Secure multicast routing protocols in mobile ad‐hoc networks

A mobile ad-hoc network MANET is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. Multicast routing provides a bandwidth-efficient means for supporting group-oriented applications. The increasing demand for such applications coupled with the inherent characteristics of MANETs e.g., lack of infrastructure and node mobility have made secure multicast routing a crucial yet challenging issue. Recently, several multicast routing protocols MRP have been proposed in MANETs. Depending on whether security is built-in or added, MRP can be classified into two types: secure and security-enhanced routing protocols, respectively. This paper presents a survey on secure and security-enhanced MRP along with their security techniques and the types of attacks they can confront. A detailed comparison for the capability of the various routing protocols against some known attacks is also presented and analyzed. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Shakil Akhtar,et al.  Mobility and Load Analysis of DSDV and DSR Mobile Ad hoc Routing Protocols , 2010, ICWN.

[2]  Cheng-Chi Lee,et al.  Mobile device integration of a fingerprint biometric remote authentication scheme , 2012, Int. J. Commun. Syst..

[3]  Ahmed. M. Abdel Mo'men,et al.  New attacks and efficient countermeasures for multicast AODV , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.

[4]  Mohamed F. Younis,et al.  Wireless ad hoc networks: technologies and challenges , 2006, Wirel. Commun. Mob. Comput..

[5]  Phillip G. Bradford,et al.  Foundations of Security for Hash Chains in Ad Hoc Networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[6]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[7]  Sushil Jajodia,et al.  Securing MAODV: attacks and countermeasures , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[8]  LeeCheng-Chi,et al.  Mobile device integration of a fingerprint biometric remote authentication scheme , 2012 .

[9]  Xiaohua Jia,et al.  QoS multicast routing in cognitive radio ad hoc networks , 2012, Int. J. Commun. Syst..

[10]  Chun-Chuan Yang,et al.  Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks , 2007, Comput. Commun..

[11]  Ruey-Maw Chen,et al.  Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions , 2012, Int. J. Commun. Syst..

[12]  Lazaros F. Merakos,et al.  A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.

[13]  Xiaohua Jia,et al.  QoS multicast routing by using multiple paths/trees in wireless ad hoc networks , 2007, Ad Hoc Networks.

[14]  Michel Kadoch,et al.  Multicast Routing Protocols in Mobile Ad Hoc Networks: A Comparative Survey and Taxonomy , 2009, EURASIP J. Wirel. Commun. Netw..

[15]  T. Aurisch Optimization techniques for military multicast key management , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[16]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[17]  Christos Politis,et al.  Securing AODV against wormhole attacks in emergency MANET multimedia communications , 2009, MobiMedia.

[18]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[19]  Xue Liu,et al.  Research on multicast routing protocols for mobile ad-hoc networks , 2008, Comput. Networks.

[20]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[21]  Tobias Ginzler,et al.  SEAMAN : A Security-Enabled Anonymous MANET Protocol , 2008 .

[22]  Alexander Tiderko,et al.  A framework for multicast and quality based forwarding in manets , 2005, Communications and Computer Networks.

[23]  Antonio F. Gómez-Skarmeta,et al.  Security Extensions to MMARP Through Cryptographically Generated Addresses , 2005, GI Jahrestagung.

[24]  Chun Chen,et al.  Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..

[25]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[26]  Ahmed. M. Abdel Mo'men,et al.  A survey on security enhanced multicast routing protocols in Mobile Ad hoc Networks , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.

[27]  Shaya Sheikh,et al.  Mobile ad hoc network broadcasting: A multi‐criteria approach , 2011, Int. J. Commun. Syst..

[28]  Angelos D. Keromytis,et al.  Securing MANET Multicast Using DIPLOMA , 2010, IWSEC.

[29]  Reza Curtmola,et al.  BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks , 2007, IEEE Transactions on Mobile Computing.

[30]  Niyazi Odabasioglu,et al.  Performance of joint multilevel/AES‐LDPCC‐CPFSK schemes over wireless sensor networks , 2010, Int. J. Commun. Syst..

[31]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[32]  Zhiming Xu,et al.  A Reliable Multicast Routing Protocol for High-speed Mobile Ad Hoc Networks: R-ODMRP , 2010, J. Softw..

[33]  Michalis Faloutsos,et al.  Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol , 2006, Ad Hoc Networks.

[34]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[35]  David Thaler,et al.  Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.

[36]  Peter Thorsteinson,et al.  NET Security and Cryptography , 2003 .

[37]  Hung-Yu Chien,et al.  Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..

[38]  Young-Chul Shim A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes , 2006, ICCSA.

[39]  Mohamed Younis,et al.  Wireless ad hoc networks: technologies and challenges: Editorials , 2006 .

[40]  V. Palanisamy,et al.  Security in Multicast Routing in Ad Hoc Network , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[41]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[42]  G. Padmavathi,et al.  Dynamic Clustering for QoS based Secure Multicast Key Distribution in Mobile Ad Hoc Networks , 2010 .

[43]  Rajmohan Rajaraman,et al.  Topology control and routing in ad hoc networks: a survey , 2002, SIGA.

[44]  Haïdar Safa,et al.  A load balancing energy efficient clustering algorithm for MANETs , 2010, Int. J. Commun. Syst..

[45]  Refik Molva,et al.  Security in wireless ad hoc networks , 2003 .

[46]  Sahadeo Padhye,et al.  A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..

[47]  Guevara Noubir,et al.  Secure multicast groups on ad hoc networks , 2003, SASN '03.

[48]  D Suganyadevi Dynamic clustering for reliable QoS based secure muticast key distribution in mobile Ad Hoc networks , 2010 .

[49]  Yuh-Min Tseng,et al.  Towards generalized ID-based user authentication for mobile multi-server environment , 2012, Int. J. Commun. Syst..

[50]  Idress Skloul Ibrahim,et al.  A {DSDV}-based Multipath Routing Protocol for mobile Ad-hoc Networks , 2007 .

[51]  Ezedin Barka,et al.  OMAC: A new access control architecture for overlay multicast communications , 2011, Int. J. Commun. Syst..

[52]  Charles E. Perkins,et al.  Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing , 2000 .

[53]  Mohammad Dakhilalian,et al.  Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors , 2012, Int. J. Commun. Syst..

[54]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.