A Survey of Multicast Routing Protocols inMobile Ad Hoc Networks
Pratikkumar Mistry1,VaghelaVimalkumar B2
Computer Department, L.D. College of Engineering
[email protected] [email protected]
Abstract
Mobile Ad hoc Network(MANET) is a
collection of wireless nodes that communicate with each
other without any infrastructure. In MANET routing
protocol will decide how the route will be established
and maintained. Multicast routing play major role in
MANET. Objective of the multicast routing protocol is to
send data packet from sender to group of people with
minimum use of resources. Recently there are many
routing protocols have been proposed. There are many
challenges in MANET. Security is the major challenge in
MANET. This paper covers routing in MANET,different
multicast routing protocol, various types of attacks in
multicast routing and possible solutions.
Keywords— MANET,multicast routing, multicast routing
protocol
1. INTRODUCTION
There are two types of model in wireless
network. First one is fixed model which consist of large
number of mobile nodes and less fixed nodes. It requires
fixed infrastructure. Another one is mobile ad hoc
network(MANET)[1]. Mobile ad hoc network is the
collection of wireless nodes that communicate with each
other without any infrastructure. In MANET, nodes
work as host as well as router, sowe can say that
MANET is a multihopepacket radio network[1][2].
MANET provides us flexibility, mobility, self-
organisable network, limited physical security and
decentralized management [2].
Routing protocol find the appropriate path from
sender to receiver. Routing protocols are used to
maintain the routing information. Based on the message
delivery semantics routing protocols can be classified
into unicast, multicast, broadcast. In unicast routing,
there is a single path between sender and receiver. In
multicast routing one sender sends data packets to group
of people. There are many benefits of multicasting. It
reduces the cost of communication, energy consumption,
communication delay[2]. Further Exiting Multicast
routing protocol can be classified into tree based, mesh
based, and hybrid multicast routing protocol. Single path
has been established between two nodes in the group in
tree based routing protocol.Tree based routing protocol
requires minimum number of packet so they are
bandwidth efficient and power efficient. As mobility
increase link failure also increase. So link failure triggers
the reconfiguration of the entire tree. So control
overhead is increased [2]. In mesh based routing
protocols[2], mesh structures are set of interconnected
nodes. There are two ways of route discovery and mesh
establishment: by using core or central points for mesh
building or by using broadcasting to discover route.
Mesh based routing protocols have high robustness and
high packet delivery ratio. But they are power inefficient
and lot of network and control overhead. Hybrid routing
protocols are the combination of both mesh based and
tree based routing protocol.
There are many challenges in MANET like quality of
service, power management, network management,
security. Security is the major challenge in multicast
routing. There are several security solutions also
available. Directly include this solution in the multicast
routing protocol is very difficult because of the
complexity of multicast routing protocol. But we can
take some of mechanism fromthese solutions[1].
This paper is organized as follows: Section II
describes some of the multicast routing protocol. Section
III describesattacks in multicasting. Section IV covers
security solutions. Section V include conclusion.
Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292
IJCTA | March-April 2014 Available [email protected]
289
ISSN:2229-6093
2. MULTICAST ROUTING PROTOCOLS IN
MANET
2.1MAODV [1] [2]
Multicast ad hoc on demand distance vector protocol
(MAODV) is considered as a part of ad-hoc on demand
distance vector protocol (AODV). When sender wants to
send the message, it will discover route and send the
message. If any node wants to join the group, it will send
the route request message. Each node maintain three
table: unicast route table, multicast route table and group
leader table. Each multicast group have unique address
and group sequence number. Each group has a group
leader who maintain the tree by periodically sending the
group hello message. The member who create the group
first means who join the group first is a group leader.
MAODV is good for small group. Performance will be
degraded in high mobility and high traffic.
2.2 ODMRP[4][5]
On-demand multicast routing protocol(ODMRP) is
mesh based routing protocol. Main purpose of the on-
demand protocol is to reduce the overhead in multicast
route. ODMRP is very effective protocol with high
efficiency. It uses the concept of forwarding group.
There are two phases in ODMRP: route request phase
and reply phase. It uses the join query message to create
the mesh and to refresh the membership information. It
use soft state approach for maintaining the mesh. Node
need not to send the message to leave the group.
2.3 PUMA[6][7]
Protocol for unified multicasting thorough
announcement (PUMA) is a mesh based, reactive,
receiver initiated routing protocol. Each node generates
single control packet that is the multicast announcement.
It contains core Id, group sequence number, distance to
core and group id. Multicast announcement is used to
create mesh, to select core, to maintain the mesh.
PUMA select one core who maintains the mesh. Core
periodically generates and broadcaststhe multicast
announcement. PUMA has high packet delivery ratio
and low overhead compare to other protocol. PUMA is
more stable .It is more robust against the link breakage
compare to other protocol. Performance of the PUMA is
good in high mobility, more receiver and high traffic.
3 ATTACKS IN MANET
There are two types of security attacks in multicasting:
Active attack and Passive attack. Active attack is further
divided into internal attack and external attack. External
attackers are unauthorized multicast group member who
try to disturb the communication by disclosing the
confidential information and group activity. Internal
attacks are done by the authenticated member of the
group. It is difficult to find them because of valid
membership in the group. External attacks can be
stopped by the authentication mechanism and digital
certificate [7].
3.1 Blackhole Attack[8]
In this attack, attacker first implementsthe rushing
attack to become the part of the forwarding group. After
that it will broadcast the message and make other to
believe that he has shortest path to reach the destination.
But attacker never forwards the packet. It absorbing
everything but never giving out it is called blackhole.
Because of it we get very low packet delivery ratio.
2.4 Neighbour Attack[8]
When intermediate node receives the packet, it will
record tit’s id in the packet and forward the packet.
Neighbor attacker simply forwards the packet without
including its id in the packet. So it makes other two
nodes to believe that they are the neighbours, it results a
disrupted route.
3.2 Denial of Service Attack[9]
MANET is vulnerable to denial of service attacks
due to its dynamic nature. One node targets other node
by continuously request for service and consumes the
power and bandwidth.
3.3 Data packet drop Attack[7]
This type of attackers doesn’t cooperate in mesh
establishment or maintenance. It will drop the packet
with or without intension. It is difficult to find as it is a
valid member of the group.
3.4 Data fabrication Attack[7]
This is an internal type attack. Attackers try to
disturb both topology establishment and maintenance
process by fabricating the route establishment packet.
Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292
IJCTA | March-April 2014 Available [email protected]
290
ISSN:2229-6093
3.5 Replay Attack
Same valid data packet is delayed or repeated with
bad intension. It targets fresh route. This attack can be
used for security solutions.
4 SECURITY TECHNIQUES
FORMULTICAST ROUTING PROTOCOL
This part covers the some of the security techniques
for routing protocol in MANET. The solutions are not
specially designed for multicast routing protocol. But it
can be used to cover the attacks that comfort the
multicast routing protocol.
4.1 ARAN[10]
ARAN is an authentication routing protocol. It is
based on AODV routing protocol. There are two stages
in ARAN: first one is preliminary certification process
and second one is route instantiation process. It uses
cryptography certification that provide authentication. It
provides protection against replay attack, rushing attack
and neighbour attack.
4.2 SAODV[12]
Secure ad-hoc on demand distance vector (SAODV)
is an extension version of AODV routing protocol.
Working principle is similar to the AODV. Working of
SAODV is divided into two phase: first one is route
discovery phase and second one is route maintenance
phase. It uses digital signature and hash chain to provide
integrity and authentication. It provides security against
the replay attack and neighbour attack.
4.3 WATCHDOG[13]
This technique is used to prevent data packet drop
and to find the selfish node. In this method every node
maintainsID of the sent packet in buffer. When it
receives acknowledgement from receiver, it will
compare received id with stored id. If it will be matched,
it will be removed from buffer. If packet remains in the
buffer for more than certain time, then failure tally will
be increased. If it will reach to above the failure tally
limit then id of the packet will be removedand the node
will be declared as malicious. Drawback of this method
is high packet overhead. It has some weakness like
ambiguous collision, receiver collisionand
falsemisbehaviour [13].
