Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks

نویسندگان

  • Amit Chopra
  • Rajneesh Kumar
چکیده

Multicast group communication over mobile ad hoc networks has various challenges related to secure data transmission. In order to achieve this goal, there is a need to authenticate the group member as well as it is essential to protect the application data, routing information, and other network resources etc. Multicast-AODV (MAODV) is the extension of an AODV protocol, and there are several issues related to each multicast network operation. In the case of dynamic group behavior, it becomes more challenging to protect the resources of a particular group. Researchers have developed different solutions to secure multicast group communication, and their proposed solutions can be used for resource protection at different layers i.e. application layer, physical layer, network layer, etc. Each security solution can guard against a particular security threat. This research paper introduced a self-organized hash based secure routing scheme for multicast ad hoc networks. It uses group Diffie-Hellman method for key distribution. Route authentication and integrity, both are ensured by generating local flag codes and global hash values. In the case of any violation, route log is monitored to identify the malicious activities. Keywords—Security; Multicast; Group Communication; MAODV; Key management; HASH

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hash based Secure Multicast Routing in Mobile Ad Hoc Network

Mobile Ad Hoc Network (MANET) consists of number of mobile nodes which follows a dynamic topology. In Nodes in MANET moves in an undefined manner and each node is acted as a mobile router. In this dynamic architecture, a malicious node is capable of disrupting the routing messages by refusing to forward routing messages, or it can inject the wrong routing packets and also modifies routing infor...

متن کامل

ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks

In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures to dynamically establish mesh-based multicast routing zones along the path from the multicast source node to the multicast receivers. Control packet flooding is employed inside multicast zones, thus multicast overhead...

متن کامل

An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks

In ad hoc networks, designing a secure routing protocol is critical. The FLSL (FuzzyLogicBased Security-Level Routing Protocol) routing protocol is proposed in this paper. The basic idea of FLSL is to utilize the “local multicast” mechanism and the Security-Level to select the highest Security-Level route. The proposed algorithm of Security-Level is an adaptive fuzzy logic based algorithm that ...

متن کامل

Performance Comparison of Routing Attacks in Manet and Wsn

Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...

متن کامل

Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET

Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, bandwidth, and energy resources. Additionally, frequent packet loss errors require a security solution that can tolerate missed packets. The existing cryptography techniques are in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016