (6)

where Rep119894119895-prev is the reputation value that node 119894 had for

node 119895 before incorporating the most recent satisfactionindex

119882hist is a constant that reflects the level of confidence thatnode 119894 has in the past observed reputation for its neighbor 119895

The reputation index REP119894119895

is normalized using thefollowing equation

REP119894119895=

REP119894119895

max119905(REP119894119895) (7)

max119905is the function that reports the maximum observation

of REP119894119895over time [14]

32 Classifying the Nodes Thenodes are categorized into twotypes namely strong and weak nodes The steps involved inselecting the nodes are as follows

(1) Each node deployed in the network periodicallyexchanges a HELLO packet with its neighbor nodes

(2) By exchanging the hello packets every nodemeasuresthe RSS link quality and mobility119872

119895(119894) of its neigh-

bor nodes (explained in Sections 311 and 312)(3) Based on the measurement of RSS link quality and

119872119895(119894) each node computes the stability index (SI) of

its neighbor nodes (explained in Section 313) and thevalues are stored in the neighbor table (NT)

(4) The SI of each neighbor119873119894is checked such that

Let SIth be the predefined threshold value of StabilityIndexIf SI119894lt SIth

1

3

7

2

6

5

4

9

8 10

17

12

15

14

11

2013

1618

19

Strong nodes

Weak nodes

Figure 1 Selection of strong and weak nodes

ThenThe nodes are marked as weak nodes (119873119908119894) and

stored in NTElse The nodes are marked as strong nodes (119873

119904119894) and

stored in NTEnd if

For example consider the network in Figure 1 The nodes 78 15 and 16 are marked as strong nodes as their stabilityindex is greater than the threshold value Remaining nodesare marked as weak nodes as their stability index is less thanthe threshold value

33Multicast Tree Construction Themulticast tree construc-tion phase involves two phases

Phase 1 Each 119873119908119894

sends a child request message (CREQ) toeach predetermined strong neighbor (119873

119904119895) stored in NT

119873119908119894

CREQ997888997888997888997888rarr 119873

119904119895 (8)

Upon receiving the CREQ message 119873119904119895sends a child

reply message (CREP) to119873119908119894

119873119908119894

CREPlarr997888997888997888997888 119873

119904119895 (9)

Every 119873119908119894

upon receiving CREP joins with 119873119904119895as child

nodes and respective119873119904119895becomes the parent node Thus for

every weak node there is at least a strong parent 119873119904119895then

stores its child nodes information in a table

For example consider the network in Figure 2 The weaknodes 2 and 5 get attachedwith the strong node 7Thus nodes2 and 5 become the child nodes for the strong parent node7 In the similar manner other strong nodes 8 15 and 16chooses their child nodes

Phase 2 Amulticast tree can be constructed and maintainedusing the periodic ldquoJOIN TREErdquo messages

Each strong node119873119904119895periodically sends a ldquoJOIN TREErdquo

message to the multicast source 119878

119873119904119895

JOIN TREE997888997888997888997888997888997888997888997888rarr 119878 (10)

4 The Scientific World Journal

1

7

3

6

2

9 11

1715

4

5

8

1214

10

2013

1618

19

S

Figure 2 Phase 1 selection of child nodes

7 8 15 16

2 5 4 10 11

6 12 14 17

13 18 19

S

Figure 3 Multicast tree

119878 constructs a multicast tree consisting of the paths thatldquoJOIN TREErdquo pass through There is only one path from the119878 to each119873

119904119895of the multicast group

Figure 3 shows an example of amulticast tree constructedon a MANET The parent nodes 7 8 15 and 16 sendsJOIN TREE message to 119878 119878 constructs a multicast treeconsisting of the paths traversed by ldquoJOIN TREErdquo message

331 Secure Multicast Communication When any node 119873119894

wants to transmitmulticast data to destination119863 in a securedmanner it performs the following steps

(1) Initially 119873119894bounds the multicast data with hash

message authentication code (119876) for ensuring the dataintegrity which is represented as 119876(data)

(2) 119873119894and 119863 cooperatively compute the session key 119870

119894119863

and119873119894utilizes119870

119894119863to encrypt119876[data]This encrypted

data is represented as119870119894119863[119876(data)] Here the session

key is generated using Elliptic Curve Diffie-HellmanKey Management Agreement protocol (ECDH) [15]

(3) Every member node holds a group key GK119894119873119894again

encrypts119870119894119863[119876(data)] with GK

119894and it is represented

as GK119894119870119894119863[119876(data)] GK

119894is the multicast group key

where 119894 = 1 2 119899(4) When any node along the path 119873

119894-119863 receives the

GK119894119870119894[119876(data)] it decrypts the data using GK

119894

and encrypts it with GK119894again and forwards the

encrypted data

7

2 5

SGK7KN2S[Q(data)]

GK2KN2S[Q(data)]

Q(data)

Figure 4 Secure data transmission

(5) When 119863 receives the encrypted data it decrypts thedata using its respective GK

119894and session key119870

119894119863and

verifies the integrity of 119876(data)For example consider the network in Figure 4

The node1198732wants to transmit the data packet to 119878 The data

to be transmitted will be in the form 119876(data)Initially119873

2and 119878 cooperatively compute the session key

1198701198732119878

and 1198732encrypts 119876(data) with 119870

1198732119878which is repre-

sented as 1198701198732119878

[119876(data)] 1198732again encrypts 119870

1198732119878[119876(data)]

with group key GK2which is given as GK

21198701198732119878

[119876(data)]This encrypted data is forwarded to119873

7

1198737decrypts the data using the GK

2and encrypts again

with GK7and forwards it to 119878which will be in following form

GK71198701198732119878 [119876 (data)] (11)

When 119878 is receiving the encrypted data it decryptsthe information victimization GK

7and session key KN2S

and verifies the integrity of 119876(data) If any changes happenthroughout the transmissions the receiving node detects themodifications in real time by validating the 119876 The securedtransmission of information between a node and thereforethe supply is illustrated in Figure 4

34 Detection of Attacker Nodes When the data is notdelivered at a reliable rate and optimum path quality itis predicted that attack is detected The attack detectiontechnique depends on the capacity of 119868 to detect the differenceamong the predicted PDR (PrP) and recognized PDR (ReP)The estimation of PrP and ReP is as follows

PrP can be estimated from the Success Probability Prod-uct metric (SPP) at the concerned route

SPP for a path of 119899 links among 119878 and119863 is given by

SPP119878rarr119863

=

119894

prod

119894=1

SPP119894 (12)

where the metric for each link 119894 on the path is SPP119894= Prsucc

ReP of a route is determined by testing the continuityof the sequence number in received data packets That is by

The Scientific World Journal 5

dividing the number of received packets by the number ofpackets sent by the source over an interval of time

ReP in terms of performance of packet delivery is givenby the following equation

ReP =119875119903

119875119904

(13)

where 119875119903is the average number of packets received by all

receivers and 119875119904is the number of packets sent by the source

Even if the attacker nodes drop all data packets initiatornodes have the capacity to determine the ReP with theinclusion of the backup data packet authenticated by thesource

If |PrP minus ReP| gt 120578

ThenThe malicious behavior is detected by 119868 since theparticular route does not deliver the data at consistentlevel with optimal path qualityEnd if

341 Isolation of Attacker Nodes The steps involved in theisolation of attacker nodes are as follows

Step 1 While detecting themalicious behavior it temporarilyrecriminates the suspicious node by flooding a failure noticein the network that includes ID of recriminated and recrimi-nator nodes and the period of recrimination

Step 2 Until the recrimination is valid metrics broadcastedby the recriminated node will not be taken into account andwill be discarded during routing process

Step 3 In case of transient network variations the temporaryrecrimination scheme is taken into consideration

Step 4 In temporary recrimination strategy initially thetime period of recrimination is computed in relative to theobserved difference among PrP and ReP This is performedwith the intention that the recriminations caused by increaseinmetric values aswell asmalicious data dropping rate retainsfor longer duration than the recriminations caused by thetransient network variations

Step 5 In order to avoid the recrimination caused by attack-ers a node is not permitted to announce a new recriminationprior to the expiry of the already announced recrimination

Step 6 If the best metric is broadcasted by a recriminatednode

Then the initiator node activates the recriminated nodein addition to the best nonrecriminated node

Step 6 reveals that the valid paths can still be utilized inspite of false recrimination of the strong nodes

35 Rekeying Technique Among the chosen119873119904119895 some nodes

have to be designated as initiators which initiates the

Rkyint Rkymin Rkymax Rkyt

Figure 5 Rekeying time interval

re-process In this section suppose that initiators are selectedby centralized node considering reputation index (RI) ofnodes The initiators are selected based on the RI of nodes(explained in Section 313)

The direct reputation of node119873119904119895is given as

Rep119908119904

= Rep119908119904-pr lowast 119911 + 119875

119908119904lowast (1 minus 119911) (14)

where Rep119908119904-pr is the reputation value of 119873

119904119895contained in

119873119908119894prior to the addition of recent satisfaction index 119911 is the

constant that replicates the level of confidence possessed by119873119908119894

for its 119873119904119895 119875119908119904

is the recent satisfaction index for 119873119908119894

about119873119904119895

Thus119873119904119895with high Rep

119908119904values are selected as initiators

The selected initiator starts the rekeying process periodicallyusing the rekeying interval Rkyint Rkyint is the fixed param-eter and rekeying procedure is demonstrated as follows

Let Rkyint be the initial timeLet Rkymax represent the maximum thresholds forrekeying intervalLet Rkymin indicate the minimum thresholds forrekeying intervalLet Rky

119905represent the stop time

According to the rekeying interval rekeying process isperformed using the following cases Figure 5 shows therekeying time interval

Case 1If Rkyint gt Rkymin

thenthe rekeying is performed for requested weaknodes from NT by the initiator

End if

Case 2If Rkyint gt Rkymax

thenthe rekeying is performed for requested strongnodes from NT by the initiator

End if

Case 3If Rkyint = Rky

119905

ThenRekeying is stopped and the timer is refreshedto start the new session

End if

6 The Scientific World Journal

The rekeying is performed in the weak node withinminimum rekeying interval since they possess minimumstability index which causes them to frequently join orleave the network In the strong nodes rekeying is per-formed at the maximum rekeying interval since they havemaximum stability index and their possibility to join orleave the network is less This periodic rekeying reduces therepeated rekeying process that further reduces the overheadIn rekeying technique the multicast group key (GK

119894) is

rekeyed considering the three cases given aboveThe rekeyingalgorithm functions as follows [16]

According to the cases given above rekeying processis triggered Initially node 119873

119894performs the ECDH key

management agreement from leaf node to the source ofmulticast tree to obtain subgroup key cooperatively as

119870119873119894

+ 119870119873119894+1

+ sdot sdot sdot + 119870119873119899minus1

119875 (15)

Here 119870119873119894

is the leaf node 119870119873119899minus1

is the source and 119875 isthe key generator in Diffe-Hellman Finally the generatedsubgroup chain reaches the source and it computes the newgroup key for the groupOnce the new group key is generatedby the source it unicasts it to the members securely

Considering the tree structure given in Figure 4 node1198732

and1198735are leaf nodes119873

7is the parent node of nodes 2 and 5

and 119878 is themulticast source Assume1198732invokes the rekeying

process and then the sequential process of rekeying is givenbelow

Step 1 1198732generates subgroup key as 119870

1198732+ 1198701198735119875 and

transmits to1198737

Step 2 Node1198737computes the subgroup key as 119870

1198732+ 1198701198735

+

1198701198737119875 and forwards to the source

Step 3 Finally the source computes cooperative subgroupkey as119870

1198732+1198701198735

+1198701198737

+119870119878119875 and then generates new group

key as1198701015840119894the source then unicasts the new group key securely

to its member nodes

4 Simulation Results

The proposed technique was simulated under different sce-narios using varying number of receivers and varying themobility of the nodes

