Analysing the Effect of Cluster Strategies in Multicast Traffic using TAM Protocol for Ad-hoc Networks

Deepakraj S*, Thamilselvan R.**
* M.E., Department of Information Technology, Kongu Engineering College, Erode.
** Associate Professor, Kongu Engineering College, Erode.
Periodicity:October - December'2013
DOI : https://doi.org/10.26634/jwcn.2.3.2555

Abstract

Ad-hoc networks generally play a vital role in emerging technologies. The limited communication and computation resources, the unguaranteed connectivity to trusted authorities make known security solutions for wired networks. A novel Tiered Authentication scheme for Multicast traffic (TAM) has large scale of ad-hoc networks. Nodes are grouped into the cluster. Cross-cluster multicast traffic includes a Message Authentication Code (MAC) that is based on set of keys. Each cluster uses unique subset of keys. TAM is combination of secret information asymmetry and the time information asymmetry for inter cluster and intra cluster networks. The topologies used are flat, spanning tree, balanced tree to reduce bandwidth overhead and delivery delay. These topologies are compared for numerical and analytical results that demonstrate the advantage of TAM.

Keywords

Multicast Communication; Message Authentication; Ad-Hoc Networks; Network Topologies

How to Cite this Article?

Deepakraj, S., and Thamilselvan, R. (2013). Analysing The Effect of Cluster Strategies In Multicast Traffic Using TAM Protocol for Ad-Hoc Networks. i-manager’s Journal on Wireless Communication Networks, 2(3), 14-19. https://doi.org/10.26634/jwcn.2.3.2555

References

[1]. Azarderskhsh R & Reyhani-Masoleh A, (2011), “Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks,” EURASIP J. Wireless Communication. Network, Vol., article ID 893592.
[2]. Hanaoka G, Nishioka T, Zheng Y, & Imai H, (2012), “A hierarchical non interactive key-sharing scheme with low memory size and high resistance against collusion attacks,” Computer J., Vol. 45, No. 3, pp. 293–303.
[3]. Mohamed Younis, Osama Farrag, & Bryan Althouse, (2012), “TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks,” IEEE Transactions on Network and Service Management, Vol. 9, no. 1.
[4]. Ngai E C H & Lyu M R, (2006), “An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation,” in Proceeding. IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing.
[5]. Perrig, Canetti R, Song D, & Tygar D, (2002), “Efficient authentication and signing of multicast streams over lossy channels,” in Proceeding. IEEE Symposium Security Privacy.
[6]. Royer E M & Perkins C, (2002), “Multicast ad-hoc ondemand distance vector (MAODV) routing,” Internet Draft, University of California, Charles E. Perkins Nokia Research Center.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.