Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 4
Abstract
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, bandwidth, and energy resources. Additionally, frequent packet loss errors require a security solution that can tolerate missed packets. The existing cryptography techniques are inefficient for multicast traffic patterns. Since using a common key for all receivers will make it relatively easy to impersonate a sender by any one of the receiving nodes. The proposed system exploits network clustering and routing technique in order to cut the overhead and ensure scalability. Multicast traffic in intra cluster using one-way hash chains to authenticate the message source. In the inter cluster, (i.e. cross cluster) multicast traffic includes message authentication codes that are based on multiple keys. In order to authenticate the source, each cluster uses a unique subset of keys to looks for its distinct combination of message authentication codes in the message. The source generates the keys at the time of establishing the multicast session. The keys will be securely transmitted to the head of every cluster that hosts one or multiple receivers. The multicast message is then transmitted to the cluster-heads which authenticate the source and then deliver the message to the intended receivers.
Authors and Affiliations
P. Indumathi
Anomaly Extraction in Networks
The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to ident...
Review of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...
Automatic Generation of Standard Deviation Attribute Profiles for Spectral–Spatial Classification of Remote Sensing Data
In recent years, the development of high-resolution remote sensing image extends the visual field of the terrain features. Back Propagation neural network is widely used in remote sensing image classification in recent y...
A Survey on Clustering Approaches for Gene Expression Patterns
Clustering is the process of organizing objects into groups whose members are similar in some way, and different from members of other groups. Clustering is an efficient data mining technique that finds its usage in vari...
Natural Radioactivity Measurements in different regions in Najaf city, Iraq
This study measures the activity of 238U, 232Th, and 40K. The soil samples collected from different sites in Najaf city, Iraq. The studied samples were analyzed and the concentrations of radionuclides were determined usi...