A Survey of Multicast Routing Protocols inMobile Ad … Survey of Multicast Routing Protocols...

4
A Survey of Multicast Routing Protocols inMobile Ad Hoc Networks Pratikkumar Mistry 1 ,VaghelaVimalkumar B 2 Computer Department, L.D. College of Engineering 1 [email protected] 2 [email protected] Abstract Mobile Ad hoc Network(MANET) is a collection of wireless nodes that communicate with each other without any infrastructure. In MANET routing protocol will decide how the route will be established and maintained. Multicast routing play major role in MANET. Objective of the multicast routing protocol is to send data packet from sender to group of people with minimum use of resources. Recently there are many routing protocols have been proposed. There are many challenges in MANET. Security is the major challenge in MANET. This paper covers routing in MANET,different multicast routing protocol, various types of attacks in multicast routing and possible solutions. KeywordsMANET,multicast routing, multicast routing protocol 1. INTRODUCTION There are two types of model in wireless network. First one is fixed model which consist of large number of mobile nodes and less fixed nodes. It requires fixed infrastructure. Another one is mobile ad hoc network(MANET)[1]. Mobile ad hoc network is the collection of wireless nodes that communicate with each other without any infrastructure. In MANET, nodes work as host as well as router, sowe can say that MANET is a multihopepacket radio network[1][2]. MANET provides us flexibility, mobility, self- organisable network, limited physical security and decentralized management [2]. Routing protocol find the appropriate path from sender to receiver. Routing protocols are used to maintain the routing information. Based on the message delivery semantics routing protocols can be classified into unicast, multicast, broadcast. In unicast routing, there is a single path between sender and receiver. In multicast routing one sender sends data packets to group of people. There are many benefits of multicasting. It reduces the cost of communication, energy consumption, communication delay[2]. Further Exiting Multicast routing protocol can be classified into tree based, mesh based, and hybrid multicast routing protocol. Single path has been established between two nodes in the group in tree based routing protocol.Tree based routing protocol requires minimum number of packet so they are bandwidth efficient and power efficient. As mobility increase link failure also increase. So link failure triggers the reconfiguration of the entire tree. So control overhead is increased [2]. In mesh based routing protocols[2], mesh structures are set of interconnected nodes. There are two ways of route discovery and mesh establishment: by using core or central points for mesh building or by using broadcasting to discover route. Mesh based routing protocols have high robustness and high packet delivery ratio. But they are power inefficient and lot of network and control overhead. Hybrid routing protocols are the combination of both mesh based and tree based routing protocol. There are many challenges in MANET like quality of service, power management, network management, security. Security is the major challenge in multicast routing. There are several security solutions also available. Directly include this solution in the multicast routing protocol is very difficult because of the complexity of multicast routing protocol. But we can take some of mechanism fromthese solutions[1]. This paper is organized as follows: Section II describes some of the multicast routing protocol. Section III describesattacks in multicasting. Section IV covers security solutions. Section V include conclusion. Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292 IJCTA | March-April 2014 Available [email protected] 289 ISSN:2229-6093

Transcript of A Survey of Multicast Routing Protocols inMobile Ad … Survey of Multicast Routing Protocols...

Page 1: A Survey of Multicast Routing Protocols inMobile Ad … Survey of Multicast Routing Protocols inMobile Ad Hoc Networks . ... routing in MANET, ... et al. "A survey of multicast routing

A Survey of Multicast Routing Protocols inMobile Ad Hoc Networks

Pratikkumar Mistry1,VaghelaVimalkumar B2

Computer Department, L.D. College of Engineering

[email protected] [email protected]

Abstract

Mobile Ad hoc Network(MANET) is a

collection of wireless nodes that communicate with each

other without any infrastructure. In MANET routing

protocol will decide how the route will be established

and maintained. Multicast routing play major role in

MANET. Objective of the multicast routing protocol is to

send data packet from sender to group of people with

minimum use of resources. Recently there are many

routing protocols have been proposed. There are many

challenges in MANET. Security is the major challenge in

MANET. This paper covers routing in MANET,different

multicast routing protocol, various types of attacks in

multicast routing and possible solutions.