41 Simulation Model and Parameters To analyze the per-formance of the proposed work NS2 [17] was used In oursimulation the channel capacity of mobile hosts is set tothe same value 2Mbps We use the distributed coordinationfunction (DCF) of IEEE 80211 for wireless LANs as theMAClayer protocol For multicasting we used Multicast AODV(MAODV) [16] routing protocol Simulations were carriedout in 1500 meter times 1500 meter region for 50 seconds simu-lation timeWe assume each node moves independently withthe same average speed All nodes have the same transmissionrange of 250 meters In our simulation the speed variedfrom 5 to 25ms and performance measured The simulatedtraffic is Constant Bit Rate (CBR) In this simulation we

Table 1 Simulation parameters

Number of receiver nodes 10 20 30 40 50Area size 1500 times 1500Mac 80211Radio range 250mSimulation time 50 secTraffic source CBRRate 250KbMobility model Random way pointSpeed 5 10 15 20 and 25

consider both the node capture and insider attacks In nodecapture attack a malicious attacker steals the credentials andsecret keys from the legitimate nodes An insider attacker is amalicious authenticated group member which may intimatefalse trust relations and injects false trust reporting It mayalso inject packets 119899 the network to disturb communicationsand consume the network resources Our simulation settingsand parameters are summarized in Table 1

42 Performance Metrics We compare our Mobility BasedKey Management Technique (MBKM) with the traditionalGKMPAN [10] and efficient clustering scheme for groupkey management (ECGK) [18] We evaluate mainly theperformance according to the following metrics

Average Packet Delivery Ratio It is the ratio of the number ofpackets received successfully and the total number of packetssent

Overhead It is the control overhead (in terms of packets)occurred in keying and rekeying operations

Packet Drop It is the average number of packets dropped ateach receiver

Detection Accuracy It is the ratio of number of attacksdetected to the number of attacks performed

Resilience It is the ratio of fraction of data compromised tothe fraction of nodes compromised

421 Based on Receivers In our first experiment we vary thenumber of receivers per group as 10 20 30 40 and 50 withspeed 5ms

(i) Comparison with GKMPAN The proposed MBKM tech-nique is compared with GKMPAN and the above perfor-mance metrics are evaluated by varying the group size

Figures 6 and 8 present the packet delivery ratio andpacket drop of both techniques respectively when the groupsize is increased from 10 to 50 From the figure we cansee that MBKM has 89 less packet drop than the existingGKMPAN techniques since it assures high reliability usingthe strong nodes Because of this reduced packet drop thedelivery ratio of the proposed MBKM is 2357 higherthan the GKMPAN technique Figure 7 presents the control

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

4 The Scientific World Journal

1

7

3

6

2

9 11

1715

4

5

8

1214

10

2013

1618

19

S

Figure 2 Phase 1 selection of child nodes

7 8 15 16

2 5 4 10 11

6 12 14 17

13 18 19

S

Figure 3 Multicast tree

119878 constructs a multicast tree consisting of the paths thatldquoJOIN TREErdquo pass through There is only one path from the119878 to each119873

119904119895of the multicast group

Figure 3 shows an example of amulticast tree constructedon a MANET The parent nodes 7 8 15 and 16 sendsJOIN TREE message to 119878 119878 constructs a multicast treeconsisting of the paths traversed by ldquoJOIN TREErdquo message

331 Secure Multicast Communication When any node 119873119894

wants to transmitmulticast data to destination119863 in a securedmanner it performs the following steps

(1) Initially 119873119894bounds the multicast data with hash

message authentication code (119876) for ensuring the dataintegrity which is represented as 119876(data)

(2) 119873119894and 119863 cooperatively compute the session key 119870

119894119863

and119873119894utilizes119870

119894119863to encrypt119876[data]This encrypted

data is represented as119870119894119863[119876(data)] Here the session

key is generated using Elliptic Curve Diffie-HellmanKey Management Agreement protocol (ECDH) [15]

(3) Every member node holds a group key GK119894119873119894again

encrypts119870119894119863[119876(data)] with GK

119894and it is represented

as GK119894119870119894119863[119876(data)] GK

119894is the multicast group key

where 119894 = 1 2 119899(4) When any node along the path 119873

119894-119863 receives the

GK119894119870119894[119876(data)] it decrypts the data using GK

119894

and encrypts it with GK119894again and forwards the

encrypted data

7

2 5

SGK7KN2S[Q(data)]

GK2KN2S[Q(data)]

Q(data)

Figure 4 Secure data transmission

(5) When 119863 receives the encrypted data it decrypts thedata using its respective GK

119894and session key119870

119894119863and

verifies the integrity of 119876(data)For example consider the network in Figure 4

The node1198732wants to transmit the data packet to 119878 The data

to be transmitted will be in the form 119876(data)Initially119873

2and 119878 cooperatively compute the session key

1198701198732119878

and 1198732encrypts 119876(data) with 119870

1198732119878which is repre-

sented as 1198701198732119878

[119876(data)] 1198732again encrypts 119870

1198732119878[119876(data)]

with group key GK2which is given as GK

21198701198732119878

[119876(data)]This encrypted data is forwarded to119873

7

1198737decrypts the data using the GK

2and encrypts again

with GK7and forwards it to 119878which will be in following form

GK71198701198732119878 [119876 (data)] (11)

When 119878 is receiving the encrypted data it decryptsthe information victimization GK

7and session key KN2S

and verifies the integrity of 119876(data) If any changes happenthroughout the transmissions the receiving node detects themodifications in real time by validating the 119876 The securedtransmission of information between a node and thereforethe supply is illustrated in Figure 4

34 Detection of Attacker Nodes When the data is notdelivered at a reliable rate and optimum path quality itis predicted that attack is detected The attack detectiontechnique depends on the capacity of 119868 to detect the differenceamong the predicted PDR (PrP) and recognized PDR (ReP)The estimation of PrP and ReP is as follows

PrP can be estimated from the Success Probability Prod-uct metric (SPP) at the concerned route

SPP for a path of 119899 links among 119878 and119863 is given by

SPP119878rarr119863

=

119894

prod

119894=1

SPP119894 (12)

where the metric for each link 119894 on the path is SPP119894= Prsucc

ReP of a route is determined by testing the continuityof the sequence number in received data packets That is by

The Scientific World Journal 5

dividing the number of received packets by the number ofpackets sent by the source over an interval of time

ReP in terms of performance of packet delivery is givenby the following equation

ReP =119875119903

119875119904

(13)

where 119875119903is the average number of packets received by all

receivers and 119875119904is the number of packets sent by the source

Even if the attacker nodes drop all data packets initiatornodes have the capacity to determine the ReP with theinclusion of the backup data packet authenticated by thesource

If |PrP minus ReP| gt 120578

ThenThe malicious behavior is detected by 119868 since theparticular route does not deliver the data at consistentlevel with optimal path qualityEnd if

341 Isolation of Attacker Nodes The steps involved in theisolation of attacker nodes are as follows

Step 1 While detecting themalicious behavior it temporarilyrecriminates the suspicious node by flooding a failure noticein the network that includes ID of recriminated and recrimi-nator nodes and the period of recrimination

Step 2 Until the recrimination is valid metrics broadcastedby the recriminated node will not be taken into account andwill be discarded during routing process

Step 3 In case of transient network variations the temporaryrecrimination scheme is taken into consideration

Step 4 In temporary recrimination strategy initially thetime period of recrimination is computed in relative to theobserved difference among PrP and ReP This is performedwith the intention that the recriminations caused by increaseinmetric values aswell asmalicious data dropping rate retainsfor longer duration than the recriminations caused by thetransient network variations

Step 5 In order to avoid the recrimination caused by attack-ers a node is not permitted to announce a new recriminationprior to the expiry of the already announced recrimination

Step 6 If the best metric is broadcasted by a recriminatednode

Then the initiator node activates the recriminated nodein addition to the best nonrecriminated node

Step 6 reveals that the valid paths can still be utilized inspite of false recrimination of the strong nodes

35 Rekeying Technique Among the chosen119873119904119895 some nodes

have to be designated as initiators which initiates the

Rkyint Rkymin Rkymax Rkyt

Figure 5 Rekeying time interval

re-process In this section suppose that initiators are selectedby centralized node considering reputation index (RI) ofnodes The initiators are selected based on the RI of nodes(explained in Section 313)

The direct reputation of node119873119904119895is given as

Rep119908119904

= Rep119908119904-pr lowast 119911 + 119875

119908119904lowast (1 minus 119911) (14)

where Rep119908119904-pr is the reputation value of 119873

119904119895contained in

119873119908119894prior to the addition of recent satisfaction index 119911 is the

constant that replicates the level of confidence possessed by119873119908119894

for its 119873119904119895 119875119908119904

is the recent satisfaction index for 119873119908119894

about119873119904119895

Thus119873119904119895with high Rep

119908119904values are selected as initiators

The selected initiator starts the rekeying process periodicallyusing the rekeying interval Rkyint Rkyint is the fixed param-eter and rekeying procedure is demonstrated as follows

Let Rkyint be the initial timeLet Rkymax represent the maximum thresholds forrekeying intervalLet Rkymin indicate the minimum thresholds forrekeying intervalLet Rky

119905represent the stop time

According to the rekeying interval rekeying process isperformed using the following cases Figure 5 shows therekeying time interval

Case 1If Rkyint gt Rkymin

thenthe rekeying is performed for requested weaknodes from NT by the initiator

End if

Case 2If Rkyint gt Rkymax

thenthe rekeying is performed for requested strongnodes from NT by the initiator

End if

Case 3If Rkyint = Rky

119905

ThenRekeying is stopped and the timer is refreshedto start the new session

End if

6 The Scientific World Journal

The rekeying is performed in the weak node withinminimum rekeying interval since they possess minimumstability index which causes them to frequently join orleave the network In the strong nodes rekeying is per-formed at the maximum rekeying interval since they havemaximum stability index and their possibility to join orleave the network is less This periodic rekeying reduces therepeated rekeying process that further reduces the overheadIn rekeying technique the multicast group key (GK

119894) is

rekeyed considering the three cases given aboveThe rekeyingalgorithm functions as follows [16]

According to the cases given above rekeying processis triggered Initially node 119873

119894performs the ECDH key

management agreement from leaf node to the source ofmulticast tree to obtain subgroup key cooperatively as

119870119873119894

+ 119870119873119894+1

+ sdot sdot sdot + 119870119873119899minus1

119875 (15)

Here 119870119873119894

is the leaf node 119870119873119899minus1

is the source and 119875 isthe key generator in Diffe-Hellman Finally the generatedsubgroup chain reaches the source and it computes the newgroup key for the groupOnce the new group key is generatedby the source it unicasts it to the members securely

Considering the tree structure given in Figure 4 node1198732

and1198735are leaf nodes119873

7is the parent node of nodes 2 and 5

and 119878 is themulticast source Assume1198732invokes the rekeying

process and then the sequential process of rekeying is givenbelow

Step 1 1198732generates subgroup key as 119870

1198732+ 1198701198735119875 and

transmits to1198737

Step 2 Node1198737computes the subgroup key as 119870

1198732+ 1198701198735

+

1198701198737119875 and forwards to the source

Step 3 Finally the source computes cooperative subgroupkey as119870

1198732+1198701198735

+1198701198737

+119870119878119875 and then generates new group

key as1198701015840119894the source then unicasts the new group key securely

to its member nodes

4 Simulation Results

The proposed technique was simulated under different sce-narios using varying number of receivers and varying themobility of the nodes

