Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Multicast Routing Protocol against Insider Attacks in MANET

V. Jayalakshmi, Dr. R. Rameshkumar

Abstract


Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. These networks are vulnerable against many types of insider attacks including black hole attacks and selective data forwarding. Even if many previous works focused on authentication and cryptography techniques, nevertheless these techniques suffer from some weakness. We propose a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results that demonstrate that the proposed protocol effectively mitigates the identified insider attacks.

Keywords


Adversaries, Black Hole Attacks, Insider Attacks, Mobile Hosts.

Full Text:

PDF

References


V.Jayalakshmi, R.Rameshkumar and S. Geetha,‖ Secure Multi cast Routing Protocol against Black Hole Attacks in MANET‖, Proceedings in CiiT,First International Conference on Adavances in Engineering and Technology,(IACET-2011),May 27-28,2011

Y.B. Ko and N.H. Vaidya, ―Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks,‖ Mobile Networks and Applications, vol. 7, no. 6, 2002.

R. Chandra, V. Ramasubramanian, and K. Birman, ―Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks,‖ Proc. 21st Int’l Conf. Distributed Computing Systems (ICDCS ’01), 2001.

Y.-B. Ko and N.H. Vaidya, ―GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks,‖ Proc. Eighth Ann. Int’l Conf. Network Protocols (ICNP ’00), p. 240, 2000.

E.L. Madruga and J.J. Garcia-Luna-Aceves, ―Scalable Multicasting: The Core-Assisted Mesh Protocol,‖ Mobile Networks and Applications, vol. 6, no. 2, 2001.

S.J. Lee, W. Su, and M. Gerla, ―On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks,‖ Mobile Networks and Applications, vol. 7, 2002.

E. Royer and C. Perkins, Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing, Internet draft, July 2000.

J.G. Jetcheva and D.B. Johnson, ―Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks,‖

P. Papadimitratos and Z. Haas, ―Secure Routing for Mobile Ad Hoc Networks,‖ Proc. Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS ’02), pp. 27-31, Jan. 2002.

Y.-C. Hu, D.B. Johnson, and A. Perrig, ―SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,‖ Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA ’02), June 2002.

Y.-C. Hu, A. Perrig, and D.B. Johnson, ―Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks,‖ Proc. ACM MobiCom, Sept. 2002.

K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E. Belding- Royer, ―A Secure Routing Protocol for Ad Hoc Networks,‖ Proc. 10th Ann. Int’l Conf. Network Protocols (ICNP ’02), Nov. 2002.

S. Marti, T. Giuli, K. Lai, and M. Baker, ―Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,‖ Proc. ACM MobiCom, Aug. 2000.

P. Papadimitratos and Z. Haas, ―Secure Data Transmission in Mobile Ad Hoc Networks,‖ Proc. ACM Workshop Wireless Security (WiSe ’03), pp. 41-50, 2003.

B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, ―An On- Demand Secure Routing Protocol Resilient to Byzantine Failures,‖ Proc. ACM Workshop Wireless Security (WiSe ’02), 2002

S. Roy, V.G. Addada, S. Setia, and S. Jajodia, ―Securing MAODV: Attacks and Countermeasures,‖ Proc. Second Ann. IEEE Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), 2005.

The Network Simulator—ns2, http://www.isi.edu/nsnam/ns/, 2008.

A. Perrig, R. Canetti, D. Song, and J. D. Tygar, ―Efficient and secure source authentication for multicast,‖ in Proc. of NDSS’01, 2001.

S. Roy, V. G. Addada, S. Setia, and S. Jajodia, ―Securing MAODV: Attacks and countermeasures,‖ in Proc. of SECON ’05. IEEE, 2005

J.-P. Hubaux, L. Buttyan, and S. Capkun, ―The quest for security in mobile ad hoc networks,‖ in Proc. of MobiHoc ’01, October 2001.

R. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, ―Bootstrapping security associations for routing in mobile ad-hoc networks,‖ in Global Telecommunications Conference (GLOBECOM), 2003.

L. Zhou and Z. Haas, ―Securing ad hoc networks,‖ IEEE Network Magazine, vol. 13, no. 6, 1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.