[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Secure multicast routing protocols in mobile ad-hoc networks

Published: 01 November 2014 Publication History

Abstract

A mobile ad-hoc network MANET is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. Multicast routing provides a bandwidth-efficient means for supporting group-oriented applications. The increasing demand for such applications coupled with the inherent characteristics of MANETs e.g., lack of infrastructure and node mobility have made secure multicast routing a crucial yet challenging issue. Recently, several multicast routing protocols MRP have been proposed in MANETs. Depending on whether security is built-in or added, MRP can be classified into two types: secure and security-enhanced routing protocols, respectively. This paper presents a survey on secure and security-enhanced MRP along with their security techniques and the types of attacks they can confront. A detailed comparison for the capability of the various routing protocols against some known attacks is also presented and analyzed. Copyright © 2013 John Wiley & Sons, Ltd.

References

[1]
Younis M, Ozer SZ. Wireless ad hoc networks: technologies and challenges: editorials. Wireless Communications & Mobile Computing 2006; Volume 6 Issue 7: pp.889-892.
[2]
Rajaraman R. Topology control and routing in ad hoc networks: a survey. SIGACT News 2002; Volume 33 Issue 2: pp.60-73.
[3]
Wu H, Jia X. Qos multicast routing by using multiple paths/trees in wireless ad hoc networks. Ad Hoc Networks 2007; Volume 5 Issue 5: pp.600-612.
[4]
Safa H, Mirza O. A load balancing energy efficient clustering algorithm for MANETs. International Journal of Communication Systems 2010; Volume 23 Issue 4: pp.463-483. Available from: "http://dx.doi.org/10.1002/dac.1084".
[5]
Junhai L, Liu X, Danxia Y. Research on multicast routing protocols for mobile ad-hoc networks. Computer Networks 2008; Volume 52 Issue 5: pp.988-997.
[6]
Mohamed EE, Barka E. OMAC: a new access control architecture for overlay multicast communications. International Journal of Communication Systems 2011; Volume 24 Issue 6: pp.761-775. Available from: "http://dx.doi.org/10.1002/dac.1185".
[7]
Xie L, Jia X, Zhou K. Qos multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems 2012; Volume 25 Issue 1: pp.30-46. Available from: "http://dx.doi.org/10.1002/dac.1285".
[8]
Badarneh OS, Kadoch M. Multicast routing protocols in mobile ad hoc networks: a comparative survey and taxonomy. EURASIP Journal on Wireless Communications and Networking 2009; Volume 2009: pp.26:1-26:42. Available from: "http://dx.doi.org/10.1155/2009/764047".
[9]
Abdel AM, Hamza HS, Saroit IA. A survey on security enhanced multicast routing protocols in mobile ad hoc networks. In HONET '07: Proceedings of the 7th Annual International Conference of High-Capacity Optical Networks and Enabling Technologies HONET, Cairo, Egypt, December 2010; pp.262-268.
[10]
Chen C-L, Lee C-C, Hsu C-Y. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; Volume 25 Issue 5: pp.585-597. Available from: "http://dx.doi.org/10.1002/dac.1277".
[11]
Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems 2012; Volume 25 Issue 5: pp.672-688. Available from: "http://dx.doi.org/10.1002/dac.1289".
[12]
Mala H, Dakhilalian M, Shakiba M. Cryptanalysis of mCryptonA lightweight block cipher for security of RFID tags and sensors. International Journal of Communication Systems 2012; Volume 25 Issue 4: pp.415-426. Available from: "http://dx.doi.org/10.1002/dac.1248".
[13]
Lee C-F, Chien H-Y, Laih C-S. Server-less RFID authentication and searching protocol with enhanced security. International Journal of Communication Systems 2012; Volume 25 Issue 3: pp.376-385. Available from: "http://dx.doi.org/10.1002/dac.1246".
[14]
He D, Chen J, Hu J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems 2012; Volume 25 Issue 2: pp.221-230. Available from: "http://dx.doi.org/10.1002/dac.1265".
[15]
Cam H, Ucan ON, Odabasioglu N, Sonmez AC. Performance of joint multilevel/AES-LDPCC-CPFSK schemes over wireless sensor networks. International Journal of Communication Systems 2010; Volume 23 Issue 1: pp.77-90. Available from: "http://dx.doi.org/10.1002/dac.1047".
[16]
Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; Volume 24 Issue 3: pp.347-362. Available from: "http://dx.doi.org/10.1002/dac.1158".
[17]
Barritt BJ, Sheikh S, Al-Najjar C, Malakooti B. Mobile ad hoc network broadcasting: a multi-criteria approach. International Journal of Communication Systems 2011; Volume 24 Issue 4: pp.438-460. Available from: "http://dx.doi.org/10.1002/dac.1162".
[18]
Mishra A, Nadkarni KM. Security in wireless ad hoc networks. In The Handbook of Ad Hoc Wireless Networks, Ilyas M,Dorf RC eds. CRC Press, Inc.: Boca Raton, FL, USA, 2003; pp.499-549.
[19]
Annadurai P, Palanisamy V. Security in multicast routing in ad hoc network. In ICETET '08: Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology. IEEE Computer Society: Washington, DC, USA, 2008; pp.208-213.
[20]
Chuang Y-H, Tseng Y-M. Towards generalized id-based user authentication for mobile multi-server environment. International Journal of Communication Systems 2012; Volume 25 Issue 4: pp.447-460. Available from: "http://dx.doi.org/10.1002/dac.1268".
[21]
Yang C-C, Tseng L-P. Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks. Computer Communications 2007; Volume 30 Issue 2: pp.261-268.
[22]
Royer EM, Perkins CE. Multicast ad hoc on-demand distance vector MAODV. IETF Internet-Draft, draft-ietf-manet-maodv-00.txt, July 2000.
[23]
