SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providing complete security in such networks. This paper proposes a efficient Group Based Multicast Hierarchy (GBMH) algorithm for secret multicast communication, in which source nodes used the Secure Ad hoc On Demand Distance Vector (SAODV) protocol is an extension of the AODV protocol. The Secure AODV scheme is based on the assumption that each node possesses certified public keys of all network nodes. The SAODV protocol collects its 1 hop neighbours to form group. This protocol sends acknowledgement for each transmission in order to reduce the retransmission. Membership dynamism was overcome by electing local controllers and with periodic updates of node join and leave information using multicast hierarchy. The performance is studied in terms of average end to end delay and fault tolerance in multicast transmission.
Authors and Affiliations
R. Varalakshmi , , Dr. V. Rhymend Uthariaraj
Role of Artificial intelligence in MANET
An adhoc network consists of wireless mobile nodes forming a temporary network without any infrastructure or centralized administration. Mobile Adhoc Networks (MANET) are self-organizing and self-configuring multihop w...
Object Oriented to Aspect Oriented: A Case Study
This work is to present the object oriented software into the aspect oriented software. And also highlight the tangling and scattering problem in the object oriented software development. There is a problem of stru...
Speech based Emotion Recognition with Gaussian Mixture Model
This paper is mainly concerned with speech based emotion recognition. The main work is concerned with Gaussian mixture model (GMM model) which allows training the desired data set from the databases. GMM are known...
Disambiguation of User Queries in Search Engines
With the increasing number of user queries to search engine. it has become necessary to study the area of Information Retrieval. User always expects to get the most appropriate and relevant results to the query. Bu...
Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm
Advanced Encryption Standard (AES) is the symmetric key standard for encryption and decryption. In this work, a 128-bit AES encryption and decryption using Rijndael Algorithm is designed and synthesized using veril...