Security Issues in Multicast Routing for Mobile Computing and Solutions

R. Kalaimagal*, Ramar K**, Lakshmi Narayanan K***
* Head, Department of Computer Science, Government Arts College, Chidambaram.
** Professor and Head, Department of Computer Science and Engineering, National Engineering College, Kovilpatti.
*** Lecturer, Department of Master of Computer Applications, RMK Engineering College, Chennai.
Periodicity:October - December'2008
DOI : https://doi.org/10.26634/jse.3.2.246

Abstract

Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire-line networks, the unique characteristics of mobile computing pose a number of nontrivial challenges to security design, such as shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multicast security solutions that achieve both broad protection and desirable network performance. In this article, the fundamental security problem of protecting the multicast routing between mobile nodes in a mobile computing is focused. The security in network layer issues related to protecting routing and forwarding protocols Challenges and Solutions are also identified.

Keywords

Security issues , Multicast, Network layer, Protecting routing and Forwarding protocol

How to Cite this Article?

Kalai Magal R, Ramar K and Lakshmi Narayanan K (2008). Security Issues in Multicast Routing for Mobile Computing and Solutions. i-manager’s Journal on Software Engineering, 3(2), 28-37. https://doi.org/10.26634/jse.3.2.246

References

[1] C. Perkins and E. Royer, “Ad Hoc On-Demand Distance Vector Routing”, 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.
[2] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., Kluwer, 1996.
[4]. B. Schneier, Secret and Lies, Digital Security in a Networked World, Wiley, 2000.
[5]. Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks”, ACM MOBICOM, 2002.
[6]. M. Zapata, and N. Asokan, “Securing Ad Hoc Routing Protocols”, ACM WiSe, 2002.
[7]. B. Dahill et al., “A Secure Protocol for Ad Hoc Networks”, IEEE ICNP, 2002.
[8]. Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, IEEE INFOCOM, 2002.
[9]. N. Borisov, I. Goldberg, and D. Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11”, ACM MOBICOM, 2001.
[10]. V. Gupta, S. Krishnamurthy and M. Faloutsos, “Denial of Service Attacks at the MAC Layer in Wireless Ad HocNetworks”, IEEE MILCOM, 2002.
[11]. P. Kyasanur and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks”, DCC, 2003.
[12]. C. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance- Vector Routing (DSDV) for Mobile Computers”, ACM SIGCOMM, 1994.
[13]. P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc Networks”, CNDS, 2002.
[14]. A. Perrig et al., “The TESLA Broadcast Authentication Protocol“, RSA CryptoBytes, Vol. 5, No. 2, 2002.
[15]. Y. Hu, D. Johnson and A. Perrig, “Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” IEEE WMCSA, 2002.
[16]. P. Papadimitratos and Z. Haas, “Secure Link State Routing for Mobile Ad Hoc Networks,” IEEE Wksp. Security and Assurance in Ad Hoc Networks, 2003.
[17]. B. Awerbuch et al., “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,” ACM WiSe, 2002.
[18]. S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” ACM MOBICOM, 2000.
[19]. H. Yang, X. Meng and S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,” ACM WiSe, 2002.
[20]. J. Kong et al., “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” IEEE ICNP, 2001.
[21]. G. Noubir and G. Lin, “Low-Power DoS Attacks in Data Wireless LANs and Countermeasures,” ACM MobiHoc, Poster Session, 2003.
[22]. A. Stubblefield, J. Ioannidis and A. Rubin, “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP”, NDSS, 2002.
[23]. S. Fluhrer, I. Mantin and A. Shamir, “Weakness in the Key Scheduling Algorithm of RC4”, 8th Annual Wksp. Sel. Areas in Cryptography, 2001.
[24]. IEEE Std. 802.11i/D30, “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security”, 2002.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.