International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6 ISSN Print: 0976-6464 and ISSN Online: 0976-6472 IAEME Publication SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS S. Nithya Assistant Professor, Department of ECE, KPR Institute of Engineering and Technology, Coimbatore, Tamilnadu, India. Manipriya, Indhumathi and Madhumitha Student, Department of ECE, KPR Institute of Engineering and Technology, Coimbatore, Tamilnadu, India. ABSTRACT In Current scenario, MANET (Mobile Adhoc Networks) plays a vital role in all applications. MANET is an infrastructure less network, it sends the information through intermediate nodes. It is for security issues the intermediate nodes cannot be a trusted one. Security plays a major role, it can be provided with the help of key management. Our aim is to provide secure methods for handling cryptographic keying algorithms. Key management includes generation, distribution and maintenance. Even if lot and lot of security techniques was proposed with small circumstances. In this paper, we proposed an algorithm for the purpose of sending the data in secured way in a mobile Adhoc network. Key words: Cryptographic keys, Key Management, MANET, Nodes, Security. Cite this Article: S. Nithya, Manipriya, Indhumathi and Madhumitha, Secured Key Management Algorithm for Data Transmission in Mobile Adhoc Networks, International Journal of Electronics and Communication Engineering and Technology, 7(6), 2016, pp. 96 100. http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6 1. INTRODUCTION Mobile Adhoc network is a Self configuring network of mobile nodes connected by wireless links, to form an arbitrary topology. The network nodes are interconnected through wireless interfaces and unlike traditional networks lack specialized nodes. MANET having dynamic network topology, in which the network may change frequently. Nodes can be move around within the network but the network can also be split into many smaller networks, which can be merged with other networks. MANET having limited bandwidth than other traditional networks. This may limit the size and usage of the message. MANET use batteries as a power source. The nodes consume high power, while using complex algorithms and operations. MANET has a limited physical security. The use of wireless communication and the exposure of the network nodes increase the possibility of attacks against the networks. There are many security issues in http://www.iaeme.com/ijecet/index.asp 96 editor@iaeme.com
Secured Key Management Algorithm for Data Transmission in Mobile Adhoc Networks MANETs like secure multicasting, secure routing, and privacy aware routing. Key management is to provide secure methods for handling cryptographic approaches. The main role of key management schemes involves generation, distribution and maintenance. Cryptographic schemes involves in symmetric and asymmetric mechanisms. Figure 1 Mobile Adhoc network Symmetric encryption involves, same keys are used by the sender and the receiver. Same key is used for both encryption and decryption of the data. Asymmetric encryption uses two party key. One of the key is public and the other key is private. Public key is known by all the users and the private is used by the specific sender and the receiver. The key management service must ensure that the generated keys are securely distributed to their owners. In public-key cryptography the key distribution mechanism must guarantee that private keys are delivered only to authorized parties. In MANET there are various Key Management Schemes proposed. To secure communications in Mobile Ad Hoc Networks (MANETs), messages are often protected by encryption using a chosen cryptographic key, which, in the scenario of group communication is called the group key proposed in [1]. Multicast [2] is a communication service that provides data delivery from a source to a set of recipients, also known as multicast group. Secure group communication systems typically rely on a group key, a secret shared by all members of the group. Privacy is obtained by encrypting all data with the group key. The key management system controls access to the group key, ensuring that only authenticated members receive the key. In mobile ad hoc network, it is little difficult to establish a secure connection between the source and the destination. The malicious nodes or the devices can counterfeit identified to make fake trust relations with each other and then it slowly started attacking the mobile Adhoc network. Such nodes would drop all the data packets which is received that they need to transmit the data towards the destinations. 2. OVERVIEW OF KEY MANAGEMENT SCHEMES IN MANET Key management can be defined as a set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorized parties. http://www.iaeme.com/ijecet/index.asp 97 editor@iaeme.com
