Study of Different Types of Attacks on Stateless Multicast in MANETs

碩士 === 中國科技大學 === 運籌管理研究所 === 95 === Multicasting is intended for group-oriented computing. There are more and more applications where one-to-many or many-to-many dissemination is an essential task. Multicast is rapidly becoming an important mode of communication and a good platform for building gro...

Full description

Bibliographic Details
Main Authors: Jie-Juang Jiang, 江杰璋
Other Authors: Shing-Hong Chen
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/79331415273621217569
Description
Summary:碩士 === 中國科技大學 === 運籌管理研究所 === 95 === Multicasting is intended for group-oriented computing. There are more and more applications where one-to-many or many-to-many dissemination is an essential task. Multicast is rapidly becoming an important mode of communication and a good platform for building group-oriented services. To be used for trusted communication, however, current multicast schemes must be supplemented by mechanisms for protecting traffic, controlling participation, and restricting access of unauthorized users to data exchanged by the participants. In this paper, we examine the use of stateless multicast, DDM (Differential Destination Multicast), routing protocol in MANETs had different types of attacks, and MANETs will have any effect. Through analysis of communication protocols and the operating mechanism of attack, we also propose to avoid attacks by the way. The paper considered the attacks, which mainly includes the following four common attacks, Rushing attack, Black hole attack, Neighbor attack, and Jellyfish attack. According to analysis result, DDM has good defense capability in essence, but lack the intact attack sensing mechanism. If the source end can enhance detection ability to member node attack, and delete attack node from the set list in good time, which will contribute to promoting the security of the whole network. Under stateless mode, it is noteworthy that when the source end is an assailant, it can mobilize resources to consume and such attack will not be found by the middle node. Have not found the method to prevent the attack of this type yet, this has become one of the secret worries of DDM too. In future we suggest that strengthening the safety design of DDM can consider supplementing these weak points, in order to promote the security of stateless multicast routing protocol.