41 Simulation Model and Parameters To analyze the per-formance of the proposed work NS2 [17] was used In oursimulation the channel capacity of mobile hosts is set tothe same value 2Mbps We use the distributed coordinationfunction (DCF) of IEEE 80211 for wireless LANs as theMAClayer protocol For multicasting we used Multicast AODV(MAODV) [16] routing protocol Simulations were carriedout in 1500 meter times 1500 meter region for 50 seconds simu-lation timeWe assume each node moves independently withthe same average speed All nodes have the same transmissionrange of 250 meters In our simulation the speed variedfrom 5 to 25ms and performance measured The simulatedtraffic is Constant Bit Rate (CBR) In this simulation we

Table 1 Simulation parameters

Number of receiver nodes 10 20 30 40 50Area size 1500 times 1500Mac 80211Radio range 250mSimulation time 50 secTraffic source CBRRate 250KbMobility model Random way pointSpeed 5 10 15 20 and 25

consider both the node capture and insider attacks In nodecapture attack a malicious attacker steals the credentials andsecret keys from the legitimate nodes An insider attacker is amalicious authenticated group member which may intimatefalse trust relations and injects false trust reporting It mayalso inject packets 119899 the network to disturb communicationsand consume the network resources Our simulation settingsand parameters are summarized in Table 1

42 Performance Metrics We compare our Mobility BasedKey Management Technique (MBKM) with the traditionalGKMPAN [10] and efficient clustering scheme for groupkey management (ECGK) [18] We evaluate mainly theperformance according to the following metrics

Average Packet Delivery Ratio It is the ratio of the number ofpackets received successfully and the total number of packetssent

Overhead It is the control overhead (in terms of packets)occurred in keying and rekeying operations

Packet Drop It is the average number of packets dropped ateach receiver

Detection Accuracy It is the ratio of number of attacksdetected to the number of attacks performed

Resilience It is the ratio of fraction of data compromised tothe fraction of nodes compromised

421 Based on Receivers In our first experiment we vary thenumber of receivers per group as 10 20 30 40 and 50 withspeed 5ms

(i) Comparison with GKMPAN The proposed MBKM tech-nique is compared with GKMPAN and the above perfor-mance metrics are evaluated by varying the group size

Figures 6 and 8 present the packet delivery ratio andpacket drop of both techniques respectively when the groupsize is increased from 10 to 50 From the figure we cansee that MBKM has 89 less packet drop than the existingGKMPAN techniques since it assures high reliability usingthe strong nodes Because of this reduced packet drop thedelivery ratio of the proposed MBKM is 2357 higherthan the GKMPAN technique Figure 7 presents the control

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World Journal 5

dividing the number of received packets by the number ofpackets sent by the source over an interval of time

ReP in terms of performance of packet delivery is givenby the following equation

ReP =119875119903

119875119904

(13)

where 119875119903is the average number of packets received by all

receivers and 119875119904is the number of packets sent by the source

Even if the attacker nodes drop all data packets initiatornodes have the capacity to determine the ReP with theinclusion of the backup data packet authenticated by thesource

If |PrP minus ReP| gt 120578

ThenThe malicious behavior is detected by 119868 since theparticular route does not deliver the data at consistentlevel with optimal path qualityEnd if

341 Isolation of Attacker Nodes The steps involved in theisolation of attacker nodes are as follows

Step 1 While detecting themalicious behavior it temporarilyrecriminates the suspicious node by flooding a failure noticein the network that includes ID of recriminated and recrimi-nator nodes and the period of recrimination

Step 2 Until the recrimination is valid metrics broadcastedby the recriminated node will not be taken into account andwill be discarded during routing process

Step 3 In case of transient network variations the temporaryrecrimination scheme is taken into consideration

Step 4 In temporary recrimination strategy initially thetime period of recrimination is computed in relative to theobserved difference among PrP and ReP This is performedwith the intention that the recriminations caused by increaseinmetric values aswell asmalicious data dropping rate retainsfor longer duration than the recriminations caused by thetransient network variations

Step 5 In order to avoid the recrimination caused by attack-ers a node is not permitted to announce a new recriminationprior to the expiry of the already announced recrimination

Step 6 If the best metric is broadcasted by a recriminatednode

Then the initiator node activates the recriminated nodein addition to the best nonrecriminated node

Step 6 reveals that the valid paths can still be utilized inspite of false recrimination of the strong nodes

35 Rekeying Technique Among the chosen119873119904119895 some nodes

have to be designated as initiators which initiates the

Rkyint Rkymin Rkymax Rkyt

Figure 5 Rekeying time interval

re-process In this section suppose that initiators are selectedby centralized node considering reputation index (RI) ofnodes The initiators are selected based on the RI of nodes(explained in Section 313)

The direct reputation of node119873119904119895is given as

Rep119908119904

= Rep119908119904-pr lowast 119911 + 119875

119908119904lowast (1 minus 119911) (14)

where Rep119908119904-pr is the reputation value of 119873

119904119895contained in

119873119908119894prior to the addition of recent satisfaction index 119911 is the

constant that replicates the level of confidence possessed by119873119908119894

for its 119873119904119895 119875119908119904

is the recent satisfaction index for 119873119908119894

about119873119904119895

Thus119873119904119895with high Rep

119908119904values are selected as initiators

The selected initiator starts the rekeying process periodicallyusing the rekeying interval Rkyint Rkyint is the fixed param-eter and rekeying procedure is demonstrated as follows

Let Rkyint be the initial timeLet Rkymax represent the maximum thresholds forrekeying intervalLet Rkymin indicate the minimum thresholds forrekeying intervalLet Rky

119905represent the stop time

According to the rekeying interval rekeying process isperformed using the following cases Figure 5 shows therekeying time interval

Case 1If Rkyint gt Rkymin

thenthe rekeying is performed for requested weaknodes from NT by the initiator

End if

Case 2If Rkyint gt Rkymax

thenthe rekeying is performed for requested strongnodes from NT by the initiator

End if

Case 3If Rkyint = Rky

119905

ThenRekeying is stopped and the timer is refreshedto start the new session

End if

6 The Scientific World Journal

The rekeying is performed in the weak node withinminimum rekeying interval since they possess minimumstability index which causes them to frequently join orleave the network In the strong nodes rekeying is per-formed at the maximum rekeying interval since they havemaximum stability index and their possibility to join orleave the network is less This periodic rekeying reduces therepeated rekeying process that further reduces the overheadIn rekeying technique the multicast group key (GK

