Open Access Open Access  Restricted Access Subscription or Fee Access

Zone Based Secure Multicast Architecture for Intra-Cluster Communication in MANET

(*) Corresponding author

Authors' affiliations



In mobile ad hoc networks (MANETs) in order to enhance efficiency, the multicast MANET is used for a sender node, which sends data packets to a number of nodes in the network through a multicast session. Due to the complicatedness in zone membership management and multicast packet forwarding over a dynamic topology, completion of efficient and scalable multicast with security in MANET becomes a challenge. In order to achieve a secure multicast architecture for MANETS, in this paper, we propose a Zone based Secure Multicast Architecture for Intra-cluster Communication in MANET. Initially, cluster creation is performed. Then, in a broad environment, a zone-based bidirectional tree is constructed and the zone leader is elected using trust value. Trust value is estimated from the Markov trust model. Finally, the secure voting process in the selected zone leader is made by using the elliptic curve discrete algorithm (ECDSA).
Copyright © 2014 Praise Worthy Prize - All rights reserved.


Intra Cluster Communication; Multicast MANET; Elliptic Curve Discrete Algorithm

Full Text:



V. Palanisamy and P.Annadurai, “Impact of Rushing attack on Multicast in Mobile Ad Hoc Network ,” (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2,pp.183 -189,2009

Rizwan R. Rangara, Rupika S. Jaipuria, Gauri N.Yenugwar and P M. Jawandhiya, “Intelligent Secure Routing Model for MANET,” 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Vol. 3,pp 452 – 456, 2010.

N.Shanthi, Dr.Lganesan and Dr.K.Ramar, “Study of Different Attacks on Multicast Mobile Ad Hoc Network,” Journal of Theoretical and Applied Information Technology , 2009

Bhavana.B.Turorikar and M.A.Shukla, “Multicasting over Manet through SEGMP by Secure Zone Leader Election”, International Journal of Computer Trends and Technology, Vol.4, No.2, 2013.

L. Sudha Rani, R.Raja Sekhar, “Detection and Prevention of Wormhole Attack in Stateless Multicasting,” International Journal of Scientific & Engineering Research, Vol 3, No 3, 2012

Ben-Jye Chang and Szu-Liang Kuo, “Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs”, IEEE Transactions on Vehicular Technology,Vol. 58, No. 4,May 2009.

C.Rajan and N.Shanthi, “Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (Manet),” Journal of Theoretical and Applied Information Technology ,Vol .48, NO.3 2013

Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi and Mohammad S. Obaidat, “Detecting Black hole Attacks on DSR-based Mobile Ad Hoc Networks,” 2012 International Conference on Computer, Information and Telecommunication Systems (CITS), pp.1-5 ,2012

Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao and Jiann- Liang Chen, Node for MANET Based on Hybrid Defense Architecture, ” 2011 2nd Intl. Conf on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp1-5 2011

Ajay Prakash Rai, Vineet Srivastava and Rinkoo Bhatia, “Wormhole Attack Detection in Mobile Ad Hoc Networks”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 2, August 2012.

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Commun., vol. 11,no. 1, pp. 38–47, Feb. 2004.

Saravanan TR, Sakthivel P, “Location Based Hierarchical Key Management For Secure Group Communication In MANETS Based On Number Of Receivers,” International Journal Of Research In Engineering And Advanced Technology, Vol.1, Issue 4 , pp 1-7 ,2013

A. A. Pirzada and C. McDonald, “Trust establishment in pure ad hoc networks,”Wirel. Pers. Commun., vol. 37, no. 1/2, pp. 139– 168, Apr.2006.

H. Sun and J. Song, “Strategy proof trust management in wireless ad hoc network,” in Proc. Can. Conf. Elect. Comput. Eng., May 2004, vol. 3,pp. 1593–1596.

W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, “Dynamic balanced key tree management for secure multicast communications,” IEEE Trans. Comput., vol. 56, no. 5, pp. 590– 605, May 2007.

Y. Sun, W. Trappe, and K. J. Ray, “A scalable multicast key management scheme for heterogeneous wireless networks,” IEEE/ACM Trans. Netw.,vol. 12, no. 4, pp. 653–666, Aug. 2004.

M. Choudhary, P. Sharma, and D. Sanghi, “Secure multicast model for adhoc military networks,” in Proc. 12th IEEE Int. Conf. Netw., Nov. 2004,vol. 2, pp. 683–688.

A. Jsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decis. Support Syst., vol. 43, no. 2,pp. 618–644, Mar. 2005.

Network Simulator: http:///

da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.

Ramachandran, P., Murukanantham, D., A Location Based-Energy Aware Routing Approach for Mobile Ad Hoc Networks, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (4), pp. 114-123.

Alzabin, N., Mesleh, A., Hamed, S., Massadeh, S., AlHeyasat, O., AlQaisi, A., A QoS Based DSR Routing Protocol for MANETs Using Bandwidth, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 151-156.

Enshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize