Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 4
Abstract
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, bandwidth, and energy resources. Additionally, frequent packet loss errors require a security solution that can tolerate missed packets. The existing cryptography techniques are inefficient for multicast traffic patterns. Since using a common key for all receivers will make it relatively easy to impersonate a sender by any one of the receiving nodes. The proposed system exploits network clustering and routing technique in order to cut the overhead and ensure scalability. Multicast traffic in intra cluster using one-way hash chains to authenticate the message source. In the inter cluster, (i.e. cross cluster) multicast traffic includes message authentication codes that are based on multiple keys. In order to authenticate the source, each cluster uses a unique subset of keys to looks for its distinct combination of message authentication codes in the message. The source generates the keys at the time of establishing the multicast session. The keys will be securely transmitted to the head of every cluster that hosts one or multiple receivers. The multicast message is then transmitted to the cluster-heads which authenticate the source and then deliver the message to the intended receivers.
Authors and Affiliations
P. Indumathi
Software Platforms for Mobile Distributed Systems
As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...
Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks
A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...
An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile Ad-Hoc Networks
In Ad Hoc networks realizing high throughput is achievable when directional antennas are utilized. The directional antennas lead to higher spatial multiplexing gain. On The Other Hand, there are a few issues in practice...
Ensemble Classifiers and Their Applications: A Review
Ensemble classifier refers to a group of individual classifiers that are cooperatively trained on data set in a supervised classification problem. In this paper we present a review of commonly used ensemble classifiers i...