BSMR: Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks
| International Journal of Computer Trends and Technology (IJCTT) | |
© - Issue 2012 by IJCTT Journal | ||
Volume-3 Issue-2 | ||
Year of Publication : 2012 | ||
Authors :Mahamood ul Hasan MD, Syed Shaheen. |
Mahamood ul Hasan MD, Syed Shaheen. "BSMR: Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks"International Journal of Computer Trends and Technology (IJCTT),V3(2):201-210 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -—In this work we identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. We propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results which demonstrate that BSMR effectively mitigates the identified attacks.
References-
[1] Y. B. Ko and N. H. Vaidya, “Flooding-based geocasting protocols for mobile ad hoc networks,” Mob. Netw. Appl., vol. 7, no. 6, pp. 471– 480, 2002.
[2] R. Chandra, V. Ramasubramanian, and K. Birman, “Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks,” in Proc. of ICDCS, 2001.
[3] Y.-B. Ko and N. H. Vaidya, “GeoTORA: a protocol for geocasting in mobile ad hoc networks,” in Proc. of ICNP. IEEE Computer Society, 2000, p. 240.
[4] E. L. Madruga and J. J. Garcia-Luna-Aceves, “Scalable multicasting: the core-assisted mesh protocol,” Mob. Netw. Appl., vol. 6, no. 2, pp. 151–165, 2001.
[5] S. J. Lee, W. Su, and M. Gerla, “On-demand multicast routing protocol in multihop wireless mobile networks,” Mob. Netw. Appl., vol. 7, no. 6, pp. 441–453, 2002.
[6] E. Royer and C. Perkins, “Multicast ad-hoc on-demand distance vector (MAODV) routing,” in Internet Draft, July 2000.
[7] J. G. Jetcheva and D. B. Johnson, “Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks.” In Proc. Of MobiHoc, 2001, pp. 33–44.
[8] L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” in Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
[9] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” in Proc. of CNDS, January 2002, pp. 27–31.
[10] Y.-C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in Proc. of WMCSA, June 2002.
Keywords — Performance Appraisal, Teacher , Student, Cascaded, Fuzzy Inference System, Sensitivity Analysis, Gaussian MF, Fuzzy Rules.