Hu Y-C, Perrig A, Johnson DB. Rushing attacks and defense in wireless ad hoc network routing protocols. In WiSe '03: Proceedings of the 2nd ACM Workshop on Wireless Security. ACM: New York, NY, USA, 2003; pp.30-40.
[24]
Nguyen HL, Nguyen UT. A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks 2008; Volume 6 Issue 1: pp.32-46. ISSN 1570-8705.
[25]
Aad I, Hubaux J-P, Knightly EW. Denial of service resilience in ad hoc networks. In MobiCom '04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking. ACM: New York, NY, USA, 2004; pp.202-215.
[26]
Balakrishnan K, Deng J, Varshney PK. TWOACK: preventing selfishness in mobile ad hoc networks. Proceeding of IEEE Wireless Communication and Networking Conference, New Orleans, LA, USA, 2005.
[27]
Panaousis EA, Nazaryan L, Politis C. Securing AODV against wormhole attacks in emergency MANET multimedia communications. In Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering: ICST, Brussels, Belgium, Belgium, 2009; pp.1-7.
[28]
Roy S, Addada V, Setia S, Jajodia S. Securing MAODV: attacks and countermeasures. Proceedings of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, September 2005; pp.521-532.
[29]
Abdel Mo'men A, Hamza H, Saroit I. New attacks and efficient countermeasures for multicast AODV. HONET '07: Proceedings of the 7th Annual International Conference of High-Capacity Optical Networks and Enabling Technologies HONET, Cairo, Egypt, December 2010; pp.51-57.
[30]
Thorsteinson P, Ganesh A. NET Security and Cryptography, 1st edn. Prentice Hall Professional Technical Reference, 2003. ISBN 013100851X.
[31]
Schneier B. Applied Cryptography, 2nd edn. John Wiley & Sons, 1996. ISBN 0-471-11709-9.
[32]
Bellare M, Canetti R, Krawczyk H. Hmac: Keyed-hashing for message authentication. IETF Internet-Draft, draft-ietf-ipsec-hmac-md5, February 1997.
[33]
Bradford PG, Gavrylyako OV. Foundations of security for hash chains in ad hoc networks. Cluster Computing 2005; Volume 8: pp.189-195. Available from: "http://portal.acm.org/citation.cfm?id=1058043.1058061".
[34]
Kaya T, Lin G, Noubir G, Yilmaz A. Secure multicast groups on ad hoc networks. In SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM: New York, NY, USA, 2003; pp.94-102.
[35]
Curtmola R, Nita-Rotaru C. BSMR: byzantine-resilient secure multicast routing in multihop wireless networks. IEEE Transactions on Mobile Computing 2009; Volume 8: pp.445-459. Available from: http://dx.doi.org/10.1109/TMC.2008.134.
[36]
Bongartz HH-J, Ginzler T, Bachran T, Tuset P. SEAMAN: a security-enabled anonymous MANET protocol. In NATO IST-083: Symposium on Military Communication with a Special Focus on Tactical Communications, Prague, Czech Republic, 2008.
[37]
Kalaidasan R, Hemamalini V, Babu AK. SORB: secure on demand resilient to byzantine multicast routing in multihop wireless networks. ISCET 2010: Proceedings of International Symposium on Computer Engineering and Technology, 2010; pp.131-141.
[38]
Ge M, Krishnamurthy SV, Faloutsos M. Application versus network layer multicasting in ad hoc networks: the alma routing protocol. Ad Hoc Networks 2006; Volume 4 Issue 2: pp.283-300.
[39]
Bachran T, Bongartz H, Tiderko A. A framework for multicast and quality based forwarding in MANETs. In CCN 05: Proceedings of the 3rd IASTED International Conference on Communications and Computer Networks. ACTA Press: Marina del Rey, USA, 2005; pp.120-125.
[40]
Aurisch T. Optimization technique for military multicast key management. In Unclassified Proceedings of the IEEE MILCOM, Vol.Volume 4. IEEE: Atlantic City, 2005; pp.2570-2576.
[41]
Zhang Y, Liu W, Lou W, Fang Y. MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Transactions on Wireless Communications 2006; Volume 5: pp.2376-2385.
[42]
Zhiming X, Yu W, Jingguo Z. A reliable multicast routing protocol for highspeed mobile ad hoc networks: R-ODMRP. Journal of Software 2009; Volume 5 Issue 1: pp.20-27.
[43]
Shim Y-C. A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes, Vol.Volume 3981/2006. Springer :Berlin / Heidelberg, 2006.
[44]
Alicherry M, Keromytis AD. Securing MANET multicast using DIPLOMA. IWSEC: Proceedings of the The 5th International Workshop on Security, IWSEC2010, Kobe, Japan, 2010; pp.232-250.
[45]
Devaraju S, Ganapathi P. Dynamic clustering for QoS based secure multicast key distribution in mobile ad hoc networks. IJCSI International Journal of Computer Science 2010; Volume 7 Issue 1-2: pp.30-37.
[46]
Galera FJ, Ruiz PM, Gomez-skarmeta AF, Kassler A. Security extensions to MMARP through cryptographically generated addresses. Lecture Notes on Informatics 2005; Volume P-68: pp.339-343.
[47]
Lee SJ, Su W, Gerla M. On-demand multicast routing protocol in multihop wireless mobile networks. Mobile Networks and Applications 2002; Volume 7 Issue 6: pp.441-453. Available from: "http://dx.doi.org/10.1023/A:1020756600187".
[48]
Estrin D, Farinacci D, Helmy A, Thaler D, Deering S, Handley M, Jacobson V, Liu C, Sharma P, Wei L. Protocol Independent Multicast-Sparse Mode PIM-SM: Protocol Specification. RFC Editor :United States, 1998.
[49]
Dong X, Puri A. A DSDV-based multipath routing protocol for ad-hoc mobile networks. ICWN: International Conference on Wireless Networks, Las Vegas, USA, 2002.
[50]
Ruiz PM, Gomez-Skarmeta A, Groves I. The MMARP protocol for efficient support of standard ip multicast communications in mobile ad hoc access networks. IST: Proceedings of the IST Mobile and Wireless Communications Summit, aveiro, Portugal, 2003; pp.478-482.
[51]
Xenakis C, Laoutaris N, Merakos L, Stavrakakis I. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Computer Networks 2006; Volume 50 Issue 17: pp.3225-3241.

