Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/13424
Title: Investigations on secure on demand multicast routing protocols for MANETs
Researcher: Mary Anita, E.A.
Guide(s): Vasudevan, V.
Keywords: Mobile Ad hoc NETwork, Multicast Ad hoc On demand Distance Vector, On Demand Multicast Routing Protocol, Blackhole Secure MAODV (BHS-MAODV)
Upload Date: 28-Nov-2013
University: Anna University
Completed Date: 
Abstract: A Mobile Ad hoc NETwork (MANET) is an autonomous collection of mobile users forming a temporary network that communicate over relatively bandwidth constrained wireless links. Multicast Ad hoc On demand Distance Vector Routing protocol (MAODV) and On Demand Multicast Routing Protocol (ODMRP) do not include any provisions for security. The existing routing protocols are optimized to spread updated routing information quickly when network topology changes without considering the security problem. MAODV and ODMRP messages are basically assumed to be trusted. The authentication mechanism suitable for MANET should be feasible for highly changing network topology with low computational complexity and low bandwidth consumption In this context, a certificate based authentication mechanism has been proposed for security enhancement in reactive multicast routing protocols to counter the influence of malicious nodes. Our simulations show that the proposed techniques can greatly improve the network performance in the presence of malicious nodes. Blackhole Secure MAODV (BHS-MAODV), Blackhole Secure ODMRP (BHS-ODMRP), Wormhole Secure MAODV (WHS-MAODV) and Wormhole Secure ODMRP (WHS-ODMRP) are as effective as MAODV and ODMRP in discovering and maintaining routes in addition to providing the required security. Security is implemented on top of the route discovery process of MAODV and ODMRP. There are no modifications made to the RREQ and RREP messages. Certified RREP messages are appended with the certificates to allow authorized nodes to participate in the routing process. This authentication mechanism eliminates the need for a centralized trusted authority which is not practical in MANETs due to their self organizing nature. Our simulation results show that even though the performance of all multicast protocols degrades, in terms of packet delivery as the number of malicious nodes increases, the impact of the attack is more severe in tree based protocols compared to mesh based protocols for almost all scenarios. newline newline newline
Pagination: xxi, 179
URI: http://hdl.handle.net/10603/13424
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File16.62 kBAdobe PDFView/Open
02_certificates.pdf72.68 kBAdobe PDFView/Open
03_abstract.pdf17.05 kBAdobe PDFView/Open
04_acknowledgement.pdf14.87 kBAdobe PDFView/Open
05_contents.pdf39.91 kBAdobe PDFView/Open
06_chapter 1.pdf70.59 kBAdobe PDFView/Open
07_chapter 2.pdf111.51 kBAdobe PDFView/Open
08_chapter 3.pdf119 kBAdobe PDFView/Open
09_chapter 4.pdf240.63 kBAdobe PDFView/Open
10_chapter 5.pdf68.63 kBAdobe PDFView/Open
11_chapter 6.pdf66.77 kBAdobe PDFView/Open
12_chapter 7.pdf27.09 kBAdobe PDFView/Open
13_references.pdf54.76 kBAdobe PDFView/Open
14_publications.pdf16.57 kBAdobe PDFView/Open
15_vitae.pdf11.79 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: