Security-Sensitive Applications using TAM: in Multicast Protocol

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
In this paper, the authors has presented TAM, which pursues a two tired hierarchical strategy combining both time and secret-information asymmetry in order to achieve scalability and resource efficiency. The performance of TAM has been analyzed mathematically and through simulation, confirming its effectiveness. The simulation and analytical results demonstrate the performance advantage of TAM in terms of bandwidth overhead and delivery delay. A new Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks.
Download Now

Find By Topic