Abstract
We consider the problem of secure content distribution in multihop mobile ad hoc networks (MANETs), where a source disseminates data to a group of receivers. To ensure an efficient utilization of the network resources, multicast routing is the natural choice to be used at the network level. Although several multicast routing protocols have been proposed [1, 2], their security has only been explored under outsider attacks [3, 4] or under limited insider attacks [5]. Due to the lack of physical security and the susceptibility of devices to theft, it is necessary to design protocols resilient to both outsider and insider attacks.
- E. Royer and C. Perkins, "Multicast ad hoc on-demand distance vector (MAODV) routing," in Internet Draft, 2000.Google Scholar
- M. Gerla, S. Lee, and W. Su, "On-demand multicast routing protocol for ad hoc networks," in Internet Draft, 2000.Google Scholar
- D. Bruschi and E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issues," Mob. Netw. Appl. 7(6), 2002. Google ScholarDigital Library
- T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on ad hoc networks," in Proc. of SASN 2003. Google ScholarDigital Library
- S. Roy, V. G. Addada, S. Setia, and S. Jajodia, "Securing MAODV: Attacks and countermeasures," in Proc. SECON'05, IEEE, 2005.Google ScholarCross Ref
- A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Proceedings of NDSS '01, 2001.Google Scholar
- P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in Proceedings of WiSe 2003. Google ScholarDigital Library
- B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "On the survivability of routing protocols in Ad Hoc wireless networks," in Proceedings of SecureComm '05, IEEE/CreateNet, 2005. Google ScholarDigital Library
- Y. Zhu and T. Kunz, "MAODV implementation for NS-2.26," Technical Report SCE-04-01, Carleton University.Google Scholar
- R. Ghosh and G. Varghese, "Congestion control in multicast transport protocols," Technical Report WUCS-98-19, Washington University.Google Scholar
- K. Tang, K. Obraczka, S.-J. Lee, and M. Gerla, "A reliable, congestion-controlled multicast transport protocol in multimedia multi-hop networks," in Proc. of IEEE WPMC, 2002.Google Scholar
Index Terms
- Secure multicast routing in wireless networks
Recommendations
On-demand multicast routing protocol in multihop wireless mobile networks
An ad hoc network is a dynamically reconfigurable wireless network with no fixed infrastructure or central administration. Each host is mobile and must act as a router. Routing and multicasting protocols in ad hoc networks are faced with the challenge ...
A weight-based clustering multicast routing protocol for mobile ad hoc networks
In mobile ad hoc networks, the mobile nodes can move arbitrarily without any centralised management mechanism. The topology of these networks can be very dynamic due to the mobility of mobile nodes. Under such changeable network topology, multicasting ...
Secure High-Throughput Multicast Routing in Wireless Mesh Networks
Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest ...
Comments