CFP last date
20 January 2025
Reseach Article

Secure Multicast Routing in MANETs for PBM Protocol

by A. Amuthan, S. Parthiban, R. Kaviarasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 22
Year of Publication: 2013
Authors: A. Amuthan, S. Parthiban, R. Kaviarasan
10.5120/11710-7283

A. Amuthan, S. Parthiban, R. Kaviarasan . Secure Multicast Routing in MANETs for PBM Protocol. International Journal of Computer Applications. 68, 22 ( April 2013), 9-15. DOI=10.5120/11710-7283

@article{ 10.5120/11710-7283,
author = { A. Amuthan, S. Parthiban, R. Kaviarasan },
title = { Secure Multicast Routing in MANETs for PBM Protocol },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 22 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number22/11710-7283/ },
doi = { 10.5120/11710-7283 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:35.948832+05:30
%A A. Amuthan
%A S. Parthiban
%A R. Kaviarasan
%T Secure Multicast Routing in MANETs for PBM Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 22
%P 9-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-hoc NETwork (MANET) consists of Mobile Nodes (MNs) without any centralized authority. Mobile nodes form a network over radio links due to its infrastructure less environment. Multicast routing plays a significant role in MANETs. Due to its features, such as dynamic network topology, limited bandwidth, and limited battery power, routing in MANETs becomes a tedious task. In the presence of malicious nodes, the MANET is vulnerable to various kinds of attacks. The MANET protocol is found to be more vulnerable due to the lack of centralized authority and also due to its dynamic nature. Position Based Multicast (PBM) protocol does not require any distribution structure and it avoids flooding of control packets. It uses the geographical locations of the intermediate nodes and the destination node to make the message forwarding decisions. Position-based routing is commonly regarded as highly scalable and very robust against frequent topological changes. However, there are several potential security issues for the development of position-based routing protocols. In this paper, we examine the various multicast routing attacks and a suitable countermeasure is provided against attacks using game theory in the existing Position Based Multicast (PBM) protocol in MANETs. The proposed countermeasure is evaluated using the performance metrics namely packet delivery ratio, End to End Delay and Control Overhead.

References
  1. Luo Junhai, Ye Danxia, Xue Liu, and Fan Mingyu, "A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks", In the proceedings of IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, pp. 78-9, ISSN : 1553-877X, March 2009.
  2. N. Shanthi, L. Ganesan And K. Ramar, "Study Of Different Attacks On Multicast Mobile Ad Hoc Network, Journal of Theoretical and Applied Information Technology", Vol. 9 No. 2, pp. 45-51, 2005.
  3. Martin Mauve, Holger Fubler, J¨org Widmer and Thomas Lang, "Position-Based Multicast Routing for Mobile Ad-Hoc Networks" In the proceedings of ACM SIGMOBILE Mobile Computing and Communications, Vol. 7 No. 3, pp. 53-55, DOI: 0. 1145/961268. 961288, 2003.
  4. Chen. K and Nahrstedt. K ,"Effective location-guided tree construction algorithms for small group multicast in MANET", Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
  5. Feng Li, Yinying Yang, Jie Wu,"Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs", In the proceedings of IEEE transactions on systems, man, and cybernetics part b: cybernetics, vol. 40, no. 3, ISSN : 1083-4419, June 2010
Index Terms

Computer Science
Information Sciences

Keywords

MANETs PBM MN impersonation attack replay attack denial of service Flooding attack