Secured Key Management Scheme for Multicast Network Using Graphical Password

被引:6
作者
Lavanya, S. [1 ]
SaravanaKumar, N. M. [2 ]
Vijayakumar, V. [3 ]
Thilagam, S. [2 ]
机构
[1] Sri Krishna Coll Engn & Technol, Coimbatore, Tamil Nadu, India
[2] Vivekanandha Coll Engn Women, Tiruchengode, Tamil Nadu, India
[3] VIT Univ, Chennai, Tamil Nadu, India
关键词
Group communication; Graphical password; Rekey; Elliptic curve cryptography (ECC);
D O I
10.1007/s11036-019-01252-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, management of keys in a group has become a significant part of data communication. The textual and alphanumerical passwords used for security concern have now changed its trend to different graphical passwords procedures. Many researchers have introduced various efficient and scalable key management schemes and it is difficult to remember this type of password. There are many textual password authentication mechanisms now available in the software market and are prone to eavesdropping, dictionary attacks and shoulder surfing. To address all the above vulnerability, many researchers and practitioners have developed different authentication methods who are interested in finding an alternate way to the existing problem. Hence, this paper proposes a secure group communication scheme between group members using graphical passwords and this is easy to remember compared to a textual password but difficult to hack. The elliptic curve cryptography technique is applied for key distribution. The group key is a graphical password which is static and shared among all the members in a group. The sequence of images will be sent to the members/users of a group during registration to form a group key and the group controller sends a pass point value of each image to the member by using elliptic curve cryptography after the registration. The main focus of the proposed scheme is to provide better security and ensures negligible communication overhead and computation overhead.
引用
收藏
页码:1152 / 1159
页数:8
相关论文
共 20 条
[1]  
Begum S. Jabeen, 2011, Journal of Computer Sciences, V7, P328, DOI 10.3844/jcssp.2011.328.340
[2]  
Dhamija Rachna, 2000, P 9 USENIX SEC S
[3]  
Herzberg A, 1995, LECT NOTES COMPUT SC, V963, P339
[4]  
Ilango S, 2004, P INT C INF TECHN CO, DOI [10.1109/ITCC.2004.1286664, DOI 10.1109/ITCC.2004.1286664]
[5]  
Jancy Rani D, 2016, INT J INNOV RES COMP, V4, P556, DOI [10.15680/IJIRCCE.2016.0401126, DOI 10.15680/IJIRCCE.2016.0401126]
[6]  
Keerthana R, 2014, INT J INNOV RES COMP, V2, P1177
[7]  
Khandelwal A, 2010, INT J COMPUT APPL, V1, P100
[8]   Design of secure multicast key management schemes with communication budget constraint [J].
Li, MY ;
Poovendran, R ;
Berenstein, C .
IEEE COMMUNICATIONS LETTERS, 2002, 6 (03) :108-110
[9]  
Moraskar Vaibhav, 2014, INT J COMPUTER SCI M, V3, P166
[10]   Design of Secure Group Key Management Scheme for Multicast Networks using Number Theory [J].
Munivel, E. ;
Lokesh, J. .
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2, 2008, :124-129