Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P412 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P412Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
Jyoti M.Karbhal , Kishor B. Sadafale
Citation :
Jyoti M.Karbhal , Kishor B. Sadafale, "Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 34-38, 2013. Crossref, https://doi.org/10.14445/22492615/ IJPTT-V3I1P412
Abstract
Keywords
Mobile ad-hoc network (MANET) , group ,Multicast routing protocol, Scalability,Security,RSA.
References
[1] V. Devarapalli and D. Sidhu, “MZR: A Multicast Protocol for
Mobile Ad Hoc Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’01),
2001.
[2] E.M. Royer and C.E. Perkins, “Multicast Operation of the Ad Hoc
On-Demand Distance Vector Routing Protocol,” Proc. ACM/IEEE
MobiCom, pp. 207-218, Aug. 1999.
[3] M. Gerla, S.J. Lee, and W. Su, “On-Demand Multicast Routing
Protocol (ODMRP) for Ad Hoc Networks,” Internet draft, draftietfmanet-odmrp-02.txt, 2000.
[4] C.-C. Chiang, M. Gerla, and L. Zhang, “Forwarding Group
Multicast Protocol (FGMP) for Multichip Mobile Wireless
Networks,” ACM J. Cluster Computing, special issue on mobile
computing, vol. 1, no. 2, pp. 187-196, 1998.
[5] E. Kaplan, Understanding GPS. Artech House, 1996.
[6] S. Basagni, I. Chlamtac, and V.R. Syrotiuk, “Location Aware,
Dependable Multicast for Mobile Ad Hoc Network”, Computer
Networks, vol.36, nos5-6, pp. 659-670, Aug. 2001.
[7] K. Chen and K. Nahrstedt, “Effective Location-Guided Tree
Construction Algorithms for Small Group Multicast in
MANET,” Proc.IEEE INFOCOM, pp. 1180-1189, 2002.
[8] Arunmozhi Annamalai, Venkataramani Yegnanarayanan,” Secured
System against DDoS Attack in Mobile Adhoc Network” WSEAS
TRANSACTIONS on COMMUNICATIONS, ISSN: 2224-2864
Issue 9, Volume 11, September 2012
[9] Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant
Upadhyay,” Different Types of Attacks on Integrated MANETInternet Communication” International Journal of Computer Science
and Security (IJCSS) Volume (4): Issue (3) 265
[10] S.M. Das, H. Pucha, and Y.C. Hu, “Distributed Hashing for
Scalable Multicast in Wireless Ad Hoc Network,” IEEE Trans.
Parallel and Distributed Systems, vol. 19, no. 3, pp. 347-362,
Mar.2008.
[11] M. Transier, H. Fubler, J. Widmer, M. Mauve, and W.
Effelsberg,“A Hierarchical Approach to Position-Based Multicast for
Mobile Ad-Hoc Networks,” Wireless Networks, vol. 13, no. 4, pp.
447-460,Aug. 2007.
[12] X. Xiang, Member, IEEE, X. Wang, Member, IEEE, and Y.
Yang,” Efficient and Scalable Multicasting over mobile Ad Hoc
Networks”, IEEE Trans. MOBILE COMPUTING, VOL. 10, NO. 5,
APRIL 2011