A. Amuthan

Work place: Department of Computer Science & Engineering, Pondicherry Engineering College, Puducherry, India

E-mail: amuthan@pec.edu


Research Interests: Information Security, Network Security, Information Systems, Information Retrieval, Information-Theoretic Security


A. Amuthan, currently working as Associate Professor in the department of Computer Science & Engineering, Pondicherry Engineering College, Puducherry. Completed his Under graduate B.Tech in Computer Science & Engineering from Pondicherry Engineering College, M.E. from College of Engineering, Anna University, Chennai. He has obtained his doctorate in the area of Information Security at Pondicherry Engineering College under Pondicherry University.

Author Articles
Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

By A. Amuthan R. Kaviarasan S. Parthiban

DOI: https://doi.org/10.5815/ijitcs.2013.10.10, Pub. Date: 8 Sep. 2013

A Mobile Ad-hoc Network (MANETs) is composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to the security attacks. To add to that, due to the inherent, severe constraints in power, storage and computational resources in the MANET nodes, incorporating sound defense mechanisms against such attacks is also non-trivial. Therefore, interest in research of Mobile Ad-hoc NETworks has been growing since last few years. Security is a big issue in MANETs as they are infrastructure-less and autonomous. The main objective of this paper is to address some basic security concerns in EGMP protocol which is a multicast protocol found to be more vulnerable towards attacks like blackhole, wormhole and flooding attacks. The proposed technique uses the concepts of certificate to prevent these attacks and to find the malicious node. These attacks are simulated using NS2.28 version and the proposed proactive technique is implemented. The following metrics like packet delivery ratio, control overhead, total overhead and End to End delay are used to prove that the proposed solution is secure and robust.

[...] Read more.
Other Articles