Secure MANET Communication Using Cluster Based Multicast with Fair Key and Resource Scheduler

نویسنده

  • D. Anitha
چکیده

In current Mobile Adhoc Network (MANET) scenario of social network, Delay Tolerant Networks (DTNs) are needed to handle frequent network partitions and large end-to-end delays for efficient multicasting. Existing scheme presented adaptive multicast routing to handle multicast delivery schemes for DTNs. However performance and reliability obtained on sparsely connected nodes in the MANET social network communication is not up to the required standards. So, this paper presents Energy and Bandwidth-based Fair Queue Scheduling algorithm (EBFQS) and cluster based multicasting (CBM) using Fair Key and Resource scheduler (FKRS) in MANET. The proposed algorithm is able to converge under different network models, where each model reflects a different set of assumptions about the multicasting capabilities of the network. . It introduces a novel data structure for the nodes to communicate and to consider the own load states when forwarding packets. The priorities of packets are assigned according to the current node’s load level. When nodes are leisure, they should help other nodes to construct route first. The cluster is formed with the nodes which has fair key and a possible resource schedules for an effective communication with less network delay. The simulation results show that the proposed EBFQS and Cluster Based Multicasting (CBM) using FKRS in MANET effectively decrease the Energy Usage, Bandwidth, network transmission delay, communication overhead, increased security and clustering effectiveness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Routing Based Data Security in Mobile

Problem statement: A mobile ad-hoc network (MANET) is a self-organizing system of mobile devices followed an infrastructure less framework associated by wireless links. In MANET, there is a possibility of packet data to get lost or hacked by an attacker. So, to improve a secure communication over MANET from attackers, several techniques have been developed. The previous work developed to provid...

متن کامل

Multicast Security Using RSA for Inter Cluster Communication with Rekeying in MANET

In Wireless networks, nodes can communicate through base stations. In this scenario, the communication process takes more time to complete. To reduce this delay time, a Mobile Ad hoc Network is introduced. A Mobile ad hoc Network (MANET) is an infrastructure less network. In this, each node acts as a base station and is responsible for dynamically discovering other nodes it can directly communi...

متن کامل

Efficient Cluster Based Multicast Tree for Secure Multicast Communication for Mobile Ad Hoc Networks

Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, limited resources such as bandwidth, time and power. Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution in mobile adhoc networks. In many multicast interact...

متن کامل

Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...

متن کامل

Performance Characteristics of Cluster -Based Multicast Key Distribution Scheme for Mobile Adhoc Networks

Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013