119894) is

rekeyed considering the three cases given aboveThe rekeyingalgorithm functions as follows [16]

According to the cases given above rekeying processis triggered Initially node 119873

119894performs the ECDH key

management agreement from leaf node to the source ofmulticast tree to obtain subgroup key cooperatively as

119870119873119894

+ 119870119873119894+1

+ sdot sdot sdot + 119870119873119899minus1

119875 (15)

Here 119870119873119894

is the leaf node 119870119873119899minus1

is the source and 119875 isthe key generator in Diffe-Hellman Finally the generatedsubgroup chain reaches the source and it computes the newgroup key for the groupOnce the new group key is generatedby the source it unicasts it to the members securely

Considering the tree structure given in Figure 4 node1198732

and1198735are leaf nodes119873

7is the parent node of nodes 2 and 5

and 119878 is themulticast source Assume1198732invokes the rekeying

process and then the sequential process of rekeying is givenbelow

Step 1 1198732generates subgroup key as 119870

1198732+ 1198701198735119875 and

transmits to1198737

Step 2 Node1198737computes the subgroup key as 119870

1198732+ 1198701198735

+

1198701198737119875 and forwards to the source

Step 3 Finally the source computes cooperative subgroupkey as119870

1198732+1198701198735

+1198701198737

+119870119878119875 and then generates new group

key as1198701015840119894the source then unicasts the new group key securely

to its member nodes

4 Simulation Results

The proposed technique was simulated under different sce-narios using varying number of receivers and varying themobility of the nodes

41 Simulation Model and Parameters To analyze the per-formance of the proposed work NS2 [17] was used In oursimulation the channel capacity of mobile hosts is set tothe same value 2Mbps We use the distributed coordinationfunction (DCF) of IEEE 80211 for wireless LANs as theMAClayer protocol For multicasting we used Multicast AODV(MAODV) [16] routing protocol Simulations were carriedout in 1500 meter times 1500 meter region for 50 seconds simu-lation timeWe assume each node moves independently withthe same average speed All nodes have the same transmissionrange of 250 meters In our simulation the speed variedfrom 5 to 25ms and performance measured The simulatedtraffic is Constant Bit Rate (CBR) In this simulation we

Table 1 Simulation parameters

Number of receiver nodes 10 20 30 40 50Area size 1500 times 1500Mac 80211Radio range 250mSimulation time 50 secTraffic source CBRRate 250KbMobility model Random way pointSpeed 5 10 15 20 and 25

consider both the node capture and insider attacks In nodecapture attack a malicious attacker steals the credentials andsecret keys from the legitimate nodes An insider attacker is amalicious authenticated group member which may intimatefalse trust relations and injects false trust reporting It mayalso inject packets 119899 the network to disturb communicationsand consume the network resources Our simulation settingsand parameters are summarized in Table 1

42 Performance Metrics We compare our Mobility BasedKey Management Technique (MBKM) with the traditionalGKMPAN [10] and efficient clustering scheme for groupkey management (ECGK) [18] We evaluate mainly theperformance according to the following metrics

Average Packet Delivery Ratio It is the ratio of the number ofpackets received successfully and the total number of packetssent

Overhead It is the control overhead (in terms of packets)occurred in keying and rekeying operations

Packet Drop It is the average number of packets dropped ateach receiver

Detection Accuracy It is the ratio of number of attacksdetected to the number of attacks performed

Resilience It is the ratio of fraction of data compromised tothe fraction of nodes compromised

421 Based on Receivers In our first experiment we vary thenumber of receivers per group as 10 20 30 40 and 50 withspeed 5ms

(i) Comparison with GKMPAN The proposed MBKM tech-nique is compared with GKMPAN and the above perfor-mance metrics are evaluated by varying the group size

Figures 6 and 8 present the packet delivery ratio andpacket drop of both techniques respectively when the groupsize is increased from 10 to 50 From the figure we cansee that MBKM has 89 less packet drop than the existingGKMPAN techniques since it assures high reliability usingthe strong nodes Because of this reduced packet drop thedelivery ratio of the proposed MBKM is 2357 higherthan the GKMPAN technique Figure 7 presents the control

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

6 The Scientific World Journal

The rekeying is performed in the weak node withinminimum rekeying interval since they possess minimumstability index which causes them to frequently join orleave the network In the strong nodes rekeying is per-formed at the maximum rekeying interval since they havemaximum stability index and their possibility to join orleave the network is less This periodic rekeying reduces therepeated rekeying process that further reduces the overheadIn rekeying technique the multicast group key (GK

119894) is

rekeyed considering the three cases given aboveThe rekeyingalgorithm functions as follows [16]

According to the cases given above rekeying processis triggered Initially node 119873

119894performs the ECDH key

management agreement from leaf node to the source ofmulticast tree to obtain subgroup key cooperatively as

119870119873119894

+ 119870119873119894+1

+ sdot sdot sdot + 119870119873119899minus1

119875 (15)

Here 119870119873119894

is the leaf node 119870119873119899minus1

is the source and 119875 isthe key generator in Diffe-Hellman Finally the generatedsubgroup chain reaches the source and it computes the newgroup key for the groupOnce the new group key is generatedby the source it unicasts it to the members securely

Considering the tree structure given in Figure 4 node1198732

and1198735are leaf nodes119873

7is the parent node of nodes 2 and 5

and 119878 is themulticast source Assume1198732invokes the rekeying

process and then the sequential process of rekeying is givenbelow

Step 1 1198732generates subgroup key as 119870

1198732+ 1198701198735119875 and

transmits to1198737

Step 2 Node1198737computes the subgroup key as 119870

1198732+ 1198701198735

+

1198701198737119875 and forwards to the source

Step 3 Finally the source computes cooperative subgroupkey as119870

1198732+1198701198735

+1198701198737

+119870119878119875 and then generates new group

key as1198701015840119894the source then unicasts the new group key securely

to its member nodes

4 Simulation Results

The proposed technique was simulated under different sce-narios using varying number of receivers and varying themobility of the nodes

