..............................
..............................
..............................
Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless
Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They
comprise of a number of static wireless routers which form an access network for end users to IP-based services. Unlike
conventional Wireless Local Area Network (WLAN) deployments, wireless mesh networks offer multihop routing, facilitating
an easy and cost-effective deployment. In this paper, an efficient and secure multicast routing on such wireless mesh networks
is concentrated. This paper identifies the novel attacks against high throughput multicast protocols in wireless mesh networks
through Secure On-Demand Multicast Routing Protocol (S-ODMRP). Recently, Sybil attack is observed to be the most harmful
attack in WMNs, where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by
the Sybil attack to WMN. The Sybil attack is encountered by the defense mechanism called Random Key Predistribution
technique (RKP). The performance of the proposed approach which integrates the S-ODMRP and RKP is evaluated using the
throughput performance metric. It is observed from the experimental result that the proposed approach provides good security
against Sybil attack with very high throughput.
[1] Amuthavalli R. and Bhuvaneswaran R., Detection and Prevention of Sybil Attack in Wireless Sensor Network Employing Random Password Comparison Method, Journal of Theoretical and Applied Information Technologygy, vol. 67, no. 1, pp. 236-246, 2014.
[2] Chan H., Perrig A., and Song D., Random Key Predistribution Schemes for Sensor Networks, in Proceedings of IEEE Symposium on Security and Privacy, Berkeley, pp. 197-213, 2003.
[3] Couto D., Aguayo D., Bicket J., and Morris R., A High- Throughput Path Metric for Multi-Hop Wireless Routing, Wireless Networks, vol. 11, no. 4, pp. 419-434, 2014.
[4] Couto D., Aguayo D., Bicket J., and Morris R., A High-Throughput Path Metric for Multi-Hop Wireless Routing, in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, San Diego, pp. 134- 146, 2003.
[5] Curtmola R. and Nita-Rotaru C., BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks, in Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, pp. 263-272, 2007.
[6] Dong J., Ackermann K., and Nita-Rotaru C., Secure Group Communication in Wireless Mesh Security Mechanism against Sybil Attacks for High-Throughput Multicast ... 967 Networks, International Symposium on a World of Wireless, Mobile and Multimedia Networks, Newport Beach, pp. 1-8, 2008.
[7] Dong J., Curtmola R., and Nita-Rotaru C., Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, vol. 10, no. 5, pp. 653-668, 2011.
[8] Jahanshahi M. and TalebiBarmi A., Multicast Routing Protocols in Wireless Mesh Networks: a Survey, Journal of Computing, vol. 96, no. 11, pp. 1029-1057, 2014.
[9] Karlof C. and Wagne D., Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, in Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, pp. 113- 127, 2003.
[10] Kun M. and Li L., An Efficient Pairwise Key Predistribution Scheme for Wireless Sensor Networks, Journal of Networks, vol. 9, no. 2, pp. 277-282, 2014.
[11] Lee S., Su W., and Gerla M., On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks, Mobile Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
[12] Modirkhazeni N., Abbasi M., and Ithnin N., Secure Hierarchical Routing Protocols in Wireless Sensor Network; Security Survey Analysis, International Journal of Computer Communications and Networks, vol. 2, no. 1, pp. 6-16, 2012.
[13] Moussa A. and Maalouf H., Performance Optimization in Structured Wireless Sensor Networks, The International Arab Journal of Information Technology, vol. 6, no. 5, pp. 452- 458, 2009.
[14] Wang Y., A tutorial of 802.11 Implementation in ns-2, Networking and Internet Architecture, Cornell University Library, 2012. Anitha Periasamy is currently working as a Professor in the Department of Computer Applications at K.S.R. College of Engineering. She received her B.Sc & M.C.A degrees from Madras University in 1995 and 1998and received her M.Phil degree from Bharadhidasan University, Trichy in 2004. She received her Ph.D degree from Anna University, Chennai in 2013. Her research interest includes Mobile computing, Networks, Image processing, Zigbee Networks. She is a member of ISTE, CSI. Periasamy Pappampalayam is currently working as a Professor and Head of ECE at K.S.R. College of Engineering. He obtained his B.E. degree in Electrical & Electronics Engineering from Government College of Engineering, Salem in 1998. He obtained his M.E. degree in Electronics and Communication Engineering from Government College of Technology, Coimbatore in 2003 and his Ph.D. degree from Anna University, Chennai in 2011. He has published several research papers in International and National Journals. His areas of interest are: Digital Signal &Image Processing, and Wireless and Computer Networks. He is a life member of ISTE, IETE and CSI.