By Topic

DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Jin Jing ; Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Qin Zhiguang ; Xiong Hu ; Wang Juan
more authors

The spatiotemporal and just-in-time mobile multicast routing protocol of Wireless Sensor Network, such as Mobicast, which has the perfect usefulness in monitoring Mobile entities, Communications with higher security requirements. Most of the existing Mobicast routing protocols is focused on the group key distribution and management, but also realized under the conditions of static grouping, which can not meet the real-time monitoring applications. A dynamic clustering secure mobile multicast scheme (DCSMS) based on Mobicast and multi-level ¿ TESLA protocol of sensornets is presented in this paper. The multicast clusters are dynamically formed according Mobicast in the scheme. To enhance the safety of multicast communication, authentications of data source and group membership, with the secure protocol ¿ multi-level ¿ TESLA¿, are inserted before cluster-head node is selected and node joins the group. Thus the cluster-head node participate the multicast communication and make the group moving durably as a temporary base-station. Based on the analysis and simulation results, it is shown that the influence to survival lifetime of network and real-time communication because of energy consumption and latency from authentication is acceptable.

Published in:

Frontier of Computer Science and Technology, 2009. FCST '09. Fourth International Conference on

Date of Conference:

17-19 Dec. 2009