Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Multicast Routing Protocol against Insider Attacks in MANET


Affiliations
1 Computer Applications Department, Sudharsan Engineering College, Sathyamangalam, Tamilnadu, India
2 Lalgudi Co-Operative Polytechnic College, Lalgudi, Tamilnadu, India
     

   Subscribe/Renew Journal


Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. These networks are vulnerable against many types of insider attacks including black hole attacks and selective data forwarding. Even if many previous works focused on authentication and cryptography techniques, nevertheless these techniques suffer from some weakness. We propose a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results that demonstrate that the proposed protocol effectively mitigates the identified insider attacks.

Keywords

Adversaries, Black Hole Attacks, Insider Attacks, Mobile Hosts.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 167

PDF Views: 3




  • Secure Multicast Routing Protocol against Insider Attacks in MANET

Abstract Views: 167  |  PDF Views: 3

Authors

V. Jayalakshmi
Computer Applications Department, Sudharsan Engineering College, Sathyamangalam, Tamilnadu, India
R. Rameshkumar
Lalgudi Co-Operative Polytechnic College, Lalgudi, Tamilnadu, India

Abstract


Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. These networks are vulnerable against many types of insider attacks including black hole attacks and selective data forwarding. Even if many previous works focused on authentication and cryptography techniques, nevertheless these techniques suffer from some weakness. We propose a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results that demonstrate that the proposed protocol effectively mitigates the identified insider attacks.

Keywords


Adversaries, Black Hole Attacks, Insider Attacks, Mobile Hosts.