DocumentCode :
163979
Title :
Continuous authentication of multicast routing for ad-hoc networks
Author :
Jeyasoundari, J.
fYear :
2014
fDate :
8-8 July 2014
Firstpage :
565
Lastpage :
571
Abstract :
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. These applications are characterized by the hostile environment that they serve in and by the multicast-style of communication traffic. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. However, the limited computation and communication resources, the large scale deployment and the unguaranteed connectivity to trusted authorities make known solutions for wired and single-hop wireless networks inappropriate. This work focus on providing Continuous Authentication for Multicast traffic for large scale dense ad-hoc networks. The continuous authentication combines the advantages of the time asymmetry and the secret information asymmetry paradigms in order to avoid message loss and provide data security. This work focus on network clustering scheme to reduce overhead due to computation and ensure scalability. Multicast traffic in a cluster employs message authentication codes (MACs) that are based on a set of keys in order to authenticate the message source. Message authentication codes (MACs) are based on a set of keys. Each cluster uses a unique subset of keys to look for its distinct combination of valid MACs in the message in order to authenticate the source. The confidentiality of source is provided by using RSA and DES algorithm during cross-cluster message transfer.
Keywords :
ad hoc networks; message authentication; multicast communication; telecommunication network management; telecommunication network routing; telecommunication security; telecommunication traffic; ad-hoc networks; communication traffic; cross-cluster message transfer; etwork management; message authentication codes; multicast routing; multicast traffic; network clustering; single-hop wireless networks; troop coordination; wired wireless networks; Ad hoc networks; Authentication; Clustering algorithms; Conferences; Cryptography; Peer-to-peer computing; Receivers; Multicast communications; ad-hoc networks; message authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Current Trends in Engineering and Technology (ICCTET), 2014 2nd International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-7986-8
Type :
conf
DOI :
10.1109/ICCTET.2014.6966361
Filename :
6966361
Link To Document :
بازگشت