Abstract

In Mobile Ad-Hoc Networks (MANET), the group communication for multiple senders and receivers threatens the security features. The multicasting is provoked to various security attacks, eavesdropping etc., hence secure multicasting requires imperative significance. The secure multicast tree construction using Bacterial Foraging Optimization (BPO) algorithm is proposed to develop a secure multicast tree construction in MANET. During routing, the proposed algorithm utilizes the public routing proxy to hide identity of the sender and receiver from other nodes for maintaining confidentiality. The public routing proxy is estimated using bacterial foraging optimization algorithm and path reliability is evaluated after the each iteration. Path reliability enhances the security of the network from black hole attacker and DoS attackers compared to traditional approaches for secure multicast tree formation in MANETs. By simulation results, we have shown that the proposed technique offers authentication and confidentiality during secure multicasting which is compared to conventional multicast tree formation algorithms in MANETs.

Highlights

  • Path reliability enhances the security of the network from black hole attacker and DoS attackers compared to traditional approaches for secure multicast tree formation in Mobile Ad-Hoc Networks (MANET)

  • We have shown that the proposed technique offers authentication and confidentiality during secure multicasting which is compared to conventional multicast tree formation algorithms in MANETs

  • We have proposed algorithm to develop a secure multicast tree construction in MANETs

Read more

Summary

Introduction

Mobile ad hoc network is formed by a group of many mobile nodes that are self-organized and connected with wireless links to communicate with each other without any infrastructure. Each node behaves as an end-system as well as a router to forward packets. Because the mobility nature of mobile nodes is frequently changed in the network topology [1] [2] [3]. MANETs are possible types of applications such as military battlefield communication, emergency situations, emergency mitigation schemes, stock quotes, urgent business meeting, virtual class room and other [3]

Multicast Tree Construction in MANET
Issues in Multicast Tree Construction in MANET
Secure Multicast Tree Construction in MANET
Problem Statement
Related Works
Secure Route Selection Based on Bacterial Foraging Optimization Technique
Swarming
Secured Routing
Path Reliability Calculation
Simulation Parameters
Performance Metrics
Results & Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call