Keywords— MANET,multicast routing, multicast routing

protocol

1. INTRODUCTION

There are two types of model in wireless

network. First one is fixed model which consist of large

number of mobile nodes and less fixed nodes. It requires

fixed infrastructure. Another one is mobile ad hoc

network(MANET)[1]. Mobile ad hoc network is the

collection of wireless nodes that communicate with each

other without any infrastructure. In MANET, nodes

work as host as well as router, sowe can say that

MANET is a multihopepacket radio network[1][2].

MANET provides us flexibility, mobility, self-

organisable network, limited physical security and

decentralized management [2].

Routing protocol find the appropriate path from

sender to receiver. Routing protocols are used to

maintain the routing information. Based on the message

delivery semantics routing protocols can be classified

into unicast, multicast, broadcast. In unicast routing,

there is a single path between sender and receiver. In

multicast routing one sender sends data packets to group

of people. There are many benefits of multicasting. It

reduces the cost of communication, energy consumption,

communication delay[2]. Further Exiting Multicast

routing protocol can be classified into tree based, mesh

based, and hybrid multicast routing protocol. Single path

has been established between two nodes in the group in

tree based routing protocol.Tree based routing protocol

requires minimum number of packet so they are

bandwidth efficient and power efficient. As mobility

increase link failure also increase. So link failure triggers

the reconfiguration of the entire tree. So control

overhead is increased [2]. In mesh based routing

protocols[2], mesh structures are set of interconnected

nodes. There are two ways of route discovery and mesh

establishment: by using core or central points for mesh

building or by using broadcasting to discover route.

Mesh based routing protocols have high robustness and

high packet delivery ratio. But they are power inefficient

and lot of network and control overhead. Hybrid routing

protocols are the combination of both mesh based and

tree based routing protocol.

There are many challenges in MANET like quality of

service, power management, network management,

security. Security is the major challenge in multicast

routing. There are several security solutions also

available. Directly include this solution in the multicast

routing protocol is very difficult because of the

complexity of multicast routing protocol. But we can

take some of mechanism fromthese solutions[1].

This paper is organized as follows: Section II

describes some of the multicast routing protocol. Section

III describesattacks in multicasting. Section IV covers

security solutions. Section V include conclusion.

Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292

IJCTA | March-April 2014 Available [email protected]

289

ISSN:2229-6093

Page 2: A Survey of Multicast Routing Protocols inMobile Ad … Survey of Multicast Routing Protocols inMobile Ad Hoc Networks . ... routing in MANET, ... et al. "A survey of multicast routing

2. MULTICAST ROUTING PROTOCOLS IN

MANET

2.1MAODV [1] [2]

Multicast ad hoc on demand distance vector protocol

(MAODV) is considered as a part of ad-hoc on demand

distance vector protocol (AODV). When sender wants to

send the message, it will discover route and send the

message. If any node wants to join the group, it will send

the route request message. Each node maintain three

table: unicast route table, multicast route table and group

leader table. Each multicast group have unique address

and group sequence number. Each group has a group

leader who maintain the tree by periodically sending the

group hello message. The member who create the group

first means who join the group first is a group leader.

MAODV is good for small group. Performance will be

degraded in high mobility and high traffic.

2.2 ODMRP[4][5]

On-demand multicast routing protocol(ODMRP) is

mesh based routing protocol. Main purpose of the on-

demand protocol is to reduce the overhead in multicast

route. ODMRP is very effective protocol with high

efficiency. It uses the concept of forwarding group.

There are two phases in ODMRP: route request phase

and reply phase. It uses the join query message to create

the mesh and to refresh the membership information. It

use soft state approach for maintaining the mesh. Node

need not to send the message to leave the group.

2.3 PUMA[6][7]

Protocol for unified multicasting thorough

announcement (PUMA) is a mesh based, reactive,

receiver initiated routing protocol. Each node generates

single control packet that is the multicast announcement.

