CFP last date
20 December 2024
Reseach Article

Adaptive and Secure Strategy for Multicast Addressing in Mobile Ad Hoc Network

by P. Kaviya Priya, S. Punitha Devi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 3
Year of Publication: 2014
Authors: P. Kaviya Priya, S. Punitha Devi
10.5120/15864-4799

P. Kaviya Priya, S. Punitha Devi . Adaptive and Secure Strategy for Multicast Addressing in Mobile Ad Hoc Network. International Journal of Computer Applications. 91, 3 ( April 2014), 39-42. DOI=10.5120/15864-4799

@article{ 10.5120/15864-4799,
author = { P. Kaviya Priya, S. Punitha Devi },
title = { Adaptive and Secure Strategy for Multicast Addressing in Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 3 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 39-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number3/15864-4799/ },
doi = { 10.5120/15864-4799 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:49.980773+05:30
%A P. Kaviya Priya
%A S. Punitha Devi
%T Adaptive and Secure Strategy for Multicast Addressing in Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 3
%P 39-42
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Location based Multicast Addressing (LMA) is a technique used to distribute information to the multiple nodes surrounded by a particular geographical area. It mainly applied for context aware applications in mobile ad hoc networks (MANETs). In this Location matching process done between middleware of publish/subscribing environment. In this paper introduce, one new feature is implemented for creating context awareness among mobile network to analyze how many users are currently located in the mobile network, and how many of them discarded from the network because of low energy level. The Bandwidth of each node is calculated to know the energy level status. Some of nodes in mobile network utilize more bandwidth. Allocate bandwidth equally to all nodes to avoid packet dropping and also identify the nodes information using keys provided by AES algorithm it is also helpful to improve security in mobile network.

References
  1. R. Baldoni, R. Beraldi, G. Cugola, M. Migliavacca, and L. Querzoni,"Structure-Less Content-Based Routing in Mobile Ad Hoc Networks,"Proc. Int'l Conf. Pervasive Services, 2005.
  2. D. Braginsky and D. Estrin, "Rumor Routing Algorthim for SensorNetworks," Proc. First ACM Int'l Workshop Wireless Sensor Networksand Applications, 2002.
  3. A. Carzaniga, D. S. Rosenblum, and A. L. Wolf, "Achieving Scalability and Expressiveness in an Internet-Scale Event Notification Service," Proc. 19th Ann. ACM Symp. Principles of Distributed Computing, 2000.
  4. S. Castelli, P. Costa, and G. P. Picco, "HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space," Proc. IEEE INFOCOM, 2008.
  5. M. Cilia, L. Fiege, C. Haul, A. Zeidler, and A. P. Buchmann,"Looking into the Past: Enhancing Mobile Publish/Subscribe Middleware," Proc. Second Int'l Workshop Distributed Event-Based Systems, 2003.
  6. G. Cugola and M. Migliavacca, "A Context and Content-Based Routing Protocol for Mobile Sensor Networks," Proc. Sixth European Conf. Wireless Sensor Networks, 2009.
  7. P. Costa, M. Migliavacca, G. P. Picco, and G. Cugola, "Epidemic Algorithms for Reliable Content-Based Publish-Subscribe: An Evaluation," Proc. Int'l Conf. Distributed Computing Systems, 2004.
  8. G. Cugola, A. Margara, and M. Migliavacca, "Context-Aware Publish-Subscribe: Model, Implementation, and Evaluation," Proc. IEEE Symp. Computers and Comm. , 2009.
  9. V. D. Park and M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. IEEE INFOCOM, 1997.
  10. I. Podnar and I. Lovrek, "Supporting Mobility with Persistent Notification in Publish/Subscribe Systems," Proc. Second Int'l Workshop Distributed Event-Based Systems,2004.
  11. E. M. Royer and C. E. Perkins, "Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol," Proc. ACMMobiCom,1999.
  12. P. Sutton, R. Arkins, and B. Segall, "Supporting Disconnectedness-Transparent Information Delivery for Mobile and Invisible Computing," Proc. IEEE/ACM First Int'l Symp. Cluster Computing and the Grid, 2001
  13. J. Yoon, M. Liu, and B. Noble, "Random Waypoint Considered Harmful," Proc. IEEE INFOCOM,2003.
  14. Q. Yuan and J. Wu, "DRIP: A Dynamic Voronoi Regions-Based Publish/Subscribe Protocol in Mobile Networks," Proc. IEEE INFOCOM, 2008.
  15. S. -Y. Ni, Y. -C. Tseng, Y. -S. Chen, and J. -P. Sheu, "The Broadcast Storm Problem in a Mobile Ad Hoc Network," Proc. ACM MobiCom,1999.
  16. R. Meier and V. Cahill, "On Event-Based Middleware for Location-Aware Mobile Applications," IEEE Trans. Software Eng. ,vol. 36, no. 3, pp. 409-430, May/June 2010.
  17. P. Sutton, R. Arkins, and B. Segall, "Supporting Disconnectedness-Transparent Information Delivery for Mobile and Invisible Computing," Proc. IEEE/ACM First Int'l Symp. Cluster Computing and the Grid, 2001.
  18. V. D. Park and M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. IEEE INFOCOM, 1997.
Index Terms

Computer Science
Information Sciences

Keywords

LMA MANETs Publish/Subscribe Context-Aware AES.