S. Nithya, Manipriya, Indhumathi and Madhumitha Figure 2 Basic key management mechanisms 2.1. Cryptographic Mechansims Cryptographic mechanisms involves in encryption and decryption of data s. The process of converting plain text into cipher text is called as encryption and converting the cipher text into plain text is called as decryption. For the above two process we are in a need of secured information called as key. This key may be categorized into two types, private key and public key. Private Key is a random secret key; it uses some sort of algorithms to encrypt and to decrypt the data. Private Key plays important role in both symmetric and asymmetric cryptography. In Symmetric encryption mechanism, the sender and the receiver uses same key for encryption as well for decryption. The problem in symmetric encryption mechanisms is once if the key is missed or broken then the security is lost while exchanging the information. As in the case of asymmetric cryptography, two different mathematical mechanisms are used, based on the complexity and the length of the private key used, its security depends. 3. PROPOSED ALGORITHM The main objective of this work is to communicate securely with each other in a mobile Adhoc network. This is possible only when the key is highly protected from the hackers. This algorithm involves in four different steps as follows: 1. Secret head Selection 2. Secret algorithm Selection 3. Secret keys determination 4. Group creation 5. Sharing of keys 6. Transmission of data s 7. Share verification of keys 8. Digital Signature 9. Reconstruction of data s. http://www.iaeme.com/ijecet/index.asp 98 editor@iaeme.com
Secured Key Management Algorithm for Data Transmission in Mobile Adhoc Networks The proposed techniques are as follows. Initially, in a mobile Adhoc network many nodes are actively participated without any infrastructure mechanisms. In order to provide the security, the base station which first selects the cluster head randomly. Then the cluster head decides the intermediate nodes involved in transmitting the data from source to destination, the intermediate nodes are decided based on the traffic, Payload, battery capacity etc., The working module is classified and categorized into nine modules as mentioned above. Initially the base station can select the cluster head based on some of the parameters like traffic, battery capacity, etc., and then the secret key determination is processed and shared between the authenticated nodes in order to transmit the data in secured way. Digital signature is another secured way to transmit the data. Whenever the data is transmitted between the intermediate nodes, all the nodes which are involved in transmission of data must authenticate themselves by means of digital signature. The digital signature must be verified once it is processed. The above flow chart will explain clearly about the secured algorithm for data transmission. Figure 3 Flow chart of proposed System http://www.iaeme.com/ijecet/index.asp 99 editor@iaeme.com
S. Nithya, Manipriya, Indhumathi and Madhumitha But it cannot be communicated with the intermediate nodes in prior. Then based upon the asymmetric mechanism a pair of private protective key is generated namely PPk 1 and PPK 2. PPk 1 is a key which is shared only with the source node, intermediate nodes between source and destination and the destination node. Whereas PPK 2 is a secondary private key this is shared only between the sender and the receiver. This PPK 2 key is changed only after a particular seconds, that must be updated only between the sender and the receiver. PPk 1 is a key which is shared only with the source node, intermediate nodes between source and destination and the destination node. This is key used between the intermediate nodes, only with the help of the key the users could able to find the information where the data is come from and where we need to send next. For every transmission of data, the nodes should be verified by the digital signature. So that we could able to find secure transmission of data s. 4. RESULT In mobile Adhoc network, security plays a major role. Though various algorithms proposed they were small discrepancies present. In this paper a new methodology is proposed to transmit the data in secured manner by means of pair of protective key with a digital signature. This will transmit the data in more secured way, as we implement this type of mechanisms in military, cyber applications. By this methodology, we can secure the data in a major level in mobile Adhoc networks. REFERENCE [1] Bing Wu, Jie Wu, Yuhong Dong An efficient group key management scheme for mobile ad hoc networks Int. J. Security and Networks.Vol. 2008. [2] V. Palanisamy, P. Annadurai Secure Group Communication using Multicast Key Distribution Scheme in Ad hoc Network 2010 International Journal of Computer Applications (0975-8887) Volume 1 No. 25. [3] Valle, G. and Cerdenas, R., Overview the key Management in Ad Hoc Networks, ISSADS pp. 397 406, 2005. [4] Wu, B., Wu, J., Fernandez, E., Ilyas, M. and Magliveras, S., Secure and Efficient key Management in mobile ad hoc networks, Network and Computer Applications, Vol. 30, pp. 937-954, 2007. [5] R. Pushpa Lakshmi, A. Vincent Antony Kumar, Cluster Based Composite Key Management in Mobile Ad Hoc Networks, International Journal of Computer Applications, vol. 4- No. 7, 2010. [6] CAPKUN, S., HUBAUX, J., AND BUTTYAN, L. 2006. Mobility helps peer-to-peer security. IEEE Trans. Mobile Comput. 5, 1, 43 51. [7] ABDUL-RAHMAN, A. AND HAILES, S. 1997. A distributed tust model. In Proceedings of the ACM New Security Paradigms Workshop. [8] DAHILL, B., LEVINE, E., ROYER, E., AND SHIELDS, C. 2001. A secure routing protocol for ad hoc networks. Tech. rep. UM-CS-2001-037.University of Massachusetts, Amherst, MA. [9] S. Radha Rammohan. Anomaly Detection in Mobile Adhoc Networks (MANET) using C4.5 Clustering Algorithm. International Journal of Information Technology & Management Information System (IJITMIS), 7 (1), 2015, pp. 01-10. [10] Priyanka Yadav and Deepa Chaurse, Survey and Analysis of Security Issues in Vehicular Adhoc Network, International Journal of Electronics and Communication Engineering and Technology (IJECET), 5(3), 2016, pp. 70 78 http://www.iaeme.com/ijecet/index.asp 100 editor@iaeme.com