CFP last date
22 April 2024
Reseach Article

Secured and Scalable Multicasting through new SCDMP Protocol in MANET

by Govind V Haldankar, Majusha Deshmukh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 23
Year of Publication: 2014
Authors: Govind V Haldankar, Majusha Deshmukh
10.5120/16933-6948

Govind V Haldankar, Majusha Deshmukh . Secured and Scalable Multicasting through new SCDMP Protocol in MANET. International Journal of Computer Applications. 96, 23 ( June 2014), 17-21. DOI=10.5120/16933-6948

@article{ 10.5120/16933-6948,
author = { Govind V Haldankar, Majusha Deshmukh },
title = { Secured and Scalable Multicasting through new SCDMP Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 23 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number23/16933-6948/ },
doi = { 10.5120/16933-6948 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:33.123212+05:30
%A Govind V Haldankar
%A Majusha Deshmukh
%T Secured and Scalable Multicasting through new SCDMP Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 23
%P 17-21
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In MANET, multicast routing can take full advantage of the shared wireless channel. Wireless communication is defined as sharing of information between one or more systems through wireless links. We propose Secure Core Defined Mesh based protocol (SCDMP) which can scale to a large group size and large network size. The protocol is designed to be complete and collected, and efficient for more reliable operation. Security of the network infrastructure is obtained using standard encryption techniques that permit to achieve both confidentiality and integrity of the exchanged traffic. A hop-by-hop encryption scheme based on the cryptographic functions operating at the data link layer is used in order to secure both data and signaling communications against external attacks. Simulations based on NS2 and glomosim shows that proposed protocol having better performance metrics such as, average End to end Delay, Packet delivery ratio, by varying group size, node density, moving speed, for network range.

References
  1. M. Gerla,S. J. Lee, and W. Su,"On-demand multicast routing protocol (ODMRP) for ad-hoc networks," Internet draft, draft-ietf-manet-odmrp-02. txt,2000.
  2. Olimpjon Shurdi, Rozeta Miho, Bexhet Kamo, Vladi Koliyi, Alban Rakipi,"Performance Analysis of Multicast Routing Protocols MAODV, ODMRP and ADMR for MANETs",2011.
  3. L. Ji and M. S. Corson,"A lightweight adaptive multicast algorithm,"Proc. IEEE GLOBECOM, 1998, pp. 1036–1042.
  4. J. J. Garcia-Luna-Aceves and E. L. Madruga,"Core-assisted mesh protocol," IEEE J. Select. Areas Commun. vol. 17, no. 8, 1999, pp. 1380–1394.
  5. J. J. Garcia-Luna-Acevesand D. Sampath, "Effcient multicast routing in MANETs using prefix labels", Proc. IEEE Int. Conf. Computer Commun and Networks, Aug. 2009, pp. 1–8.
  6. X. Xiang, X. Wang, and Y. Yang, "Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks", IEEE Transactions On Mobile Computing, VOL. 10, NO. 4, April 2011.
  7. Luo Junhai, Ye Danxia, Xue Liu, and Fan Mingyu "A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks", In IEEE Communications Surveys & Tutorials, VOL. 11, NO. 1, FIRST QUARTER 2009.
  8. S. Lee, W. Su, J. Hsu, M. Gerla, and R. Bagrodia,"A performance comparison study of ad hoc wireless multicast protocols", In IEEE INFOCOM, 2000.
  9. E. Alotaibi and B. Mukherjee, "A survey on routing algorithms forwireless Ad-Hoc and mesh networks," Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 56, no. 2, pp. 940–965, October 2011.
  10. M. Zhang and P. H. J. Chong, "Performance Comparison of Flat and Cluster-Based Hierarchical Ad Hoc Routing with Entity and Group Mobility," in Proc. of IEEE Communications Society conference on Wireless Communications & Networking, Budapest, Hungary, 2009, pp. 2450-2455.
  11. R. O. Schmidt and M. A. S. Trentin, "MANETs Routing Protocols Evaluation in a Scenario with High Mobility: MANET Routing Protocols Performance and Behaviour," Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, Salvador, Bahia, pp. 883-886, 2008.
  12. Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi "A Review of Routing Protocols for Mobile Ad-Hoc Networks (MANET) "International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013.
  13. Fabio Martignon, Stefano Paris, Antonio Capone Design and implementation of MobiSEC:"A complete security architecture for wireless mesh networks", Computer Networks 53 (2009) 2192–2207.
  14. Aiswarya Antony, Swarna Parvathi, Akshaya Venkatesan,"Experimental Analysis of Streaming over Mobile Ad hoc Networks using PUMA",Indian Journal of Engineering, Volume 2, Number 3, January 2013.
  15. M. Nagaratna, V. Kamakshi Prasad, Raghavendra Rao,"Performance Evaluation of Mesh - Based Multicast, Routing Protocols in MANET's",(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 7, 2011.
  16. Ravindra Vaishampayan, J. J. Garcia-Luna-Aceves,"Efficient and Robust Multicast Routing in Mobile Ad Hoc Networks".
Index Terms

Computer Science
Information Sciences

Keywords

Mesh Core Ad-Hoc MANET Multicasting