GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference 2009
DOI: 10.1109/glocom.2009.5425260
|View full text |Cite
|
Sign up to set email alerts
|

Tiered Authentication of Multicast Traffic in Wireless Ad-Hoc Networks

Abstract: Multicast streams are the dominant application traffic pattern in many mission critical ad-hoc networks. The limited computation and communication resources, the large scale deployment and the unguaranteed connectivity to trusted authorities make known security solutions for wired and singlehop wireless networks inappropriate for such application environment. This paper promotes a novel Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks. Nodes are grouped into cluste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…TAM aims to decrease the overhead of authentication in addition to provide efficient security. Unlike (Younis and Farrag, 2009), we provide authentication using a simple, yet powerful, tweak to network coding already in use in the network under investigation.…”
Section: Multicast Authenticationmentioning
confidence: 98%
See 1 more Smart Citation
“…TAM aims to decrease the overhead of authentication in addition to provide efficient security. Unlike (Younis and Farrag, 2009), we provide authentication using a simple, yet powerful, tweak to network coding already in use in the network under investigation.…”
Section: Multicast Authenticationmentioning
confidence: 98%
“…Studer et al (2008) modified the well-known TESLA Scheme so that it becomes resilient to Denial of Service (DOS) attacks, especially in vehicular ad hoc networks. Younis and Farrag (2009) promotes a Tiered Authentication scheme for multicast traffic (TAM). TAM assigns a subset of keys for each cluster in the network.…”
Section: Multicast Authenticationmentioning
confidence: 99%
“…In this paper, we bring up a method called Cluster-based [10][11] [12][13] [14][15] [16][17] [18][19] [20][21] [22][23] [24] Power Management (CPM) to decrease the power consumption of mobile phones. A necessity of IEEE 802.11 power management protocol for ad hoc networks is that each mobile host must get timing synchronization in one hop distance.…”
Section: Introductionmentioning
confidence: 99%