Key Agreement In Peer-To-Peer Wireless Networks

In recent decades, a considerable number of studies have been conducted on the creation and management of group keys. A typical approach is centralized key distribution based on TTP keys and in permanently accessible pairs [4-8]. These studies have shown apparent effectiveness for large groups such as the Wireless Sensor Network (WSN). However, because a mobile phone network consists of dynamically mobile peer-to-peer communications without TTP, it is difficult to provide scalable group key management for any group setting [15]. Advances in wireless communications and mobile devices have created different types of mobile phone networks such as mobile ad hoc networks (MANET), mobile wireless sensor networks (WMSN) and the Internet of Things (IoT). On mobile networks, heterogeneous devices, such as smartphones, laptops, and smart sensors, perform peer-to-peer (machine-to-machine) communications without depending on a fixed infrastructure. Mobile networks have different functions than traditional networks. First, the network topology changes dynamically due to node mobility, resulting in frequent changes in network connection state. In addition, many applications on mobile phone networks support one-to-many (multicast) communication that allows common data to be transferred from one source to several purposes, for example. B military communications (battlefield), health system, industrial surveillance, online conferencing, collaborative work area and disaster management. You create a collaborative group of entities called participating group members as group members in multicast group communication and managing group membership modified by node mobility.

In summary, the DH-based group key protocol is generally known as the GKA protocol. Although our protocol is based on DH, we do not classify it as gKA because of the key distribution function of a controller. Our proposed scheme offers the advantage of dynamics and collaborative contribution to the calculation of group keys with a modified key agreement method. We focus on the DH-based Key Management Group, known as the Key Agreement Group (GKA), where a common key is generated by the same contributions from all members of the group. The DH protocol allows two parties to share a key using their secrets on a dangerous channel.[10] The key calculation of DH uses the Integer Modulo multiplicative group, where a large prime number is . . .