{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:03:09Z","timestamp":1772064189503,"version":"3.50.1"},"reference-count":20,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>Multicast is an indispensable communication technique in wireless mesh network (WMN). Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network) that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.<\/jats:p>","DOI":"10.1155\/2016\/1563464","type":"journal-article","created":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T20:33:52Z","timestamp":1459974832000},"page":"1-11","source":"Crossref","is-referenced-by-count":7,"title":["Secure Multicast Routing Algorithm for Wireless Mesh Networks"],"prefix":"10.1155","volume":"2016","author":[{"given":"Rakesh","family":"Matam","sequence":"first","affiliation":[{"name":"Indian Institute of Information Technology, Guwahati, Assam 781001, India"}]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Patna, Patna, Bihar 800013, India"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.12.001"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.05.001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2007.4300987"},{"key":"4","year":"1998"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1023\/a:1020756600187"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2006.170"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2008.134"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2010.194"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0575-z"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.12.013"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4444751"},{"issue":"3","key":"23","first-page":"168","volume":"16","year":"2014","journal-title":"International Journal of Network Security"},{"key":"20","year":"2007","journal-title":"IACR Cryptology ePrint Archive"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_10"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.017"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.05.002"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/11561354_22"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.002"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1002\/sec.720"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-180"}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2016\/1563464.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2016\/1563464.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2016\/1563464.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T08:55:22Z","timestamp":1469523322000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jcnc\/2016\/1563464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":20,"alternative-id":["1563464","1563464"],"URL":"https:\/\/doi.org\/10.1155\/2016\/1563464","relation":{},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"value":"2090-7141","type":"print"},{"value":"2090-715X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}