MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)
DOI: 10.1109/milcom.1999.822636
|View full text |Cite
|
Sign up to set email alerts
|

AMRIS: a multicast protocol for ad hoc wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
122
0

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 235 publications
(122 citation statements)
references
References 7 publications
0
122
0
Order By: Relevance
“…Even though the security frameworks of existing unicast secure routing protocols like SAODV [5], ARAN [6], SAR [7], Ariadne [11], and SRP [12] can be adapted by multicast routing protocols like M-AODV [9], ODMRP [10], and AMRIS [14], they are still vulnerable to some security threats. The formal analysis of these protocols has uncovered subtle flaws that are otherwise difficult to identify [15,[22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though the security frameworks of existing unicast secure routing protocols like SAODV [5], ARAN [6], SAR [7], Ariadne [11], and SRP [12] can be adapted by multicast routing protocols like M-AODV [9], ODMRP [10], and AMRIS [14], they are still vulnerable to some security threats. The formal analysis of these protocols has uncovered subtle flaws that are otherwise difficult to identify [15,[22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
“…These security frameworks can be adapted by multicast routing protocols like MAODV [9] and ondemand multicast routing protocol (ODMRP) [10]. On the other hand, Ariadne [11] and secure routing protocol (SRP) [12] are based on dynamic source routing (DSR) [13] and therefore can be adapted by ad hoc multicast routing protocol (AMRIS) [14]. But vulnerabilities still exist mainly due to the subtle nature of flaws in these protocols [15].…”
Section: Introductionmentioning
confidence: 99%
“…For example, the cost function to be minimized can be the distance between the source and every destination in the multicast group [4]. A multicast protocol for ad hoc wireless networks (AMRIS) [5] constructs a shared delivery tree rooted at one of the nodes with IDs increasing as they radiate from the source, which reduces the route discovery time and also confines route recovery overhead to the proximity of the link failure.…”
Section: A Multicast Routing Protocolsmentioning
confidence: 99%
“…Flooding is considered in [5] as a possible approach to implementing multicast for highly dynamic environments. Multicast session ids can be assigned dynamically to hosts [6] and their ordering used to direct the multicast flow, organizing hosts in a tree structure rooted at the source of the multicast.…”
Section: Transition From Wired To Wireless Networkmentioning
confidence: 99%