41 Simulation Model and Parameters To analyze the per-formance of the proposed work NS2 [17] was used In oursimulation the channel capacity of mobile hosts is set tothe same value 2Mbps We use the distributed coordinationfunction (DCF) of IEEE 80211 for wireless LANs as theMAClayer protocol For multicasting we used Multicast AODV(MAODV) [16] routing protocol Simulations were carriedout in 1500 meter times 1500 meter region for 50 seconds simu-lation timeWe assume each node moves independently withthe same average speed All nodes have the same transmissionrange of 250 meters In our simulation the speed variedfrom 5 to 25ms and performance measured The simulatedtraffic is Constant Bit Rate (CBR) In this simulation we

Table 1 Simulation parameters

Number of receiver nodes 10 20 30 40 50Area size 1500 times 1500Mac 80211Radio range 250mSimulation time 50 secTraffic source CBRRate 250KbMobility model Random way pointSpeed 5 10 15 20 and 25

consider both the node capture and insider attacks In nodecapture attack a malicious attacker steals the credentials andsecret keys from the legitimate nodes An insider attacker is amalicious authenticated group member which may intimatefalse trust relations and injects false trust reporting It mayalso inject packets 119899 the network to disturb communicationsand consume the network resources Our simulation settingsand parameters are summarized in Table 1

42 Performance Metrics We compare our Mobility BasedKey Management Technique (MBKM) with the traditionalGKMPAN [10] and efficient clustering scheme for groupkey management (ECGK) [18] We evaluate mainly theperformance according to the following metrics

Average Packet Delivery Ratio It is the ratio of the number ofpackets received successfully and the total number of packetssent

Overhead It is the control overhead (in terms of packets)occurred in keying and rekeying operations

Packet Drop It is the average number of packets dropped ateach receiver

Detection Accuracy It is the ratio of number of attacksdetected to the number of attacks performed

Resilience It is the ratio of fraction of data compromised tothe fraction of nodes compromised

421 Based on Receivers In our first experiment we vary thenumber of receivers per group as 10 20 30 40 and 50 withspeed 5ms

(i) Comparison with GKMPAN The proposed MBKM tech-nique is compared with GKMPAN and the above perfor-mance metrics are evaluated by varying the group size

Figures 6 and 8 present the packet delivery ratio andpacket drop of both techniques respectively when the groupsize is increased from 10 to 50 From the figure we cansee that MBKM has 89 less packet drop than the existingGKMPAN techniques since it assures high reliability usingthe strong nodes Because of this reduced packet drop thedelivery ratio of the proposed MBKM is 2357 higherthan the GKMPAN technique Figure 7 presents the control

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World Journal 7

0

05

1

15

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMGKMPAN

Figure 6 Comparison of delivery ratio with GKMPAN for varyingreceivers

0

5000

10000

15000

20000

25000

10 20 30 40 50

Ove

rhea

d

Receivers

Receivers versus overhead

MBKMGKMPAN

Figure 7 Comparison of overhead with GKMPAN for varyingreceivers

overhead that occurred for both the techniques when thegroup size is increased It can be seen that MBKM has7901 lesser overhead than the existing GKMPAN schemesince it does not use the traditional multicast tree structurewhich involves large number of nodes Figure 9 presents theresults for resilience for both the techniques when the groupsize is increased It can be seen that MBKM has 3096lesser resilience thanGKMPAN since it has efficient rekeyingtechnique

(ii) Comparison with ECGKThe proposedMBKM techniqueis compared with ECGK and the above performance metricsare evaluated by varying the group size Figures 10 and 12presents the packet delivery ratio and packet drop of bothtechniques respectively when the group size is increasedfrom 10 to 50 From the figure we can see that MBKM

0

2000

4000

6000

8000

10000

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMGKMPAN

Figure 8 Comparison of packet drop with GKMPAN for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMGKMPAN

Figure 9 Comparison of resilience with GKMPAN for varyingreceivers

has 3502 less packet drop than ECGK technique since itassures high reliability using the strong nodes Because ofthis reduced packet drop the delivery ratio of the proposedMBKM is 182 higher than the ECGK technique

Figure 11 shows the control overhead occurred for boththe techniques when the group size is increased It can beseen that MBKM has 1532 lesser overhead than ECGKtechnique since it does not use the traditional multicast treestructure which involves large number of nodes Figure 13presents the results for resilience for both the techniqueswhen the group size is increased It can be seen that MBKMhas 1651 lesser resilience than GKMPAN since it hasefficient rekeying technique

422 Simulation Based on Node Speed In our second exper-iment we vary the speed of the mobile node as 5 10 15 20and 25ms for 10 receivers Figures 14 and 16 present the

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

8 The Scientific World Journal

075

08

085

09

095

1

10 20 30 40 50

Del

iver

y ra

tio

Receivers

Receivers versus delivery ratio

MBKMECGK

Figure 10 Comparison of delivery ratio with ECGK for varyingreceivers

0

5000

10000

15000

10 20 30 40 50

Ove

rhea

d

Receivers

MBKMECGK

Receivers versus delivery ratio

Figure 11 Comparison of overhead with ECGK for varyingreceivers

packet delivery ratio and packet drop of both techniquesrespectively when the speed of the node is increased from5 to 25ms From Figure 11 we can see that the packet dropincreases as the speed increases due to disconnections androute breakages But MBKM has 84 less packet drop thanthe existing GKMPAN techniques since it uses stable andenergy efficient nodes for routing Because of this reducedpacket drop the delivery ratio of the proposedMBKM is 29higher than the GKMPAN technique Figure 15 presents thecontrol overhead occurred for both the techniques when thegroup is increased It can be seen that MBKM has 56 lesseroverhead than the existing GKMPAN scheme since it doesnot use the traditionalmulticast tree structure which involveslarge number of nodes

