An Empirical Study of Issues in Security and Routing of Multicast Routing Protocols in Mobile Ad Hoc Networks

  • Authors

    • Srinivas Aluvala
    • G. Sunil
    • Nagendar Yamsani
    • Bura Vijay kumar
    https://doi.org/10.14419/ijet.v7i3.34.25353
  • Multicast Routing, Radio Networks, Security Attacks, Routing Protocols.
  • MANET is multi-level rebound radio system that's formed by inventing a arrangement of self-healing hubs. Steering customs arrangements and strengthen classes in the origin and objective hubs in MANET. Collecting concentrated applications happen to be preserved by statistics transport capacity adept Multi Cast steering. Obtaining identifying personalities of MANET's by generating multicasting steering fundamentally procured and to even manage diverse problems. Here's really a newspaper introduced cognizance analysis on Multi Cast directing tradition using combination of strategies for both testing and security different kinds of assaults. By studying distinct anchored Multi Cast directing tradition contradictions are similarly introduced.

     


  • References

    1. [1] C. K. Toh, Ad Hoc Wireless Networks: Protocols and Systems, 1st ed. Upper Saddle River, NJ, USA: Prentice Hall PTR, 2001.

      [2] L. Junhai, X. Liu, and Y. Danxia, “Research on multicast routing protocols for mobile ad-hoc networks,†Comput. Netw., vol. 52, no. 5, pp. 988–997, 2008.

      [3] C. S. R. Murthy and B. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols. Upper Saddle River, NJ, USA: Prentice Hall PTR, 2004.

      [4] A. Mishra and K. M. Nadkarni, “Security in wireless ad hoc networks,†pp. 499–549, 2003.

      [5] P. Annadurai and V. Palanisamy, “Security in multicast routing in adhoc network,†in ICETET ’08: Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology.Washington, DC, USA: IEEE Computer Society, 2008, pp. 208–213.

      [6] X. Zhang and L. Jacob, “Mzrp: an extension of the zone routing protocol for multicasting in manets,†Journal of Information Science and Engineering, vol. 20, no. 3, pp. 535–551, May 2005.

      [7] Deepika Vodnala, Dr. S. Phani Kumar, Srinivas Aluvala “An Analysis Study of Various Multicasting Routing Protocols in MANETsâ€, International Journal of Emerging Technology and Advanced Engineering; Volume 4, Issue 8, August 2014, page(s) 424-429, ISSN 2250-2459, Impact Factor: 2.324.

      [8] E. M. Royer and C. E. Perkins, “Multicast ad hoc on-demand distance vector (maodv),†IETF Internet-Draft, draft-ietf-manet-maodv-00.txt, July 2000.

      [9] E. Mazinan, Z. Arabshahi, and J. Adim, “Comparing amris and odmrp in ad-hoc networks by qualnet,†in ICN ’08: Proceedings of the Seventh International Conference on Networking. Washington, DC, USA: IEEE Computer Society, 2008, pp. 8–13.

      [10] S. J. Lee, W. Su, and M. Gerla, “On-demand multicast routing protocol in multihop wireless mobile networks,†Mob. Netw. Appl., vol. 7, no. 6, pp. 441–453, 2002.

      [11] C.-C. Shen and C. Jaikaeo, “Ad hoc multicast routing algorithm with swarm intelligence,†Mob. Netw. Appl., vol. 10, no. 1-2, pp. 47–59, 2005.

      [12] S. S. Manvi and M. S. Kakkasageri, “Multicast routing in mobile adhoc networks by using a multiagent system,†Inf. Sci., vol. 178, no. 6, pp. 1611–1628, 2008.

      [13] R. S. Sisodia, I. Karthigeyan, B. S. Manoj, and C. Murthy, “A preferred link based multicast protocol for wireless mobile ad hoc networks,†in Proceedings of the IEEE International Conference on Communications, vol. 3, 2003, pp. 2213–2217.

      [14] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing,†United States, 2003.

      [15] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols,†in WiSe ’03: Proceedings of the 2nd ACM workshop on Wireless security. New York, NY, USA: ACM, 2003, pp. 30–40.

      [16] H. L. Nguyen and U. T. Nguyen, “A study of different types of attacks on multicast in mobile ad hoc networks,†Ad Hoc Netw., vol. 6, no. 1, pp. 32–46, 2008.

      [17] I. Aad, J.-P. Hubaux, and E. W. Knightly, “Denial of service resilience in ad hoc networks,†in MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2004, pp. 202–215.

      [18] K. Balakrishnan, J. Deng, and P. Varshney, “Twoack: Preventing selfishness in mobile ad hoc networks,†in Proceeding of IEEE Wireless Comm. and Networking Conf, New Orleans, LA, USA, 2005.

      [19] E. A. Panaousis, L. Nazaryan, and C. Politis, “Securing aodv against wormhole attacks in emergency manet multimedia communications,†in Mobimedia ’09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1–7.

      [20] K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “Authenticated routing for ad hoc networks,†IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 598–610, 2005.

      [21] P. Thorsteinson, . Net Security And Cryptography, 1st ed. Pearson Education, 2003.

      [22] L. Huaizhi, C. Zhenliu, and Q. Xiangyang, “Secure routing in wired networks and wireless ad hoc networks,†in IEEE Computer and Communications Societies, 2004.

      [23] B. Schneier, . Net Security And Cryptography, 2nd ed. John Wiley, 1996.

      [24] P. G. Bradford and O. V. Gavrylyako, “Foundations of security for hash chains in ad hoc networks,†Cluster Computing, vol. 8, pp.189–195, July 2005. [Online]. Available: http://portal.acm.org/citation.cfm?id=1058043.1058061

      [25] Y.-C. Hu, D. B. Johnson, and A. Perrig, “Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks,†2003.

      [26] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,†Wirel. Netw., vol. 11, no. 1-2, pp. 21–38, 2005.

      [27] M. Guerrero-Zapata, SAODV - Secure AODV and Simple Ad Hoc Key Management (SAKM), 2nd ed. VDM Verlag, 2008.

      [28] Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networksâ€, Elsevier - Procedia Computer Science, 92, pp.554 – 561, 2016, DOI. 10.1016/j.procs.2016.07.382.

  • Downloads

  • How to Cite

    Aluvala, S., Sunil, G., Yamsani, N., & Vijay kumar, B. (2018). An Empirical Study of Issues in Security and Routing of Multicast Routing Protocols in Mobile Ad Hoc Networks. International Journal of Engineering & Technology, 7(3.34), 1015-1018. https://doi.org/10.14419/ijet.v7i3.34.25353