Cited By

View all
  • (2016)A comparative survey of security solutions for multicast and unicast routing protocols in mobile ad hoc networksInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2016.07722110:3(232-249)Online publication date: 1-Jan-2016
  • (2016)Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networksWireless Networks10.1007/s11276-015-1065-222:3(1035-1059)Online publication date: 1-Apr-2016
  • (2014)Performance evaluation of mobile ad hoc networks under flooding-based attacksInternational Journal of Communication Systems10.1002/dac.261527:12(4328-4345)Online publication date: 1-Dec-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Communication Systems
International Journal of Communication Systems  Volume 27, Issue 11
November 2014
1060 pages
ISSN:1074-5351
EISSN:1099-1131
Issue’s Table of Contents

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 01 November 2014

Author Tags

  1. mobile ad-hoc network MANET
  2. mobile node MN
  3. multicast routing attacks
  4. multicast routing protocols MRP
  5. security techniques
  6. survey

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)A comparative survey of security solutions for multicast and unicast routing protocols in mobile ad hoc networksInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2016.07722110:3(232-249)Online publication date: 1-Jan-2016
  • (2016)Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networksWireless Networks10.1007/s11276-015-1065-222:3(1035-1059)Online publication date: 1-Apr-2016
  • (2014)Performance evaluation of mobile ad hoc networks under flooding-based attacksInternational Journal of Communication Systems10.1002/dac.261527:12(4328-4345)Online publication date: 1-Dec-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media