Title : The Ad Hoc Networks in Security Sensitive Applications Using Tam A Tiered Authentication of Multicast Protocol

Type of Material: Thesis
Title: The Ad Hoc Networks in Security Sensitive Applications Using Tam A Tiered Authentication of Multicast Protocol
Researcher: SRIKKANTHAN, R
Guide: KHANAA, V
Department: Department of Engineering and Technology(Computer Science and Engineering)
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2018
Language: English
Subject: Computer Science
Computer Science Theory and Methods
Engineering and Technology
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2018; D12CS003
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454834
003IN-AhILN
0052024-09-19 12:18:46
008__240919t2018||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454834
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aSRIKKANTHAN, R|eResearcher
110__|aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aThe Ad Hoc Networks in Security Sensitive Applications Using Tam A Tiered Authentication of Multicast Protocol
260__|aChennai|bBharath University, Chennai|c2018
300__|dDVD
502__|bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2018|oD12CS003
520__|aTAM(Tiered Authentication of Multicast Protocol), which pursues a two tired hierarchical strategy combining both time and secret-information asymmetry in order to achieve scalability and resource efficiency. The performance of TAM has been analysed mathematically and through simulation, confirming its effectiveness. The simulation and analytical results demonstrate the performance advantage of TAM in terms of bandwidth overhead and delivery delay. A new Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks. TAM combines the advantages of the time asymmetry and the secret information asymmetry paradigms and exploits network clustering to reduce overhead and ensure scalability. Multicast traffic within a cluster employs a one-way hash function chain in order to authenticate the message source.
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aComputer Science
653__|aComputer Science Theory and Methods
653__|aEngineering and Technology
700__|aKHANAA, V|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/321485|yShodhganga
905__|afromsg

User Feedback Comes Under This section.