In Mobile Ad-Hoc Networks (MANET), the group communication for multiple senders and receivers threatens the security features. The multicasting is provoked to various security attacks, eavesdropping etc., hence secure multicasting requires imperative significance. The secure multicast tree construction using Bacterial Foraging Optimization (BPO) algorithm is proposed to develop a secure multicast tree construction in MANET. During routing, the proposed algorithm utilizes the public routing proxy to hide identity of the sender and receiver from other nodes for maintaining confidentiality. The public routing proxy is estimated using bacterial foraging optimization algorithm and path reliability is evaluated after the each iteration. Path reliability enhances the security of the network from black hole attacker and DoS attackers compared to traditional approaches for secure multicast tree formation in MANETs. By simulation results, we have shown that the proposed technique offers authentication and confidentiality during secure multicasting which is compared to conventional multicast tree formation algorithms in MANETs.
References
[1]
Chen, K. and Nahrstedt, K. (2002) Effective Location-Guided Tree Construction Algorithms for Small Group Multicast in MANET. IEEE INFOCOM, New York, June 2002, 1180-1189.
[2]
Olagbegil, B.S. and Meghanathan, N. (2010) A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks. International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks, 2, 232-250.
http://dx.doi.org/10.5121/jgraphoc.2010.2201
[3]
Chhabra, A. and Arora, G. (2013) Secure Routing in Multicast Routing Protocol for Manet’s. International Journal of Innovations in Engineering and Technology, 2, 1-8.
[4]
Karbhal, J.M. and Sadafale, K.B. (2013) Secure Efficient Geographic Multicast Protocol for Mobile Ad Hoc Networks. International Journal of P2P Network Trends and Technology, 3, 62-66.
[5]
Vijayalakshmi, S. and Albert Rabara, S. (2011) Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques-LP3 and NAWA2. International Journal of Computer Applications, 16, 26-32. http://dx.doi.org/10.5120/2024-2729
[6]
Rajan, C. and Shanthi, N. (2013) Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (Manet). Journal of Theoretical and Applied Information Technology, 48, 1349-1357.
[7]
Gomathi, K. and Parvathavarthini, B. (2010) An Efficient Cluster based Key Management Scheme for MANET with Authentication. Trends in Information Sciences & Computing, 10, 202-205. http://dx.doi.org/10.1109/TISC.2010.5714639
[8]
Arthi, A., Jayakumar, C. and Tanguturi, R.C. (2014) SMADA—Secure Model for Attack Detection and Authentication of Multicast Routing in MANET. International Journal of Applied Engineering Research, 9, 9438-9446.
[9]
Alicherry, M. and Keromytis, A.D. (2010) Securing MANET Multicast Using Diploma. Advances in Information and Computer Security, 10, 232-250.
http://dx.doi.org/10.1007/978-3-642-16825-3_16
[10]
Turorikar, B.B. and Shukla, M.A. (2013) Multicasting over Manet through Segmp by Secure Zone Leader Election. International Journal of Computer Trends and Technology, 4, 153-159.
[11]
Rong, B., Chen, H.-H., Qian, Y., Lu, K.J., Hu, Q.Y. and Guizani, S. (2009) A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study. IEEE Transactions on Vehicular Technology, 58, 398-408.
http://dx.doi.org/10.1109/TVT.2008.923666
[12]
Park, Y.-H., Je, D.-H., Park, M.-H. and Seo, S.-W. (2013) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile User. IEEE Transactions on Mobile Computing, 99, 1-14.
[13]
Drira, K., Seba, H. and Kheddouci, H. (2010) ECGK: An Efficient Clustering Scheme for Group Key Management. Computer Communications, 33, 1094-1107.
http://dx.doi.org/10.1016/j.comcom.2010.02.007
[14]
Kim, H. and Jeong, J. (2011) RAD: Recipient-Anonymous Data Delivery Based on Public Routing Proxies. Computer Networks, 55, 3469-3484.
http://dx.doi.org/10.1016/j.comnet.2011.07.009
[15]
Bitam, S., Mellouk, A. and Zeadally, S. (2015) Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks. IEEE Communication Surveys & Tutorials, 17, 843-867.
[16]
Sodsri, P., Sookananta, B. and Pusayatanont, M. (2015) Optimal Placement of Distributed Generation Using Bacterial Foraging Optimization Algorithm. AMM, 781, 329-332.
http://dx.doi.org/10.4028/ www.scientific.net/AMM.781.329
[17]
Singh, S., Ghose, T. and Goswami, S. (2012) Optimal Feeder Routing Based on the Bacterial Foraging Technique. IEEE Transactions on Power Delivery, 27, 70-78.
http://dx.doi.org/10.1109/TPWRD.2011.2166567
[18]
Kaur, R. and Kaur, B. (2014) Artificial Neural Network Learning Enhancement Using Bacterial Foraging Optimization Algorithm. International Journal of Computer Applications, 102, 27-33.
[19]
Schweitzer, N., Stulman, A., Shabtai, A. and Margalit, R. (2016) Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes. IEEE Transactions on Mobile Computing, 15, 163-172. http://dx.doi.org/10.1109/TMC.2015.2409877