Volume : III, Issue : V, May - 2013

Providing the Source Authentication and Efficient Mulicast Communication in Wireless Adhoc Networks

G. Prabaharan, P. Nandhini

Abstract :

Ad–hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field and situational awareness, etc. for that it need multicast style of communication traffic. Ad–hoc Networks applications are characterized by the hostile environment that they serve in and by the multicast–style of communication traffic. Authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Efficient and secure source Authentication scheme for Multicast traffic is used for large scale dense ad–hoc networks and the source authentication scheme for secret information asymmetry, hyid asymmetry and time asymmetry. The receiver can verify the message origin using the MAC. This property is used for providing data sources for preventing impersonation.  

Keywords :

Article: Download PDF   DOI : 10.36106/ijar  

Cite This Article:

G. Prabaharan, P. Nandhini Providing the Source Authentication and Efficient Mulicast Communication in Wireless Adhoc Networks Indian Journal of Applied Research, Vol.III, Issue.V May 2013


Number of Downloads : 628


References :