Type of Material: | Thesis |
Title: | The Ad Hoc Networks in Security Sensitive Applications Using Tam A Tiered Authentication of Multicast Protocol |
Researcher: | SRIKKANTHAN, R |
Guide: | KHANAA, V |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2018 |
Language: | English |
Subject: | Computer Science | Computer Science Theory and Methods | Engineering and Technology | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2018; D12CS003 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454834 | |
003 | IN-AhILN | |
005 | 2024-09-19 12:18:46 | |
008 | __ | 240919t2018||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454834 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aSRIKKANTHAN, R|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein|0U-0446 |
245 | __ | |aThe Ad Hoc Networks in Security Sensitive Applications Using Tam A Tiered Authentication of Multicast Protocol |
260 | __ | |aChennai|bBharath University, Chennai|c2018 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2018|oD12CS003 |
520 | __ | |aTAM(Tiered Authentication of Multicast Protocol), which pursues a two tired hierarchical strategy combining both time and secret-information asymmetry in order to achieve scalability and resource efficiency. The performance of TAM has been analysed mathematically and through simulation, confirming its effectiveness. The simulation and analytical results demonstrate the performance advantage of TAM in terms of bandwidth overhead and delivery delay. A new Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks. TAM combines the advantages of the time asymmetry and the secret information asymmetry paradigms and exploits network clustering to reduce overhead and ensure scalability. Multicast traffic within a cluster employs a one-way hash function chain in order to authenticate the message source. |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aComputer Science |
653 | __ | |aComputer Science Theory and Methods |
653 | __ | |aEngineering and Technology |
700 | __ | |aKHANAA, V|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/321485|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.