A Power Efficient Solution to Counter Blackhole and Wormhole Attacks in MANET Multicast Routing

被引:0
作者
Sagwal, Rubal [1 ]
Singh, A. K. [1 ]
机构
[1] Natl Inst Technol, Kurukshetra, Haryana, India
来源
ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II | 2019年 / 956卷
关键词
Mobile ad-hoc (MANET); Heterogeneous nodes; Mobile nodes; Dynamic environment; Multicast routing protocol; Internal attacks; External attacks; Wormhole attack; Black-hole attack; MAODV;
D O I
10.1007/978-981-13-3143-5_45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Routing is of prime importance in mobile ad-hoc networks as it is complex and the environment is extremely dynamic. On the other hand, multicast routing supports one to many communication and it is efficient with channel usage, bandwidth. Routing algorithms define how data travels in a multicast network. In this paper we take a close look at attacks in multicast networks and ponder up on techniques involved in making the operation secure. Power usage should be kept an eye on, as multicasting involves nodes operating at remote locations. The power consumption was made aimed to make as minimal as possible. Mobile ad-hot networks are complex environments that are extremely dynamic. Routing is the first step in setting up a MANET and it is of paramount importance to do it securely and efficiently. Many algorithms have been proposed to secure the routing. However, the operation is still a grey block with multiple major security challenges. In this paper we take a deeper look at techniques in making more robust and secure.
引用
收藏
页码:547 / 556
页数:10
相关论文
共 25 条
[1]  
Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
[2]  
Bhattacharyya S, 2001, IMW 2001: PROCEEDINGS OF THE FIRST ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP, P39
[3]   A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks [J].
Borkar, Gautam M. ;
Mahajan, A. R. .
WIRELESS NETWORKS, 2017, 23 (08) :2455-2472
[4]   Internet-based mobile ad hoc networking [J].
Corson, MS ;
Macker, JP ;
Cirincione, GH .
IEEE INTERNET COMPUTING, 1999, 3 (04) :63-+
[5]  
Curtmola R., 2015, IEEE T MOBILE COMPUT, V4, P445
[6]  
Galera F.J., 2005, LECT NOTES INFORM P, P339
[7]  
Gheorghe L., 2013, P NETW ED RES 2013 R, P1
[8]  
Jagadeesan S., 2018, CLUSTER COMPUT, P1
[9]  
Marina MaheshK., 2002, ACM SIGMOBILE Mobile Computing and Communications Review, V63, P92, DOI [10.1145/581291.581305, DOI 10.1145/581291.581305]
[10]  
Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955