Impact of Rushing attack on Multicast in Mobile Ad Hoc Network full report
#1

[attachment=13892]
[attachment=13893]
[attachment=13894]
[attachment=13895]
[attachment=13896]
[attachment=13897]
[attachment=13898]
Chapter 1
INTRODUCTION

A mobile ad hoc network is a self-organizing system of mobile nodes that communicate with each other via wireless links with no infrastructure or centralized administration such as base stations or access points. Nodes in MANET operate both as hosts as well as routers to forward packets for each other in a multi-hop fashion. MANETSs are suitable for applications in which no infrastructure exists such as military battlefield, emergency rescue, vehicular communications and mining operations.
In these applications, communication and collaboration among a given group of nodes are necessary. Instead of using multiple unicast transmissions, it is advantageous to use multicast in order to save network bandwidth and resources, since a single message can be delivered to multiple receivers simultaneously. Existing multicast routing protocols in MANETs can be classified into two categories: tree based and mesh-based. In a multicast routing tree, there is usually only one single path between a sender and a receiver, while in a routing mesh, there may be multiple paths between each sender receiver pair. Routing meshes are thus suitable than routing trees for systems with frequently changing topology such as MANETs due to availability of multiple paths between a source and a destination. Example tree-based multicast routing protocols are MAODV, AMRIS, BEMRP, and ADMR. Typically mesh-based multicast routing protocols are ODMRP, FGMP, CAMP , DCMP , and NSMP [2]. Among all the research issues, security is an essential requirement in MANET environments. Compared to wired networks, MANETs are more vulnerable to security attacks due to lack of trusted centralized authority, lack of trust relationships between mobile nodes, easy eavesdropping because of shared wireless medium, dynamic network topology, low bandwidth, and battery and memory constraints of mobile devices. The security issue of MANETs in group communications is even more challenging because of the involvement of multiple senders and multiple receivers. Although several types of security attacks in MANETs have been studied in the literature, the focus of earlier research is on unicast (point to point) applications. The impacts of security attacks on multicast in MANETs have not yet been explored. In this paper, we present a simulation-based study of the effects of Rushing attack on multicast in MANETs. We consider the most common types of attacks, namely rushing attack, blackhole attack, neighbor attack and jellyfish attack.
1.1 Goal
The goal of this paper is to impact of rushing attack on mesh-based multicast in MANETs. The rushing attack, that acts as an effective denial-of-service attack against all currently proposed on-demand ad hoc network routing protocols, including protocols that were designed to be secure. In this work, to simulate three scenarios: The attacker node is place at near sender, the attacker node is place at near receiver. The attacker node is place anywhere within the MANETs. Based on above scenarios, to simulate how the Rushing attack affects the network performance.
1.2 Reading Roadmap
This paper starts with this section, which gives a brief introduction, and goal of this paper. Section 2 describes preliminaries for multicast attacks in MANETs. The Improved model scheme Impact of Rushing Attack on Multicast in Mobile Ad hoc Networks (IRAMA) is presented in Section 3. In Section 4, we discuss the experimental results and discussion. Finally, conclusions are given in Section 5.
Chapter 2
MULTICAST AND RUSHING ATTACKS IN MOBILE AD HOC NETWORK
2.1 Introduction

