Title :
Resilient PUMA (Protocol for Unified Multicasting through Announcement) against internal attacks in Mobile Ad hoc Networks
Author :
Menaka Pushpa, A. ; Kathiravan, K.
Author_Institution :
Dept. of CSE, Easwari Eng. Coll., Chennai, India
Abstract :
In Mobile Ad hoc Networks, entire communication solely depends on multi-hop routing in order to cover the larger area through wireless medium. When MANET is applicable for civilian purpose, the cooperation among nodes creates more security issues. Neighbor dependency without any centralized authority is the major vulnerability to different types of internal attacks. Internal attacks can be triggered either by selfish nodes or malicious nodes. Multicast communication makes this security issue more severe where non group members are also the part of multicast routing structure in this communication. In this paper, we analyzed a mesh-based multicast routing protocol PUMA against various types of protocol-dependent internal attacks. Also we have proposed a solution for two particular internal attacks; watchdog-based data packet dropper attacker identification and validating parent´s information from core using newly added control packet MA-to-Core for MA packet modification attacks. NS2 simulation results are used to observe the response of protocol performance metrics such as PDR and control overhead against internal attacks. Particularly this research work focuses on security vulnerabilities of PUMA routing protocol and evaluate our proposed solutions for internal attacks using simulation results.
Keywords :
mobile ad hoc networks; multicast communication; routing protocols; telecommunication security; MA packet modification attacks; MA-to-core; MANET; NS2 simulation; PDR; PUMA routing protocol; civilian purpose; malicious nodes; mesh-based multicast routing protocol; mobile ad hoc networks; multicast communication; multicast routing structure; multihop routing; neighbor dependency; protocol for unified multicasting through announcement; protocol performance metrics; protocol-dependent internal attacks; resilient PUMA; security vulnerabilities; selfish nodes; watchdog-based data packet dropper attacker identification; wireless medium; Authentication; Mobile ad hoc networks; Multicast communication; Receivers; Routing; Routing protocols; MA-to-core packet; MANET; PUMA; internal attacks; malicious nodes; mesh-based multicast routing protocol; multicast communication; selfish nodes;
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on
Conference_Location :
Mysore
Print_ISBN :
978-1-4799-2432-5
DOI :
10.1109/ICACCI.2013.6637473