skip to main content
article

Secure multicast routing in wireless networks

Published:01 April 2007Publication History
Skip Abstract Section

Abstract

We consider the problem of secure content distribution in multihop mobile ad hoc networks (MANETs), where a source disseminates data to a group of receivers. To ensure an efficient utilization of the network resources, multicast routing is the natural choice to be used at the network level. Although several multicast routing protocols have been proposed [1, 2], their security has only been explored under outsider attacks [3, 4] or under limited insider attacks [5]. Due to the lack of physical security and the susceptibility of devices to theft, it is necessary to design protocols resilient to both outsider and insider attacks.

References

  1. E. Royer and C. Perkins, "Multicast ad hoc on-demand distance vector (MAODV) routing," in Internet Draft, 2000.Google ScholarGoogle Scholar
  2. M. Gerla, S. Lee, and W. Su, "On-demand multicast routing protocol for ad hoc networks," in Internet Draft, 2000.Google ScholarGoogle Scholar
  3. D. Bruschi and E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issues," Mob. Netw. Appl. 7(6), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on ad hoc networks," in Proc. of SASN 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Roy, V. G. Addada, S. Setia, and S. Jajodia, "Securing MAODV: Attacks and countermeasures," in Proc. SECON'05, IEEE, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Proceedings of NDSS '01, 2001.Google ScholarGoogle Scholar
  7. P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in Proceedings of WiSe 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "On the survivability of routing protocols in Ad Hoc wireless networks," in Proceedings of SecureComm '05, IEEE/CreateNet, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Zhu and T. Kunz, "MAODV implementation for NS-2.26," Technical Report SCE-04-01, Carleton University.Google ScholarGoogle Scholar
  10. R. Ghosh and G. Varghese, "Congestion control in multicast transport protocols," Technical Report WUCS-98-19, Washington University.Google ScholarGoogle Scholar
  11. K. Tang, K. Obraczka, S.-J. Lee, and M. Gerla, "A reliable, congestion-controlled multicast transport protocol in multimedia multi-hop networks," in Proc. of IEEE WPMC, 2002.Google ScholarGoogle Scholar

Index Terms

  1. Secure multicast routing in wireless networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGMOBILE Mobile Computing and Communications Review
            ACM SIGMOBILE Mobile Computing and Communications Review  Volume 11, Issue 2
            April 2007
            72 pages
            ISSN:1559-1662
            EISSN:1931-1222
            DOI:10.1145/1282221
            Issue’s Table of Contents

            Copyright © 2007 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 2007

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader