Impact of Rushing attack on Multicast inMobile Ad Hoc Network
1 Reader and Head (i/c), Department of Computer Science & Engineering,Alagappa University, Karaikudi, Tamilnadu ,IndiaEmail: firstname.lastname@example.org
Lecturer in Computer Science, Kanchi Mamunivar Centre forPost Graduate Studies (Autonomous) , Lawspet, Puducherry, India.Email: email@example.com
A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate witheach other via wireless links with no fixed infrastructure orcentralized administration such as base station or accesspoints. Nodes in a MANETs operate both as host as well asrouters to forward packets for each other in a multi-hopfashion. For many applications in wireless networks,multicasting is an important and frequent communicationservice. By multicasting, since a single message can bedelivered to multiple receivers simultaneously. It greatlyreduces the transmission cost when sending the same packetto multiple recipients.The security issue of MANETs in group communicationsis even more challenging because of involvement of multiplesenders and multiple receivers. At that time of multicasting,mobile ad hoc network are unprotected by the attacks of malicious nodes because of vulnerabilities of routingprotocols. Some of the attacks are Rushing attack, Blackholeattack, Sybil attack, Neighbor attack and Jellyfish attack.This paper is based on Rushing attack. In Rushing attack,the attacker exploits the duplicate suppression mechanismby quickly forwarding route discovery packets in order togain access to the forwarding group and this will affect theAverage Attack Success Rate.In this paper, the goal is to measure the impact of Rushing attack and their node positions which affect theperformance metrics of Average Attack Success Rate withrespect to three scenarios: near sender, near receiver andanywhere within the network. The performance of theAttack Success Rate with respect to above three scenarios isalso compared.
Multicast, Rushing attack, MANETs,Security, Multicast, attack strategies, Security threats,Attacks on Multicast.
A mobile ad hoc network is a self-organizing system of mobile nodes that communicate with each other viawireless links with no infrastructure or centralizedadministration such as base stations or access points.Nodes in MANET operate both as hosts as well as routersto forward packets for each other in a multi-hop fashion.MANETSs are suitable for applications in which noinfrastructure exists such as military battlefield,emergency rescue, vehicular communications and miningoperations.In these applications, communication and collaborationamong a given group of nodes are necessary. Instead of using multiple unicast transmissions, it is advantageous touse multicast in order to save network bandwidth andresources, since a single message can be delivered tomultiple receivers simultaneously. Existing multicastrouting protocols in MANETs can be classified into twocategories: tree based and mesh-based. In a multicastrouting tree, there is usually only one single path betweena sender and a receiver, while in a routing mesh, theremay be multiple paths between each sender receiver pair.Routing meshes are thus suitable than routing trees forsystems with frequently changing topology such asMANETs due to availability of multiple paths between asource and a destination. Example tree-based multicastrouting protocols are MAODV, AMRIS, BEMRP, andADMR. Typically mesh-based multicast routingprotocols are ODMRP, FGMP, CAMP , DCMP , andNSMP .Among all the research issues, security is an essentialrequirement in MANET environments. Compared towired networks, MANETs are more vulnerable tosecurity attacks due to lack of trusted centralizedauthority, lack of trust relationships between mobilenodes, easy eavesdropping because of shared wirelessmedium, dynamic network topology, low bandwidth, andbattery and memory constraints of mobile devices. Thesecurity issue of MANETs in group communications iseven more challenging because of the involvement of multiple senders and multiple receivers. Although severaltypes of security attacks in MANETs have been studiedin the literature, the focus of earlier research is on unicast(point to point) applications. The impacts of securityattacks on multicast in MANETs have not yet beenexplored .In this paper, we present a simulation-based study of the effects of Rushing attack on multicast in MANETs.We consider the most common types of attacks, namelyrushing attack, blackhole attack, neighbor attack and jellyfish attack.
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009ISSN 1947 5500183