Loading

Secure Data Transition over Multicast Routing in Wireless Mesh network
Adarsh. R1, Ganesh Kumar. R2, Jitendranath Mungara3
1Adarsh.R, M.Tech, Computer Science and Engineering, CMRIT, Bangalore, India.
2Mr Ganesh Kumar R, Assoc Professor and HOD, Dept of ISE, CMRIT, Bangalore, India
3Dr. Jitendranath Mungara, Professor and Dean, Dept of CSE and ISE, CMRIT, Bangalore, India.
Manuscript received on August 06, 2012. | Revised Manuscript received on August 10, 2012. | Manuscript published on August 10, 2012. | PP: 98-103 | Volume-1 Issue-3, August 2012. | Retrieval Number: C0229071312/2012©BEIESP
Open Access | Ethics and  Policies | Cite 
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. In high-throughput multicast protocol in wireless mesh networks we identify novel attacks in wireless mesh networks. The attacks exploit the local estimation and global estimation of metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We can say that aggressive path increases attack effectiveness in the absence of defense mechanism. Our approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The solution also accommodates transient network variations and is resilient against attempts to exploit the defense mechanism itself. A detailed security analysis of our defense scheme establishes bounds on the impact of attacks. We demonstrate both the attacks and our defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting.
Keywords: DSA Key Generation, High-Throughput metrics , Wireless mesh Network, Secure Data transition.