0

200

400

600

800

10 20 30 40 50

Pack

et d

rop

Receivers

Receivers versus packet drop

MBKMECGK

Figure 12 Comparison of packet drop with ECGK for varyingreceivers

0

02

04

06

08

10 20 30 40 50

Resil

ienc

e

Receivers

Receivers versus resilience

MBKMECGK

Figure 13 Comparison of resilience with ECGK for varyingreceivers

0

02

04

06

08

1

5 10 15 20 25

Deli

very

ratio

Speed

Speed versus delivery ratio

MBKMGKMPAN

Figure 14 Speed versus delivery ratio

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World Journal 9

0

5000

10000

15000

20000

5 10 15 20 25

Ove

rhea

d

Speed

Speed versus overhead

MBKMGKMPAN

Figure 15 Speed versus overhead

0

2000

4000

6000

8000

5 10 15 20 25

Pack

et d

rop

Speed

Speed versus packet drop

MBKMGKMPAN

Figure 16 Speed versus drop

5 Conclusion

In this work mobility based key management technique isused for multicast security in MANET Initially the nodesare categorized into strong and weak nodes according totheir stability index The stability index is estimated basedon the link availability and mobility A multicast tree isconstructed such that for every weak node there is a strongparent node When any node desires to transmit a multicastdata to destination a session key based encryption techniqueis utilized The rekeying process is performed periodicallyby the initiator node which is chosen among the strongnodes based on the reputation indexThe rekeying interval isfixed depending on the node category For the weak nodesthe initiators perform rekeying within minimum rekeyinginterval as they possess minimum stability index Whereasfor the strong nodes the initiators perform rekeying at themaximum rekeying interval since their stability index ismoreand the possibility of their position change due to mobility

is less This technique minimizes the repeated rekeyingprocess that further minimizes the overhead By simulationresults proposed approach reduces the packet drop rate andimproves the data confidentiality

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] L Junhai X Liu and Y Danxia ldquoResearch onmulticast routingprotocols for mobile Ad-hoc networksrdquo Computer Networksvol 52 no 5 pp 988ndash997 2008

[2] M Striki and J S Baras ldquoKey distribution protocols forsecure multicast communication survivable in MANETsrdquo inProceedings of the IEEE Military Communications Conference(MILCOM rsquo03) Boston Mass USA October 2003

[3] C Rajan and N S Shanthi ldquoMisbehaving attack mitigationtechnique for multicast security in mobile ad hoc networks(MANET)rdquo Journal of Theoretical and Applied InformationTechnology vol 48 no 3 pp 1349ndash1357 2013

[4] R Srinivasan V Vaidehi R Rajaraman S Kanagaraj RChidambaram Kalimuthu and R Dharmaraj ldquoSecure groupkey management scheme for multicast networksrdquo InternationalJournal of Network Security vol 10 no 3 pp 205ndash209 2010

[5] L Lazos and R Poovendran ldquoPower proximity based keymanagement for secure multicast in Ad hoc networksrdquoWirelessNetworks vol 13 no 1 pp 127ndash148 2007

[6] D S Devi and G Padmavathi ldquoA reliable secure multicastkey distribution scheme for mobile Adhoc networksrdquo WorldAcademy of Science Engineering and Technology vol 56 pp321ndash326 2009

[7] S Devaraju and G Padmavathi ldquoDynamic clustering for QoSbased secure multicast key distribution in mobile Ad hocnetworksrdquo International Journal of Computer Science Issues vol7 no 5 pp 30ndash37 2010

[8] B-J Chang and S-L Kuo ldquoMarkov chain trust model for trust-value analysis and key management in distributed multicastMANETsrdquo IEEE Transactions on Vehicular Technology vol 58no 4 pp 1846ndash1863 2009

[9] D Huang and D Medhi ldquoA secure group key managementscheme for hierarchical mobile Ad hoc networksrdquo Ad HocNetworks vol 6 no 4 pp 560ndash577 2008

[10] M S Bouassida and M Bouali ldquoOn the performance ofgroup key management protocols in MANETsrdquo in Proceedingsof the Joint Conference on Security in Network Architecturesand Information Systems (SAR-SSI rsquo07) pp 275ndash286 AnnecyFrance June 2007

[11] J-C Lin K-H Huang F Lai and H-C Lee ldquoSecure andefficient group key management with shared key derivationrdquoComputer Standards amp Interfaces vol 31 no 1 pp 192ndash2082009

[12] V Sridhara and S Bohacek ldquoRealistic propagation simulation ofurban mesh networksrdquo Computer Networks vol 51 no 12 pp3392ndash3412 2007

[13] R Biradar S Manvi and M Reddy ldquoMesh based multicastrouting in MANET stable link based approachrdquo InternationalJournal of Computer and Electrical Engineering vol 2 no 2 pp371ndash380 2010

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

10 The Scientific World Journal

[14] S R Zakhary and M Radenkovic ldquoReputation-based securityprotocol for MANETs in highly mobile disconnection-proneenvironmentsrdquo in Proceedings of the 7th International Confer-ence on Wireless On-Demand Network Systems and Services(WONS rsquo10) pp 161ndash167 February 2010

[15] Elliptic Curve Cryptography Version 20 Technical GuidelineBundesamt fur Sicherheit in der Informationstechnik 2012

[16] H-Y Lin and T-C Chiang ldquoEfficient key agreements indynamic multicast height balanced tree for secure multicastcommunications in Ad Hoc networksrdquo EURASIP Journal onWireless Communications and Networking vol 2011 Article ID382701 15 pages 2011

[17] Network Simulator httpwwwisiedunsnamns[18] K Drira H Seba and H Kheddouci ldquoECGK an efficient

clustering scheme for group key management in MANETsrdquoComputer Communications vol 33 no 9 pp 1094ndash1107 2010

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014


Recommended