Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Multicast Conventions
نویسندگان
چکیده
منابع مشابه
Secure Authentication of Multicast protocol for Ad-Hoc Networks
multicast stream authentication and signing is an important and challenging problem.applications such astroop coordination in a combat field, situational awareness, etc.the main challenges are fourfold.first,authenticity must be guaranteed even when only the sender of the data is trusted. Second, unguaranteed connectivity to trusted authorities make known solutions for wired and single hop wire...
متن کاملImproving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways
Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...
متن کاملP2P multicast for pervasive ad hoc networks
During the last few years, the proliferation of miniaturised devices with networking capabilities has provided the technological grounds for pervasive networking environments. It is not visionary to foresee a world of pervasive devices embedded in the environment interacting between them, and with those carried by users, via wireless communications. In addition, fostered by the diffusion of sma...
متن کاملAuthentication Scheme for Mobile Ad Hoc Networks
-The technological progress of recent years made available devices for a large audience, which is powerful enough to randomly form Mobile Ad Hoc Networks (MAHNWs). However the spread of MAHNWs is still obstructed by unsettled technical issues. Besides the topics related to the functionality of a MAHNW (e.g. location of mobile stations, routing protocols) the proliferation of the MAHNWs is condi...
متن کاملProbabilistic reliable multicast in ad hoc networks
When striving for reliability, multicast protocols are most commonly designed as deterministic solutions. Such an approach seems to make the reasoning about reliability guarantees (traditionally binary “all-ornothing”-like) in the face of packet losses and/or node crashes. It is however precisely this determinism that tends to become a limiting factor when aiming at both reliability and scalabi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2013
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-01044145