SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providing complete security in such networks. This paper proposes a efficient Group Based Multicast Hierarchy (GBMH) algorithm for secret multicast communication, in which source nodes used the Secure Ad hoc On Demand Distance Vector (SAODV) protocol is an extension of the AODV protocol. The Secure AODV scheme is based on the assumption that each node possesses certified public keys of all network nodes. The SAODV protocol collects its 1 hop neighbours to form group. This protocol sends acknowledgement for each transmission in order to reduce the retransmission. Membership dynamism was overcome by electing local controllers and with periodic updates of node join and leave information using multicast hierarchy. The performance is studied in terms of average end to end delay and fault tolerance in multicast transmission.
Authors and Affiliations
R. Varalakshmi , , Dr. V. Rhymend Uthariaraj
Approved Protocol For Reliability In Peer to Peer Networks
An important issue in peer-to-peer networks is discussed in this paper. peer-to-peer networks appeared as common method of sharing huge volume of data. These networks allow users to share their resources as completely di...
Energy Efficient Protocol for Clustered Cooperative Sensor Network
Energy efficiency is the major problem in wireless sensor networks. We introduced the Cooperative communication protocol in wireless sensor networks (WSN) for establishment of cooperative clusters during transmission of...
Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence
Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Interference Mitigation by CDMA RAKE Receiver With Walsh-...
A performance evaluation of various security assessments in WiMAX
One of the technologies that can lay the foundation for the next generation (fourth generation [4G]) of mobile broadband networks is popularly known as WiMAX. WiMAX stands for worldwide interoperability for microwave...
A Java Applet Based Tool for Histogram Equalization and Edge Detection
Edge detection is a fundamentally important operation in image processing. It is the foundation of feature extraction and image information interpretation. It gives a description of the curvature of objects in an...