Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 1
Abstract
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battlefields, disaster mitigation, emergency search, rescue sites, classrooms and conventions, where participants share information dynamically using their mobile devices. These applications lend themselves well to multicast operations. In addition, within a wireless medium, it is even more crucial to reduce the transmission overhead and power consumption. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Scalability is important issue in term of group size and network size while designing multicast protocol. In addition security is an essential requirement in MANET environments. Compared to Wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority, easy eavesdropping, limited power and bandwidth, and dynamic network topology. Efficient Geographic Multicasting Protocol (EGMP) came into existence to implement group communication in MANET. Efficient Geographic Multicast Protocol (EGMP) uses a virtual-zone-based structure to implement scalable and efficient group membership scheme. The efficiency and scalability of the protocol was already tested but security aspect is not considered. To further improve the efficiency of the protocol, we propose a Secure Efficient Geographic Multicast Protocol (SEGMP).In this paper we study comparative analysis of simple mesh topology using ADOV, EGMP and SEGMP and test average delay, throughput, packet delivery ratio, energy
Authors and Affiliations
Jyoti M. Karbhal , Kishor B. Sadafale
Future Research Challenges of Peer-to-Peer Systems
PCs have become much more powerful, and they are able to handle the data processing locally rather than on central servers. Because of this, peer-to-peer computing can now occur when individual computers bypass central s...
Speaker Independent Recognition System with Mouse Movements
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...
Methodology for Artificial Immune Systems and Immune Pathology
Artificial immune system (AIS) mimics the superior properties of biological immune system and provides an effective method in intelligent computing and intelligent system designing. But the disease-causing mechanis...
Improving Accuracy in Decision Making for Detecting Intruders
Normal host based Intrusion detection system provides us some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employee of the ente...
Anomaly Intrusion Detection System using Random Forests and k-Nearest Neighbor
This paper proposed a new approach to design the anomaly intrusion detection system using not only misuse but also anomaly intrusion detection for both training and detection of normal or attacks respectively. The...