Vulnerability analysis of relay set selection algorithms for the Simplified Multicast Forwarding (SMF) protocol for mobile ad hoc networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

After more than a decade of research and standardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in "the real world" also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This papert studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.

Original languageEnglish
Title of host publicationProceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012
Pages255-260
Number of pages6
DOIs
Publication statusPublished - 14 Dec 2012
Event2012 15th International Conference on Network-Based Information Systems, NBIS 2012 - Melbourne, VIC, Australia
Duration: 26 Sept 201228 Sept 2012

Publication series

NameProceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012

Conference

Conference2012 15th International Conference on Network-Based Information Systems, NBIS 2012
Country/TerritoryAustralia
CityMelbourne, VIC
Period26/09/1228/09/12

Fingerprint

Dive into the research topics of 'Vulnerability analysis of relay set selection algorithms for the Simplified Multicast Forwarding (SMF) protocol for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this