SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providing complete security in such networks. This paper proposes a efficient Group Based Multicast Hierarchy (GBMH) algorithm for secret multicast communication, in which source nodes used the Secure Ad hoc On Demand Distance Vector (SAODV) protocol is an extension of the AODV protocol. The Secure AODV scheme is based on the assumption that each node possesses certified public keys of all network nodes. The SAODV protocol collects its 1 hop neighbours to form group. This protocol sends acknowledgement for each transmission in order to reduce the retransmission. Membership dynamism was overcome by electing local controllers and with periodic updates of node join and leave information using multicast hierarchy. The performance is studied in terms of average end to end delay and fault tolerance in multicast transmission.
Authors and Affiliations
R. Varalakshmi , , Dr. V. Rhymend Uthariaraj
OVERVIEW OF NIGHTTIME SOLAR CELL
A nighttime solar cell is a clean passive solid state device which is developed to produce the electric power at day and night from a renewable energy source. Such as waste thermal power source and energy from deep space...
Optimized Surveillance Solution for Unattended Baggage Recognition
Abstract—The system automatically recognize activities around protected area to improve safety and security by multiplexing hundreds of video streams in real time. Object tracking method has important role in real tim...
CONTENT BASED IMAGE RETRIVAL USING FRACTAL SIGNATURE ANALYSIS
Content-based image retrieval has become a reliable tool for digital image applications, especially for image retrieval purposes. There are several advantages of the image retrieval techniques compared to other simple re...
THE STUDY AND OPTIMIZATION OF FINGERPRINT VERIFICATION USING SIFT APPROACH ON PORES AND RIDGES OF FINGERPRINTS
Today’s modernization and advancement in the area of information and telecommunications technologies that comprises for a fully automated computerized process through which human efforts were decreases and working...
A Study of Decision Support System (With reference to Indian Retail Industry)
The retail sector was one of the first sectors to make significant investments in collecting and integrating customer data in data warehouses. Retailers have generally earned a significant return on their IT system...