STUDY OF DIFFERENT ATTACKS ON MULTICAST MOBILE AD HOC NETWORK

Multicast network support is becoming an increasingly important technology for both military and commercial distributed and group based applications. The security services such as confidentiality, authenticity and data integrity are necessary for both wired and wireless networks to protect basic applications. In this paper we present a simulation based study of the impact of different types of attacks in mobile ad hoc networks. We consider the most common type of attacks namely Gray hole attack and Worm hole attack. Specifically, we study how these attacks affect the performance metrics of a multicast session such as packet delivery ratio, packet latency and packet-consumed energy.

[1]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[2]  Y. C. Tay,et al.  Ad hoc Multicast Routing protocol utilizing Increasing id-numberS (AMRIS) Functional Specification , 1999 .

[3]  C. Siva Ram Murthy,et al.  A dynamic core based multicast routing protocol for ad hoc wireless networks , 2002, MobiHoc '02.

[4]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[5]  Chong-kwon Kim,et al.  Neighbor supporting ad hoc multicast routing protocol , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[6]  Seungjoon Lee,et al.  Neighbor supporting ad hoc multicast routing protocol , 2000, MobiHoc.

[7]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  Tatsuya Suda,et al.  Bandwidth-efficient multicast routing protocol for ad-hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).

[10]  J. J. Garcia-Luna-Aceves,et al.  The core-assisted mesh protocol , 1999, IEEE J. Sel. Areas Commun..

[11]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[12]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[13]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.