Mobility

Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2

Download Now Free registration required

Executive Summary

Mobile Adhoc NETwork (MANET) with its unique and special characteristics is prone to a host of security threats from within and outside the network. The MANET architecture is well suited for conducting multicast communications as this greatly reduces the number of multicast packets traversing the network. The replication of multicast packets by the intermediate downstream multicast router is demand based and is determined by the number of fresh receivers in the group. This greatly paves way for network resource optimization and a good trail of performance parameters like MPDR, throughput, Jitter and end-to-end delay. It is literally bogging down to construe a localized MANET as a single flat larger group.

  • Format: PDF
  • Size: 229.5 KB