Tree Based Scalable Secure Group CommunicationV-parameter Study of Silica-Air 1D Photonic Crystal Fiber by Modulating Geometrical Parameters at Different Optical Communication Ranges
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 1, Issue 1
Abstract
In order to establish a group communication, a common key must be available with all the members of the group. The group key can be used for encrypting data between the group members or restricting access to the resources intended for group members only. Each member in a group has a unique key referred as member key, used for decrypting data in a group. The group key is distributed by group key server, which changes the group key time to time called as group rekeying. It is mandatory that the group key changes after a new user has joined and an existing user departed periodically. The existing system analyse the Bursty behaviour and operation. Burstiness is an important behavior in Secure Group Communication (SGC). Performing bursty operation, which may accumulate the simultaneous leave and join as a single operation, thus reduces the frequency of key distribution and reduces time complexity. But in the existing system the aggregate operation will occur only in rare condition so it may not perform the key reduction in all cases as well as it perform less scalability and security. To achieve better scalability, security and key reduction a new group key management protocol based on the Chinese Remainder Theorem and a hierarchical tree is proposed, in which each node contains a key and a modulus. The Keys and modulus are constructed as a tree and maintained by the key server. The key server shares the keys with each member on the path from its leaf to the root. The keys on its path from the leaf to the root need to be updated in the protocol, when a member joins or leaves the group but all modulus must be kept fixed. To update the keys on the tree, the key server generates a new key for each update node and encrypts it with its children keys on its path from the leaf to the root. Thus the new scalable protocol increases the security, scalability issues when the group size goes up to millions of members and reduces the key.Electromagnetic wave propagation inside one-dimensional photonic crystal fiber is numerically characterized by computing V-parameter, cladding index and effective mode profiles. Dependence on these parameters on geometrical structure of the fiber reflects the design tolerance, and corresponding modal characteristics. Air-hole spacing and periodicity are varied to observe the effect on V-parameter; along with effective core radius, which is a function of periodicity, is modified to see the effect on cladding index and effective mode profiles. Results obtained from empirical relations method are compared with analytical formula of Nielsen and Mortensen. Periodicity of the structure is regarded as numerically equal to the central wavelength of the desired range throughout the computation. Refractive index of the core is taken as independent of operating wavelength. Simulated parameters have critical importance to estimate the characteristics of photonic crystal fiber which will help the design engineers to study the performance at 870 nm, 1330 nm and 1550 nm.
Authors and Affiliations
Rameeya M , Oswalt S
An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks
A Mobile Adhoc Network is a communication medium that does not rely on secure infrastructure .It is a group of independent mobile nodes that can transfer to communicate each other via radio waves. These networks are full...
Improving Throughput and Controlling Congestion Collapse in Mobile Ad Hoc Networks
Mobile ad hoc networks are collections of mobile nodes that can dynamically form temporary networks without the need for pre-existing network infrastructure or centralized administration. These nodes can be arbitrarily l...
Distributed System Framework for Mobile Cloud Computing
Todays global computing environment involves the vital role of the mobile cloud computing. Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing and wireless networks which brings rich comp...
A Systematic Study on Cyber Physical System
Cyber-physical systems (CPSs) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. The economic and societal potential of such...
Resonance and Parametric Analysis of Planar Broad-Wall Longitudinal Slot Array Antennas
This paper presents, method of moments based analysis of broad-wall longitudinal slots array antenna using Multiple Cavity Modeling Technique (MCMT). Theoretical data for reflection coefficient, transmission coefficient,...