JURNAL INTERNASIONAL
Journal of Theoritical and Apllied Information Technology
The process if transfffferring messages from a member to another member securely within a network is known as secure group communication. key management is an important primitive to ensure this, as ist provides a secure method for crypyographic keys creation, distribution and management. Group key establisment/management methods are key management's two sides. Group members use group key (GK) for encryption/decryption ofmessages in group communication. Communication needs quality and security for better performance and for acceptance of users and client companies. Diffie-Hellman (DH)was the first published public key algorithm that is used for secure key echange mechanism. The purpose of algorithm is used to enable users to security echange a key that can be used for subsequent encryption. Earlier schmes used only one group controller and were thus affected by single point failure (I-affects-n problem). To prevent this, a new technique where a control group generates the group key is introduce based on the nodes capability within two hops. In this scheme, direct trust and indirect trust is computed to identify Cluster Heads (CH) and the concept of auciliary cluster head is introduced for effective key management.
| JI03220006 | 004.0285 JATIT J JurnalInternasional | Perpus STMIK (Jurnal Internasional) | Tersedia |
Tidak tersedia versi lain