BSMR: Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2012 by IJCTT Journal|
|Volume-3 Issue-2 |
|Year of Publication : 2012|
|Authors :Mahamood ul Hasan MD, Syed Shaheen.|
Mahamood ul Hasan MD, Syed Shaheen. "BSMR: Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks"International Journal of Computer Trends and Technology (IJCTT),V3(2):201-210 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -—In this work we identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. We propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results which demonstrate that BSMR effectively mitigates the identified attacks.
 Y. B. Ko and N. H. Vaidya, “Flooding-based geocasting protocols for mobile ad hoc networks,” Mob. Netw. Appl., vol. 7, no. 6, pp. 471– 480, 2002.
 R. Chandra, V. Ramasubramanian, and K. Birman, “Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks,” in Proc. of ICDCS, 2001.
 Y.-B. Ko and N. H. Vaidya, “GeoTORA: a protocol for geocasting in mobile ad hoc networks,” in Proc. of ICNP. IEEE Computer Society, 2000, p. 240.
 E. L. Madruga and J. J. Garcia-Luna-Aceves, “Scalable multicasting: the core-assisted mesh protocol,” Mob. Netw. Appl., vol. 6, no. 2, pp. 151–165, 2001.
 S. J. Lee, W. Su, and M. Gerla, “On-demand multicast routing protocol in multihop wireless mobile networks,” Mob. Netw. Appl., vol. 7, no. 6, pp. 441–453, 2002.
 E. Royer and C. Perkins, “Multicast ad-hoc on-demand distance vector (MAODV) routing,” in Internet Draft, July 2000.
 J. G. Jetcheva and D. B. Johnson, “Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks.” In Proc. Of MobiHoc, 2001, pp. 33–44.
 L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” in Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
 P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” in Proc. of CNDS, January 2002, pp. 27–31.
 Y.-C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in Proc. of WMCSA, June 2002.
Keywords — Performance Appraisal, Teacher , Student, Cascaded, Fuzzy Inference System, Sensitivity Analysis, Gaussian MF, Fuzzy Rules.