CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2

by S.Vijayalakshmi, S.Albert Rabara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 16 - Number 7
Year of Publication: 2011
Authors: S.Vijayalakshmi, S.Albert Rabara
10.5120/2024-2729

S.Vijayalakshmi, S.Albert Rabara . Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2. International Journal of Computer Applications. 16, 7 ( February 2011), 26-33. DOI=10.5120/2024-2729

@article{ 10.5120/2024-2729,
author = { S.Vijayalakshmi, S.Albert Rabara },
title = { Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2 },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 16 },
number = { 7 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 26-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume16/number7/2024-2729/ },
doi = { 10.5120/2024-2729 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:16.529826+05:30
%A S.Vijayalakshmi
%A S.Albert Rabara
%T Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2
%J International Journal of Computer Applications
%@ 0975-8887
%V 16
%N 7
%P 26-33
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Adhoc Network (MANET) with its unique and special characteristics is prone to a host of security threats from within and outside the network. The MANET architecture is well suited for conducting multicast communications as this greatly reduces the number of multicast packets traversing the network. The replication of multicast packets by the intermediate downstream multicast router is demand based and is determined by the number of fresh receivers in the group. This greatly paves way for network resource optimization and a good trail of performance parameters like MPDR, Throughput, Jitter and End-to-End Delay. It is literally bogging down to construe a localized MANET as a single flat larger group. So the concept of orchestrating hierarchical group architecture within MANET dawned which led to the definition of Iolus framework. The hierarchical secure multicast distribution tree created within MANET backed by Iolus framework is prone to a array of attacks. One such prominent insider attack is wormhole attack where the two colluding adversaries conspire to short-circuit the flow of packets to a foreign network through an out-of-band high bandwidth link. The implication of this attack in unicast routing of MANET is less pronounced due to the limited number of participating entities. But this attack has a large telling effect on multicast routing as it involves multiple receivers and numerous intermediate multicast routers. The possibility of compromising the internal group node as a wormhole colluding agent is more common in multicast than in unicast. This threat marks an unprecedented intensity by divulging more faction of data thereby rendering the remedial process a huge flop. The real intent of the attacker is not to disrupt the multicast communication but in abetting the mass divulgence of multicast data to unauthorized group members. Two novel solutions viz., Limiting Packet Propagation Parameter (LP3) and Neighbor Aware Wormhole Adversary Axing (NAWA2) has been proposed to counter this menace.

References
  1. V.Varadharajan, R.Shankaran and M.Hitchens, “Security for Cluster Based Ad hoc Networks”, Elsevier Computerscience.com, Computer Communications, October 2003.
  2. T.Ballardie, J.Crowcroft, “Multicast-Specific Security Threats and CounterMeasures”.
  3. C.M.MCorderio, H.Gossain, D.P.Agarwal, “Multicast Over Wireless Mobile Adhoc Networks: Present and Future Directions”, IEEE Network, January/February 2003.
  4. S.Xu., and V.B. Boppana, “ On Mitigating In-band Wormhole Attacks in Mobile Adhoc Networks”, ICC, IEEE Communications Society 2007.
  5. J.D.Parmar., A.D.Patel., R.H.Jhaveri and B.I.Shah., “ MANET Routing Protocols and Wormhole Attack against AODV”, International Journal of Computer Science & Network Security, Vol.10, No. 4, April 2010.
  6. N.Shanti., L.Ganesan and K.Ramar., “Study of Different Attacks on Multicast MANET”, Journal of Theoretical and Applied Information Technology, 2005-09.
  7. F.Anjum and P.Mouchtaris., “Security for Wireless Adhoc Networks”, Wiley Interscience, A. Johnwiley & Sons, Inc., Publication 2008.
  8. D.Brushi and E.Rosti., “Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues”, Milano, Italy, 2009.
  9. Roy S., Addada V.G., Setia S. and Jajodia S., “Securing MAODV: Attacks and Countermeasures”, Centre for Secure Information Systems, George Mason University, Fairfax, VA 22030.
  10. Mohapatra, P., Gui, C., and Li, J., “Group Communications in Mobile Ad Hoc Networks”, University of California, Davis.
  11. Awerbuch, B., Holmer, D., Rotaru, C.N., and Rubens, H., “An On-Demand Secure Routing Protocol resilient to Byzantine Failures”, Dept. of Computer Science, Johns Hopkins University, Baltimore MD 21218 USA.
  12. Athanasiou, G., Tassiulas, L., and Yovanof, G.S., “Overcoming Misbehavior in Mobile Ad Hoc Networks: An Overview”.
  13. Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., “Security in Mobile Ad Hoc Networks: Challenges and Solutions”, UCLA Computer Science Department.
  14. Marti, S., Giuli, T.J., Lai, K., and Baker, M., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Department of Computer Science, Stanford University.
  15. Nguyen, H.L. and Nguyen, U.T., “A Study on Different Types of Attacks on Multicast in Mobile Ad hoc Network”, Adhoc Networks 6(2008) pages 32-46.
Index Terms

Computer Science
Information Sciences

Keywords

Rushing attack Iolus framework Multicast communication RIMR ROMR