5 CONCLUSION
Security in multicast routing in MANET is very
crucial. In multicast routing, sender sends data to group
of people. So it reduces the cost of communication.
Multicast routing protocols are more vulnerable to
various types of attack. In this paper we have studied
routing in MANET, some of multicast routing protocol,
attacks in multicasting and some of the security solutions.
In future we will study more multicast routing protocols,
possible attacks and their solutions.
.
REFERENCES
[1] Mo'men, A. M. A., H. S. Hamza, and I. A. Saroit. "A
survey on security enhanced multicast routing protocols
in Mobile Ad hoc Networks." High-Capacity Optical
Networks and Enabling Technologies (HONET), 2010.
IEEE, 2010..
[2] Junhai, Luo, et al. "A survey of multicast routing
protocols for mobile ad-hoc networks." Communications
Surveys & Tutorials, IEEE 11.1 (2009): 78-91.
[3] Al Mazrouei, Maitha Salem, and
SundaravalliNarayanaswami. "Mobile adhoc networks:
A simulation based security evaluation and intrusion
prevention. “Internets Technology and Secured
Transactions (ICITST), 2011 International Conference
for. IEEE, 2011.
[4] Anita, E. A., and V. Vasudevan. "Performance
Evaluation of mesh based multicast reactive routing
protocol under black hole attack." arXiv preprint
arXiv:0908.0222 (2009).
[5] Al-hemyari, Abdulmalek, et al. "A comparative survey
of multicast routing protocol in MANETs." Computer &
Information Science (ICCIS), 2012 International
Conference on. Vol. 2. IEEE, 2012.
[6] Vaishampayan, Ravindra, and Jose Joaquin Garcia-
Luna-Aceves. "Efficient and robust multicast routing in
mobile ad hoc networks." Mobile Ad-hoc and Sensor
Systems, 2004 IEEE International Conference on. IEEE,
2004.
[7] MenakaPushpa, A., and K. Kathiravan. "Resilient
PUMA (Protocol for Unified Multicasting through
Announcement) against internal attacks in Mobile Ad
hoc Networks." Advances in Computing,
Communications and Informatics (ICACCI), 2013
International Conference on. IEEE, 2013.
[8] Manikandan, K. P., R. Satyaprasad, and K.
Rajasekhararao. "A Survey on Attacks and Defense
Metrics of Routing Mechanism in Mobile Ad hoc
Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292
IJCTA | March-April 2014 Available [email protected]
291
ISSN:2229-6093
Networks." International Journal of Advanced Computer
Science and Applications 2.3 (2011).
[9] Marias, Giannis F., et al. "Cooperation enforcement
schemes for MANETs: A survey." Wireless
Communications and Mobile Computing 6.3 (2006):
319-332.
[10] Sanzgiri, Kimaya, et al. "Authenticated routing for ad
hoc networks." Selected Areas in Communications,
IEEE Journal on 23.3 (2005): 598-610.
[11] Mehla, Seema, Bhawna Gupta, and PreetiNagrath.
"Analyzing security of Authenticated Routing Protocol
(ARAN)." International Journal on Computer Science
and Engineering 2.3 (2010): 664-668.
[12] Gürdag, A. Burak, and M. UfukCaglayan. "A Formal
Security Analysis of Secure AODV (SAODV) using
Model Checking." Proceedings of the 8th International
Symposium on Computer Networks ISCN (2007). 2007.
[13] Marti, Sergio, et al. "Mitigating routing misbehavior in
mobile ad hoc networks."International Conference on
Mobile Computing and Networking: Proceedings of the
6th annual international conference on Mobile
computing and networking. Vol. 6. No. 11. 2000.
Pratikkumar Mistry et al , Int.J.Computer Technology & Applications,Vol 5 (2),289-292
IJCTA | March-April 2014 Available [email protected]
292
ISSN:2229-6093