CFP last date
20 May 2024
Reseach Article

Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network

by M. Ellcy Priana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 19
Year of Publication: 2014
Authors: M. Ellcy Priana
10.5120/19017-9933

M. Ellcy Priana . Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network. International Journal of Computer Applications. 108, 19 ( December 2014), 9-10. DOI=10.5120/19017-9933

@article{ 10.5120/19017-9933,
author = { M. Ellcy Priana },
title = { Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 19 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number19/19017-9933/ },
doi = { 10.5120/19017-9933 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:33.174984+05:30
%A M. Ellcy Priana
%T Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 19
%P 9-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ad-hoc network is a dynamic wireless network, composed of mobile nodes without the aid of centralized administration, where nodes have limited transmission range. Security is challenging issue due to the mobility of nodes can lead to dynamic topology, intermediate nodes act as a router can forward packets. Therefore authentication the source and forwarding packets with cryptographic mechanism and valid MACs is inappropriate because the data with encrypted key can send in same path can be modified by the attacker node. This paper presents a clustering mechanism with multi-hop communication and the source authentication is also done. The agent node is developed to verify the key with encrypted data is modified or not. The key management is done by the agent node. This ensure the source forwarding data is modified can be send using different path using dynamic selection of paths. The multicast protocol with hierarchical routing will increase the scalability.

References
  1. "TAM: A Tiered Authentication of Multicast Protocol for Ad-hoc Networks," Mohamed Younis, Osama Farrag and Bryan Althouse, In Proceedings of IEEE Transaction on Network and Service Management, Vol. 9, No. 1,March 2012.
  2. "Secure clustering and symmetric key establishment in heterogenous wireless sensor networks," R. Azarderskhsh and A. Reyhani-Masoleh, In Proceedings of IEEE Transaction on EURASIP J. Wireless Commun. Netw. , Vol. 2011, article ID 893592, 2011.
  3. " Trust management in mobile ad hoc networks using a scalable maturity-based model," P. B. Velloso, et al. , In Proceedings of IEEE Transaction on Network Services Management, vol. 7, no. 3, Sep. 2010.
  4. "A hierarchical identity based key management scheme in tactical mobile ad-hoc networks," F. R. Yu, H. Tang, P. Mason, and F. Wang, In Proceedings of IEEE Transaction on Network Services Management vol. 7, no. 4, pp. 258–267,Dec. 2010.
  5. . "Group-based source authentication protocol for VANETs," Y. Lu, B. Zhou, F. Jia, and M. Gerla, In Proceedings of IEEE GLOBECOM Workshop Heterogeneous, Multi-hop Wireless Mobile Networks, 2010.
  6. "Overlapping multihop clustering for wireless sensor networks," M. Youssef, A. Youssef, and M. Younis, In Proceedings of IEEE Transaction on parallel Distribution System. , vol. 20, no. 12, pp. 1844–1856, Dec. 2009.
  7. "A survey of multicast routing protocols for mobile ad-hoc networks," L. Junhai, Y. Danxia, X. Liu, and F. Mingyu, IEEE Commun. Surveys & Tutorials, vol. 11, no. 1, pp. 78–91, first quarter 2009.
  8. "Location-aware combinatorial key management scheme for clustered sensor networks," M. Younis, K. Ghumman, and M. Eltoweissy, In Proceedings of IEEE Transaction on Parallel Distribution System. , vol. 17, no. 18, pp. 865–882, Aug. 2006.
  9. "An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation," E. C. H. Ngai and M. R. Lyu, in Proceedings of IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing , 2006.
  10. "A survey of clustering schemes for mobile ad hoc networks," J. Y. Yu and P. H. J. Chong, ," IEEE Commun. Surveys & Tutorials, vol. 1, no. 1, pp. 31–48, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Secure authentication multicast communication key managament.