The secure multicasting is categorized into two types such as centralized and distributedscheme. The Group Controller (GC) performs group key management and only small loads areapplied on the users of the group in case of centralized scheme. For distributed scheme, the keymanagement is performed by each user to reinforce the load on the user.
2. Related Work Ben-Jye Chang et al., have proposed a two-step secure authentication approach formulticast MANETs. A Markov chain trust model determines the Trust Value (TV) and the nodewith the highest TV is selected as CA server. The security analysis guarantees that this approachachieves a secure reliable authentication in multicast MANETs. Numerical results show that theanalytical TV is very close to that of simulation under various situations. The speed ofconvergence of the analytical TV shows that the analyzed result is independent of initial valuesand trust classes. Dijiang Huang and Deep Medhi have projected a secure group key managementscheme for hierarchical mobile ad-hoc networks to enhance each scalability and survivability ofgroup key management for large-scale wireless ad-hoc networks. A multi-level security modeland a decentralized group key management infrastructure to come back through such a multi-level security model are projected. This approach reduces the key management overhead andimproves resilience to any single point failure problem. Mohamed Salah Bouassida and Mohamed Bouali have introduced an evaluationmethod for group key management protocols (GKMP). They have compared four main existinggroup key protocols namely, scalable and efficient group rekeying protocol (GKMPAN) for adhoc networks, Distributed Multicast Group Security Architecture (DMGSA), BALADE andHierarchical group key management protocol (Hi-GDH). In the above approaches, GKMPAN is an example for centralized approach. DMGSA approach belongs to distributed type keymanagement scheme. BALADEprotocol and Hi-GDH stand for decentralized approach. They have discussed the need forperformance evaluation of GKMPs in the context of MANET’s. Jen-Chiun Lin et al., have proposed a new group key management protocol toreduce the communication and computation overhead of group key rekeying caused bymembership changes. The protocol can handle synchronous and asynchronous rekeyingoperations, and a new k-node insertion algorithm is designed to further optimize the key tree inbatch update operations. With strong encryption function and key derivation function, thisprotocol is provably secure. Simulation result shows that, comparing to LKH, OFT, and ELK,SKD requires the least communication bandwidth and computation power, and it is efficientwith binary key trees and asynchronous rekeying.