It contains core Id, group sequence number, distance to

core and group id. Multicast announcement is used to

create mesh, to select core, to maintain the mesh.

PUMA select one core who maintains the mesh. Core

periodically generates and broadcaststhe multicast

announcement. PUMA has high packet delivery ratio

and low overhead compare to other protocol. PUMA is

more stable .It is more robust against the link breakage

compare to other protocol. Performance of the PUMA is

good in high mobility, more receiver and high traffic.

3 ATTACKS IN MANET

There are two types of security attacks in multicasting:

Active attack and Passive attack. Active attack is further

divided into internal attack and external attack. External

attackers are unauthorized multicast group member who

try to disturb the communication by disclosing the

confidential information and group activity. Internal

attacks are done by the authenticated member of the

group. It is difficult to find them because of valid

membership in the group. External attacks can be

stopped by the authentication mechanism and digital

certificate [7].

3.1 Blackhole Attack[8]

In this attack, attacker first implementsthe rushing

attack to become the part of the forwarding group. After

that it will broadcast the message and make other to

believe that he has shortest path to reach the destination.

But attacker never forwards the packet. It absorbing

everything but never giving out it is called blackhole.

Because of it we get very low packet delivery ratio.

2.4 Neighbour Attack[8]

When intermediate node receives the packet, it will

record tit’s id in the packet and forward the packet.

Neighbor attacker simply forwards the packet without

including its id in the packet. So it makes other two

nodes to believe that they are the neighbours, it results a

disrupted route.

3.2 Denial of Service Attack[9]

MANET is vulnerable to denial of service attacks

due to its dynamic nature. One node targets other node

by continuously request for service and consumes the

power and bandwidth.

3.3 Data packet drop Attack[7]

This type of attackers doesn’t cooperate in mesh

establishment or maintenance. It will drop the packet

with or without intension. It is difficult to find as it is a

valid member of the group.

3.4 Data fabrication Attack[7]

This is an internal type attack. Attackers try to

disturb both topology establishment and maintenance

process by fabricating the route establishment packet.

Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292

IJCTA | March-April 2014 Available [email protected]

290

ISSN:2229-6093

Page 3: A Survey of Multicast Routing Protocols inMobile Ad … Survey of Multicast Routing Protocols inMobile Ad Hoc Networks . ... routing in MANET, ... et al. "A survey of multicast routing

3.5 Replay Attack

Same valid data packet is delayed or repeated with

bad intension. It targets fresh route. This attack can be

used for security solutions.

4 SECURITY TECHNIQUES

FORMULTICAST ROUTING PROTOCOL

This part covers the some of the security techniques

for routing protocol in MANET. The solutions are not

specially designed for multicast routing protocol. But it

can be used to cover the attacks that comfort the

multicast routing protocol.

4.1 ARAN[10]

ARAN is an authentication routing protocol. It is

based on AODV routing protocol. There are two stages

in ARAN: first one is preliminary certification process

and second one is route instantiation process. It uses

cryptography certification that provide authentication. It

provides protection against replay attack, rushing attack

and neighbour attack.

4.2 SAODV[12]

Secure ad-hoc on demand distance vector (SAODV)

is an extension version of AODV routing protocol.

Working principle is similar to the AODV. Working of

SAODV is divided into two phase: first one is route

discovery phase and second one is route maintenance

phase. It uses digital signature and hash chain to provide

integrity and authentication. It provides security against

the replay attack and neighbour attack.

4.3 WATCHDOG[13]

This technique is used to prevent data packet drop

and to find the selfish node. In this method every node

maintainsID of the sent packet in buffer. When it

receives acknowledgement from receiver, it will

compare received id with stored id. If it will be matched,

it will be removed from buffer. If packet remains in the

buffer for more than certain time, then failure tally will

be increased. If it will reach to above the failure tally

limit then id of the packet will be removedand the node

will be declared as malicious. Drawback of this method

is high packet overhead. It has some weakness like

ambiguous collision, receiver collisionand

falsemisbehaviour [13].

5 CONCLUSION

Security in multicast routing in MANET is very

crucial. In multicast routing, sender sends data to group

of people. So it reduces the cost of communication.

Multicast routing protocols are more vulnerable to

various types of attack. In this paper we have studied

routing in MANET, some of multicast routing protocol,

attacks in multicasting and some of the security solutions.

In future we will study more multicast routing protocols,

possible attacks and their solutions.

.

REFERENCES

[1] Mo'men, A. M. A., H. S. Hamza, and I. A. Saroit. "A

survey on security enhanced multicast routing protocols

in Mobile Ad hoc Networks." High-Capacity Optical

Networks and Enabling Technologies (HONET), 2010.

IEEE, 2010..

[2] Junhai, Luo, et al. "A survey of multicast routing

protocols for mobile ad-hoc networks." Communications

Surveys & Tutorials, IEEE 11.1 (2009): 78-91.

[3] Al Mazrouei, Maitha Salem, and

SundaravalliNarayanaswami. "Mobile adhoc networks:

A simulation based security evaluation and intrusion

prevention. “Internets Technology and Secured

Transactions (ICITST), 2011 International Conference

for. IEEE, 2011.

[4] Anita, E. A., and V. Vasudevan. "Performance

Evaluation of mesh based multicast reactive routing

protocol under black hole attack." arXiv preprint

arXiv:0908.0222 (2009).

[5] Al-hemyari, Abdulmalek, et al. "A comparative survey

of multicast routing protocol in MANETs." Computer &

Information Science (ICCIS), 2012 International

Conference on. Vol. 2. IEEE, 2012.

[6] Vaishampayan, Ravindra, and Jose Joaquin Garcia-

Luna-Aceves. "Efficient and robust multicast routing in

mobile ad hoc networks." Mobile Ad-hoc and Sensor

Systems, 2004 IEEE International Conference on. IEEE,

2004.

[7] MenakaPushpa, A., and K. Kathiravan. "Resilient

PUMA (Protocol for Unified Multicasting through

Announcement) against internal attacks in Mobile Ad

hoc Networks." Advances in Computing,

Communications and Informatics (ICACCI), 2013

International Conference on. IEEE, 2013.

[8] Manikandan, K. P., R. Satyaprasad, and K.

Rajasekhararao. "A Survey on Attacks and Defense

Metrics of Routing Mechanism in Mobile Ad hoc

Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292

IJCTA | March-April 2014 Available [email protected]

291

ISSN:2229-6093

Page 4: A Survey of Multicast Routing Protocols inMobile Ad … Survey of Multicast Routing Protocols inMobile Ad Hoc Networks . ... routing in MANET, ... et al. "A survey of multicast routing

Networks." International Journal of Advanced Computer

Science and Applications 2.3 (2011).

[9] Marias, Giannis F., et al. "Cooperation enforcement

schemes for MANETs: A survey." Wireless

Communications and Mobile Computing 6.3 (2006):

319-332.

[10] Sanzgiri, Kimaya, et al. "Authenticated routing for ad

hoc networks." Selected Areas in Communications,

IEEE Journal on 23.3 (2005): 598-610.

[11] Mehla, Seema, Bhawna Gupta, and PreetiNagrath.

"Analyzing security of Authenticated Routing Protocol

(ARAN)." International Journal on Computer Science

and Engineering 2.3 (2010): 664-668.

[12] Gürdag, A. Burak, and M. UfukCaglayan. "A Formal

Security Analysis of Secure AODV (SAODV) using

Model Checking." Proceedings of the 8th International

Symposium on Computer Networks ISCN (2007). 2007.

[13] Marti, Sergio, et al. "Mitigating routing misbehavior in

mobile ad hoc networks."International Conference on

Mobile Computing and Networking: Proceedings of the

6th annual international conference on Mobile

computing and networking. Vol. 6. No. 11. 2000.

Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292

IJCTA | March-April 2014 Available [email protected]

292

ISSN:2229-6093