A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network |
Author(s): |
Jyothish K John , Federal Institute of Science And Technology(FISAT) Angamaly, India; Tibin Thomas, Federal Institute of Science And Technology(FISAT) Angamaly, India |
Keywords: |
Digital Signature, Elliptic curves, Hashes, Message Authentication code, UMAC function |
Abstract |
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage |
Other Details |
Paper ID: IJSRDV1I4050 Published in: Volume : 1, Issue : 4 Publication Date: 01/07/2013 Page(s): 1022-1026 |
Article Preview |
|
|