High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network


Jyothish K John , Federal Institute of Science And Technology(FISAT) Angamaly, India; Tibin Thomas, Federal Institute of Science And Technology(FISAT) Angamaly, India


Digital Signature, Elliptic curves, Hashes, Message Authentication code, UMAC function


An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage

Other Details

Paper ID: IJSRDV1I4050
Published in: Volume : 1, Issue : 4
Publication Date: 01/07/2013
Page(s): 1022-1026

Article Preview

Download Article