Volume : III, Issue : V, May - 2013
Providing the Source Authentication and Efficient Mulicast Communication in Wireless Adhoc Networks
G. Prabaharan, P. Nandhini
Abstract :
Ad–hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field and situational awareness, etc. for that it need multicast style of communication traffic. Ad–hoc Networks applications are characterized by the hostile environment that they serve in and by the multicast–style of communication traffic. Authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Efficient and secure source Authentication scheme for Multicast traffic is used for large scale dense ad–hoc networks and the source authentication scheme for secret information asymmetry, hyid asymmetry and time asymmetry. The receiver can verify the message origin using the MAC. This property is used for providing data sources for preventing impersonation.
Keywords :
Article:
Download PDF
DOI : 10.36106/ijar
Cite This Article:
G. Prabaharan, P. Nandhini Providing the Source Authentication and Efficient
Mulicast Communication in Wireless Adhoc Networks Indian Journal of Applied Research, Vol.III, Issue.V May 2013
Number of Downloads : 628
G. Prabaharan, P. Nandhini Providing the Source Authentication and Efficient Mulicast Communication in Wireless Adhoc Networks Indian Journal of Applied Research, Vol.III, Issue.V May 2013
Our Other Journals...
-
International Journal of
Scientific Research Visit Website -
PARIPEX Indian Journal
of Research Visit Website -
Global Journal for
Research Analysis Visit Website