This document surveys various source authentication schemes for multicast transfer in ad-hoc networks, highlighting the importance of securing multicast communication against issues like authentication, non-repudiation, and data integrity. It categorizes authentication methods into those with and without non-repudiation, discussing their advantages and disadvantages. The paper concludes with a proposal of an improved hybrid scheme, tesla++, which addresses specific limitations of existing protocols.