Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

Full Text (PDF, 491KB), PP.92-102

Views: 0 Downloads: 0

Author(s)

A. Amuthan 1,* R. Kaviarasan 2 S. Parthiban 3

1. Department of Computer Science & Engineering, Pondicherry Engineering College, Puducherry, India

2. Department of Computer Science & Engineering, Alpha College of Engineering & Technology, Puducherry, India

3. Department of Computer Science & Engineering, PondicherryUniversity , Puducherry, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2013.10.10

Received: 10 Dec. 2012 / Revised: 27 Apr. 2013 / Accepted: 2 Jul. 2013 / Published: 8 Sep. 2013

Index Terms

MANETs, EGMP, Certificate Key Chaining

Abstract

A Mobile Ad-hoc Network (MANETs) is composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to the security attacks. To add to that, due to the inherent, severe constraints in power, storage and computational resources in the MANET nodes, incorporating sound defense mechanisms against such attacks is also non-trivial. Therefore, interest in research of Mobile Ad-hoc NETworks has been growing since last few years. Security is a big issue in MANETs as they are infrastructure-less and autonomous. The main objective of this paper is to address some basic security concerns in EGMP protocol which is a multicast protocol found to be more vulnerable towards attacks like blackhole, wormhole and flooding attacks. The proposed technique uses the concepts of certificate to prevent these attacks and to find the malicious node. These attacks are simulated using NS2.28 version and the proposed proactive technique is implemented. The following metrics like packet delivery ratio, control overhead, total overhead and End to End delay are used to prove that the proposed solution is secure and robust.

Cite This Paper

A. Amuthan, R. Kaviarasan, S. Parthiban, "Secluding Efficient Geographic Multicast Protocol against Multicast Attacks", International Journal of Information Technology and Computer Science(IJITCS), vol.5, no.10, pp.92-102, 2013. DOI:10.5815/ijitcs.2013.10.10

Reference

[1]K.Aishwarya, N.KannaiahRaju and A. SenthamaraiSelvan, “Counter Measures Against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol In Mobile AD-HOC Networks” -International Journal of Technology And Engineering System(IJTES) Jan –March 2011

[2]Payal N. Raj, Prashant B. Swadas “DPRAODV: A dyanamic learning system against blackhole attack in aodv based manet IJCSI International Journal of Computer Science Issues, Vol. 2, 2009

[3]NitalMistry, Devesh C Jinwala, Member, IAENG, MukeshZaveri“Improving AODV Protocol against Blackhole Attacks” IMCES 2010, MARCH 2010.

[4]Zhaoyu Liu, AnthonyW. Joy, Robert A. Thompson “A Dynamic Trust Model for Mobile Ad Hoc Networks”IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04).

[5]Feng Li, Jie Wu and AvinashSrinivasan “Struggling Against Selfishness and Black Hole Attacks in MANETs”IJCNS 2010.

[6]Mohammad Al-Shurman, Seong-Moo Yoo and Seungjin Park “Black Hole Attack in Mobile Ad Hoc Networks” ACM April-2004.

[7]DrKarim KONATE andAbdourahime GAYE “A Proposal Mechanism against the Attacks: Cooperative Blackhole, Blackmail, Overflow and Selfish in Routing Protocol of Mobile Ad Hoc Network”, International Journal of Future Generation Communication and Networking Vol. 4, No. 2, June, 2011.

[8]A.Amuthan and D. NagamaniAbirami “Multicast security attacks and its counter measures for puma protocol” Int. J. Comp. Tech. Appl., Vol 2 (3), 594-600, 2011.

[9]FaridNa¨ıt-Abdesselam, BrahimBensaou, and TarikTaleb“Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks” (IEEE WCNC), Mar. 2005.

[10]S.Vijayalakshmi and S.AlbertRabara “Weeding Wormhole Attack in MANET Multicast Routing using Two Novel Techniques - LP3 and NAWA2” International Journal of Computer Applications (0975 – 8887) Volume 16– No.7, February 2011

[11]Shang-Ming Jen, Chi-Sung Laih and Wen-Chung Kuo “A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET” ISSN 1424-8220. 2010

[12]WassimZnaidi, Marine Minier and Jean-Philippe Babau “Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information” IEEE 2008.

[13]BounpadithKannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato “A Survey Of Routing Attacks In Mobile Ad Hoc Networks” IEEE Wireless Communications October 2007.

[14]VenkatBalakrishnan, Vijay Varadharajan, UdayTupakula, and Phillip Lucs “Trust Integrate Co-Operative Architecture For Mobile Adhoc Networks”IEEE-2007.

[15]Jian-Hua Song, Fan Hong1, Yu Zhang"Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks", Springer-2004.