Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battlefields, disaster mitigation, emergency search, rescue sites, classrooms and conventions, where participants share information dynamically using their mobile devices. These applications lend themselves well to multicast operations. In addition, within a wireless medium, it is even more crucial to reduce the transmission overhead and power consumption. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Scalability is important issue in term of group size and network size while designing multicast protocol. In addition security is an essential requirement in MANET environments. Compared to Wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority, easy eavesdropping, limited power and bandwidth, and dynamic network topology. Efficient Geographic Multicasting Protocol (EGMP) came into existence to implement group communication in MANET. Efficient Geographic Multicast Protocol (EGMP) uses a virtual-zone-based structure to implement scalable and efficient group membership scheme. The efficiency and scalability of the protocol was already tested but security aspect is not considered. To further improve the efficiency of the protocol, we propose a Secure Efficient Geographic Multicast Protocol (SEGMP).In this paper we study comparative analysis of simple mesh topology using ADOV, EGMP and SEGMP and test average delay, throughput, packet delivery ratio, energy
Authors and Affiliations
Jyoti M. Karbhal , Kishor B. Sadafale
Efficient Patterns Using Hidden Web Trajectory Concept
Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based...
Crawler Using Inverted WAH Bitmap Index and Searching User Defined Document Fields
Crawler is a web crawler aiming to search and retrieve web pages from the World Wide Web, which are related to a specific topic. It based on some specific algorithms to select web pages relevant to some pre-defined...
Fake Access Point Detection and Prevention Techniques
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...
A Survey on Sensor Cloud: Architecture and Applications
Cloud Computing is a part of computer science and it enables providing Internet services to external customers via very scalable computing capacities. It is abstracted, controlled and high-scalable computer infrastructur...
Policy Management in Adhoc Networks
Policy-based management is based on defining a set of global rules, according to which a network or distributed system must operate. In the last few years, policy-based management has begun to emerge as the dominan...