Continuous Authentication of Multicast Routing For Ad-Hoc Networks

被引:0
|
作者
Jeyasoundari, J. [1 ]
机构
[1] Bharath Niketan Engn Coll, Theni, Tamil Nadu, India
关键词
Multicast communications; message authentication; ad-hoc networks;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. These applications are characterized by the hostile environment that they serve in and by the multicast-style of communication traffic. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. However, the limited computation and communication resources, the large scale deployment and the unguaranteed connectivity to trusted authorities make known solutions for wired and single-hop wireless networks inappropriate. This work focus on providing Continuous Authentication for Multicast traffic for large scale dense ad-hoc networks. The continuous authentication combines the advantages of the time asymmetry and the secret information asymmetry paradigms in order to avoid message loss and provide data security. This work focus on network clustering scheme to reduce overhead due to computation and ensure scalability. Multicast traffic in a cluster employs message authentication codes (MACs) that are based on a set of keys in order to authenticate the message source. Message authentication codes (MACs) are based on a set of keys. Each cluster uses a unique subset of keys to look for its distinct combination of valid MACs in the message in order to authenticate the source. The confidentiality of source is provided by using RSA and DES algorithm during cross-cluster message transfer.
引用
收藏
页码:565 / 571
页数:7
相关论文
共 50 条
  • [1] A multicast routing protocol for ad-hoc networks
    Garcia-Luna-Aceves, JJ
    Madruga, EL
    [J]. IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 784 - 792
  • [2] A Survey of Multicast Routing Protocols in Ad-Hoc Networks
    Baker, Mohammed R.
    Akcayol, M. Ali
    [J]. GAZI UNIVERSITY JOURNAL OF SCIENCE, 2011, 24 (03): : 451 - 462
  • [3] EFFICIENT MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS
    Chuang, Po-Jen
    Chu, Ting-Yi
    [J]. 2013 IEEE 17TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE), 2013, : 149 - 150
  • [4] TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
    Younis, Mohamed
    Farrag, Osama
    Althouse, Bryan
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2012, 9 (01): : 100 - 113
  • [5] Tiered Authentication of Multicast Traffic in Wireless Ad-Hoc Networks
    Younis, Mohamed
    Farrag, Osama
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 3793 - +
  • [6] CGM: A multicast routing protocol for mobile ad-hoc networks
    Lin, CR
    Sia, MJ
    Huang, YS
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (12) : 3569 - 3579
  • [7] Overview of Multicast Routing Protocols for Mobile Ad-hoc Networks
    Vijayalakshmi, J.
    Prabu, K.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 256 - 260
  • [8] An architecture to support QoS multicast routing for ad-hoc networks
    An, B
    Kim, DH
    Kim, NS
    [J]. NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1276 - 1281
  • [9] Usefulness of Multicast Routing Protocols for Vehicular Ad-hoc Networks
    Aghdasi, Hadi S.
    Torabi, Nasser
    Rahmanzadeh, Amin
    Aminiazar, Massoud
    Abbaspour, Maghsoud
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 459 - 463
  • [10] A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks
    Luo Junhai
    Ye Danxia
    Xue Liu
    Fan Mingyu
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 78 - 91