System Maintenance:
There may be intermittent impact on performance while updates are in progress. We apologize for the inconvenience.
By Topic

Countermeasures against Multicast attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sreenath, N. ; Dept. of CSE, Pondicherry Eng. Coll., Pondicherry, India ; Amuthan, A. ; Selvigirija, P.

Mobile Ad-hoc NETwork which shows promising applications have now gained significant importance in research as well as in practice, due to their autonomous and self-maintaining nature. Unlike other types of networks, MANETs are usually deployed without a centralized control unit. Hence, mutual cooperation amongst the participating entities forms the basis for determining the routes to the destination. This aspect along with the fact that MANET nodes are often constrained in power, storage and computational resources, make MANETs vulnerable to various communications security related attacks. Therefore, the direct application of the conventional routing algorithms is infeasible here. Numerous attempts can be found in the literature that concentrates on improving the security of the routing protocols for MANETs. However, according to our analysis, none of the routing protocols are complete by itself. Therefore, in this paper we focus on improving the Secure Enhanced-On Demand Multicast Routing Protocol (EODMRP) to safeguard it against flooding and blackhole attacks. The proposed solutions are implemented and tested using GloMoSim (2.03). The performance analysis carried out shows improvement in packet delivery ratio in presence of blackhole attack, with marginal rise in average end-to-end delay and normalized routing overhead. The proposed mechanism for flooding attack works even when the identity of the malicious nodes is unknown and does not use any additional network bandwidth. It is simple to implement and maintains or improves network throughput when there are no malicious nodes but the network is congested with excess traffic.

Published in:

Computer Communication and Informatics (ICCCI), 2012 International Conference on

Date of Conference:

10-12 Jan. 2012