CFP last date
22 April 2024
Reseach Article

Secluding RSGM Protocol against Multicast Attacks

by A. Amuthan, S. Parthiban, R. Kaviarasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 22
Year of Publication: 2013
Authors: A. Amuthan, S. Parthiban, R. Kaviarasan
10.5120/11529-7353

A. Amuthan, S. Parthiban, R. Kaviarasan . Secluding RSGM Protocol against Multicast Attacks. International Journal of Computer Applications. 67, 22 ( April 2013), 31-37. DOI=10.5120/11529-7353

@article{ 10.5120/11529-7353,
author = { A. Amuthan, S. Parthiban, R. Kaviarasan },
title = { Secluding RSGM Protocol against Multicast Attacks },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 22 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number22/11529-7353/ },
doi = { 10.5120/11529-7353 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:10.002099+05:30
%A A. Amuthan
%A S. Parthiban
%A R. Kaviarasan
%T Secluding RSGM Protocol against Multicast Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 22
%P 31-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the presence of malicious nodes, one of the main challenges in MANETs is to design a novel, scalable and robust Geographic Multicast Protocol (RSGM) that can protect MANETs from various routing attacks. The vulnerabilities in the RSGM protocol were explored and various attacks like blackhole, wormhole and flooding attack are simulated. Several virtual architectures are used in the protocol without need of maintaining state information for more robust and scalable membership management and packet forwarding in the presence of high network dynamics due to unstable wireless channels and node movements. Specifically, scalable and efficient group membership management is performed through a virtual-zone-based structure, and the location service for group members is integrated with the membership management. Both the control messages and data packets are forwarded along efficient tree-like paths, but there is no need to explicitly create and actively maintain a tree structure. The stateless virtual tree-based structures significantly reduce the tree management overhead, support more efficient transmissions, and make the transmissions much more robust to dynamics. Geographic forwarding is used to achieve scalability and robustness. Differences mechanisms have been proposed using various techniques to countermeasure the routing attack against MANETs. However, these mechanisms are not suitable for MANETs resource constraints. In a mobile scenario, mesh based protocols outperformed tree-based protocols. The availability of alternate routes provided robustness and scalability. The different routing attacks, such as flooding, blackhole and wormhole are simulated using NS2. 28 version and efficient proactive counter measure is provided using HMAC function which would lead to a drastic change is performance metric like packet delivery ratio, control overhead and end to end delay which is used to prove that the proposed solution was efficient and robust.

References
  1. K. Aishwarya, N. Kannaiah Raju and A. Senthamarai SelvanCounter "Measures Against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol In Mobile ADHOC Networks" -International Journal of Technology And Engineering System(IJTES) Jan –March 2011
  2. Semih Dokurer, Y. M. Erten and Can Erkin Acar "Performance analysis of ad-hoc networks under black hole attacks" IEEE 2007.
  3. Asmaa Adnane and Christophe Bidan, Rafael Timoteo de Sousa Junior " Trust-based countermeasures for securing OLSR protocol", International Conference on Computational Science and Engineering.
  4. E. A. Mary Anita, V. Vasudevan, "Black Hole Attack on Multicast Routing Protocols", jcit. Vol. 4. issue2. anita.
  5. Mohammad Al-Shurman , Seong-Moo Yoo and Seungjin Park "Black Hole Attack inMobile Ad Hoc Networks" ACM April-2004.
  6. Hesiri Weerasinghe, Huirong Fu "Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Network: Simulation Implementation and Evaluation".
  7. Weicho Wang, Bharat Bhargava, Yi Lu, Xiaoxin Wu "Defending against Wormhole Attacks in Mobile Ad Hoc Networks", Wiley Journal Wireless Communication and Mobile Computing(WCMC).
  8. S. Vijayalakshmi and S. Albert Rabara "Weeding Wormhole Attack in MANET Multicast Routing using Two Novel Techniques – LP3 and NAWA2" International Journal of Computer Applications (0975 – 8887) vol. 16– No. 7, February 2011.
  9. Preeti Nagrath, Bhawna Gupta " Wormhole Attacks in Wireless Adhoc Network and their Counter Measure: A Survey" IEEE 2011.
  10. Nam Uk Kim, HyunSu Lim, HongShik Park and Minho Kang "Detection of Multicast Video Flooding Attack Using the Pattern of Bandwidth Provisioning Efficiency", IEEE vol. 14 No. 12, December 2010.
  11. Hyojin Kim, Ramachandra Bhargav Chitti, and JooSeok Song "Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks", IEEE Transaction on Consumer Electronics, vol. 56, No 2, May 2010.
  12. W. Wu, J. Cao, J. Yang, and M. Raynal, "Design and Performance Evaluation of Efficient Consensus Protocols for Mobile Ad Hoc Networks," IEEE Trans. Computers, vol. 56, no. 8, pp. 1055-1070, Aug. 2007.
  13. J. Li, J. Jannotti, D. S. J. D. Couto, D. R. Karger, and R. Morris, "A Scalable Location Service for Geographic Ad Hoc Routing," Proc. MOBICOM, pp. 120-130, 2000. 11] J. J. Garcia-Luna Aceves and E.
  14. M. Gerla, S. J. Lee, and W. Su, "On-Demand Multicast Routing Protocol (ODMRP) for Ad Hoc Networks," Internet Draft, draf tietf- manet-odmrp-02. txt, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Blackhole attack Wormhole attack Flooding attack RSGM