Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battlefields, disaster mitigation, emergency search, rescue sites, classrooms and conventions, where participants share information dynamically using their mobile devices. These applications lend themselves well to multicast operations. In addition, within a wireless medium, it is even more crucial to reduce the transmission overhead and power consumption. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Scalability is important issue in term of group size and network size while designing multicast protocol. In addition security is an essential requirement in MANET environments. Compared to Wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority, easy eavesdropping, limited power and bandwidth, and dynamic network topology. Efficient Geographic Multicasting Protocol (EGMP) came into existence to implement group communication in MANET. Efficient Geographic Multicast Protocol (EGMP) uses a virtual-zone-based structure to implement scalable and efficient group membership scheme. The efficiency and scalability of the protocol was already tested but security aspect is not considered. To further improve the efficiency of the protocol, we propose a Secure Efficient Geographic Multicast Protocol (SEGMP).In this paper we study comparative analysis of simple mesh topology using ADOV, EGMP and SEGMP and test average delay, throughput, packet delivery ratio, energy
Authors and Affiliations
Jyoti M. Karbhal , Kishor B. Sadafale
Efficient Patterns Using Hidden Web Trajectory Concept
Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based...
Towards an Efficient Usage of UbiSOAP Middleware for Ubiquitous Networks
With the drastic evolution of wireless technologies, software services can become truly ubiquitous, being not solely accesses but also hosted by wirelessly networked portable gadgets. As a result, legacy applicatio...
Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile ag...
An Empirical Study of Emotional Musical Influence on Face Using the Local Binary Pattern (LBP) Approach
In This Empirical paper, we had observed that indian classical raga music such as raag Khamaj and raag Darbrai evokes feelings and emotions. Raag Khamaj produces peace happiness, cheerfulness and Raag Darbari...
Software Code Clone Detection Using AST
The research which exists suggests that a considerable portion (10-15%) of the source code of large-scale computer programs is duplicate code. Detection and removal of such clones promises decreased software maintenance...