A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multi-hop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients. Multicast is communication between a single sender and multiple receivers on a network. Otherwise it transmits a single message to a select group of recipients. Multicast is used, for example, in streaming video, in which many megabytes of data are sent over the network. Single packets copied by the network and sent to a specific subset of network addresses. These addresses are specified in the Destination Address. Protocol to allow point to multipoint efficient distribution of packets, frequently used in access grid applications. It greatly reduces the transmission cost when sending the same packet to multiple recipients. The option to multicast was made possible by digital technology to allow each digital broadcast station to split its bit stream into 2, 3, 4 or more individual channels of programming and/or data services.
Instead of using multiple unicast transmissions, it is advantageous to use multicast in order to save bandwidth and resources. Since a single message can be delivered to multiple receivers simultaneously. Multicast data may still be delivered to the destination on alternative paths even when the route breaks. It is typically used to refer to IP multicast which is often employed for streaming media and At the Data Link Layer, multicast describes one-to-many distribution such as Ethernet multicast addressing, Asynchronous Transfer Mode (ATM) point-to-multipoint virtual circuits or Infiniband multicast. Teleconferencing and videoconferencing also use multicasting, but require more robust protocols and networks. Standards are being developed to support multicasting over a TCP/IP network such as the Internet. These standards, IP Multicast and Mbone, will allow users to easily join multicast groups.
2.2 Attack against ad hoc network
While a wireless network is more versatile than a wired one, it is also more vulnerable to attacks. This is due to the very nature of radio transmissions, which are made on the air. On a wired network, an intruder would need to break into a machine of the network or to physically wiretap a cable. On a wireless network, an adversary is able to eavesdrop on all messages within the emission area, by operating in promiscuous mode and using a packet sniffer (and possibly a directional antenna). Furthermore, due to the limitations of the medium, communications can easily be perturbed; the intruder can perform this attack by keeping the medium busy sending its own messages, or just by jamming communications with noise. Security has become a primary concern to provide protected communication between mobile nodes in a hostile environment. Unlike wireline networks, the unique characteristics of mobile ad hoc networks pose a number of non-trivial challenges to the security design.
2.3 Rushing Attacks on Multicast
Multicast conserves network bandwidth by sending a single stream of data to multiple receivers. Packets are duplicated only at branch points. The security issue of MANETs in group communications is even more challenging because of involvement of multiple senders and multiple receivers. Some different types of multicast attacks are Rushing attack, Balckhole attack, Neighbor attack, and Jellyfish attack.
A rushing attacker exploits this duplicate suppression mechanism by quickly forwarding route discovery packets in order to gain access to the forwarding group.
Figure 1 Rushing Attack
 Goal: to invade into routing paths
 Target: multicast routing protocols that use a duplicate suppression mechanism in order to reduce routing overheads.
Method: quickly forwards route discovery (control) packets by skipping processing or routing steps. Rushing attack otherwise, falsely sending malicious control messages and then forwards the packet fastly than clear node reachable.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: report of ip spofing attack pdf, mobile ad hoc network, jellyfish attack in ad hoc network, create a node to attack a ad hoc network in matlab, simulation study of blackhole attack in mobile ad hoc networks seminar topic, ad hoc network seminar report, impact of rushing attack 2011,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  FINGER PRINT BASED ELECTRONIC VOTING MACHINE full report project topics 60 50,905 11-05-2017, 10:43 AM
Last Post: jaseela123d
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,030 17-08-2016, 09:23 AM
Last Post: jaseela123d
  AUTOMATIC BUS STATION ANNOUNCEMENT SYSTEM full report project report tiger 4 10,888 13-08-2016, 11:16 AM
Last Post: jaseela123d
  MICROCONTROLLER BASED DAM GATE CONTROL SYSTEM full report seminar class 13 17,268 19-06-2016, 07:53 PM
Last Post: Saianjana
  METAL DETECTOR full report project report tiger 14 23,806 12-03-2016, 01:51 PM
Last Post: seminar report asees
  WIRE LESS SPEED CONTROL OF AC MOTOR (USING MOBILE) smart paper boy 6 11,318 24-02-2016, 02:05 PM
Last Post: seminar report asees
  Mobile incoming call indicator smart paper boy 5 5,765 09-01-2016, 11:02 AM
Last Post: seminar report asees
  Solar power plant full report seminar class 2 3,356 11-11-2015, 01:49 PM
Last Post: seminar report asees
  MICROCONTROLLER BASED AUTOMATIC RAILWAY GATE CONTROL full report project topics 49 58,000 10-09-2015, 03:18 PM
Last Post: seminar report asees
  RELAY CO-ORDINATION full report project report tiger 2 4,421 24-02-2015, 10:18 AM
Last Post: seminar report asees

Forum Jump: