..............................
            ..............................
            ..............................
            
Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless
        
        Wireless  Mesh  Networks  (WMNs)  have  become  one  of  the  important  domains  in  wireless  communications.  They 
comprise  of  a  number  of  static  wireless  routers  which  form  an  access  network  for  end  users  to  IP-based  services.  Unlike 
conventional Wireless  Local  Area  Network (WLAN) deployments,  wireless  mesh  networks  offer  multihop  routing,  facilitating 
an easy and cost-effective deployment. In this paper, an efficient and secure multicast routing on such wireless mesh networks 
is concentrated. This paper identifies the novel attacks against high throughput multicast protocols in wireless mesh networks 
through Secure On-Demand Multicast Routing Protocol (S-ODMRP). Recently, Sybil attack is observed to be the most harmful 
attack in WMNs, where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by 
the  Sybil  attack  to  WMN.  The  Sybil  attack  is  encountered  by  the  defense  mechanism  called  Random  Key  Predistribution 
technique (RKP). The performance of the proposed approach which integrates the S-ODMRP and RKP is evaluated using the 
throughput performance metric. It is observed from the experimental result that the proposed approach provides good security 
against Sybil attack with very high throughput.    
            [1] Amuthavalli R. and Bhuvaneswaran R., Detection and Prevention of Sybil Attack in Wireless Sensor Network Employing Random Password Comparison Method, Journal of Theoretical and Applied Information Technologygy, vol. 67, no. 1, pp. 236-246, 2014.
[2] Chan H., Perrig A., and Song D., Random Key Predistribution Schemes for Sensor Networks, in Proceedings of IEEE Symposium on Security and Privacy, Berkeley, pp. 197-213, 2003.
[3] Couto D., Aguayo D., Bicket J., and Morris R., A High- Throughput Path Metric for Multi-Hop Wireless Routing, Wireless Networks, vol. 11, no. 4, pp. 419-434, 2014.
[4] Couto D., Aguayo D., Bicket J., and Morris R., A High-Throughput Path Metric for Multi-Hop Wireless Routing, in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, San Diego, pp. 134- 146, 2003.
[5] Curtmola R. and Nita-Rotaru C., BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks, in Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, pp. 263-272, 2007.
[6] Dong J., Ackermann K., and Nita-Rotaru C., Secure Group Communication in Wireless Mesh Security Mechanism against Sybil Attacks for High-Throughput Multicast ... 967 Networks, International Symposium on a World of Wireless, Mobile and Multimedia Networks, Newport Beach, pp. 1-8, 2008.
[7] Dong J., Curtmola R., and Nita-Rotaru C., Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, vol. 10, no. 5, pp. 653-668, 2011.
[8] Jahanshahi M. and TalebiBarmi A., Multicast Routing Protocols in Wireless Mesh Networks: a Survey, Journal of Computing, vol. 96, no. 11, pp. 1029-1057, 2014.
[9] Karlof C. and Wagne D., Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, in Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, pp. 113- 127, 2003.
[10] Kun M. and Li L., An Efficient Pairwise Key Predistribution Scheme for Wireless Sensor Networks, Journal of Networks, vol. 9, no. 2, pp. 277-282, 2014.
[11] Lee S., Su W., and Gerla M., On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks, Mobile Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
[12] Modirkhazeni N., Abbasi M., and Ithnin N., Secure Hierarchical Routing Protocols in Wireless Sensor Network; Security Survey Analysis, International Journal of Computer Communications and Networks, vol. 2, no. 1, pp. 6-16, 2012.
[13] Moussa A. and Maalouf H., Performance Optimization in Structured Wireless Sensor Networks, The International Arab Journal of Information Technology, vol. 6, no. 5, pp. 452- 458, 2009.
[14] Wang Y., A tutorial of 802.11 Implementation in ns-2, Networking and Internet Architecture, Cornell University Library, 2012. Anitha Periasamy is currently working as a Professor in the Department of Computer Applications at K.S.R. College of Engineering. She received her B.Sc & M.C.A degrees from Madras University in 1995 and 1998and received her M.Phil degree from Bharadhidasan University, Trichy in 2004. She received her Ph.D degree from Anna University, Chennai in 2013. Her research interest includes Mobile computing, Networks, Image processing, Zigbee Networks. She is a member of ISTE, CSI. Periasamy Pappampalayam is currently working as a Professor and Head of ECE at K.S.R. College of Engineering. He obtained his B.E. degree in Electrical & Electronics Engineering from Government College of Engineering, Salem in 1998. He obtained his M.E. degree in Electronics and Communication Engineering from Government College of Technology, Coimbatore in 2003 and his Ph.D. degree from Anna University, Chennai in 2011. He has published several research papers in International and National Journals. His areas of interest are: Digital Signal &Image Processing, and Wireless and Computer Networks. He is a life member of ISTE, IETE and CSI.