source code in ns2 for secure high throughput multicast routing in wireless mesh networks
#1

i need code in ns2 for multicast routing in wireless mesh networks using Steiner trees
Reply
#2
source code in ns2 for secure high throughput multicast routing in wireless mesh networks

ABSTRACT:

Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate page link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. In this work, we identify novel attacks against high-throughput multicast protocols in wireless mesh networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We conclude that aggressive path selection is a double-edged sword: While it maximizes throughput, it also increases attack effectiveness in the absence of defense mechanisms. Our approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The solution accommodates transient network variations and is resilient against attempts to exploit the defense mechanism itself. A detailed security analysis of our defense scheme establishes bounds on the impact of attacks. We demonstrate both the attacks and our defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting.Multicast Routing protocols always acquire some special correspondence since they deliver data from source to multiple destinations that were organized in a multicast group. Several work in multicast routing for wireless mesh networks has focused on metrics that estimate page link quality to maximize throughput. The novel attacks in this project exploit the local estimation and global aggregation. These attacks are very effective against multicast protocols based on high-throughput metrics. The project provides best defense mechanism to detect and react against attack.

Aim & Objective:

• To identify novel attacks against high-throughput multicast protocols in wireless mesh networks and to reduce vulnerabilities in multicast routing.
• To use measurement based detection and accusation based reaction techniques to defend against novel attacks.
• To efficiently deliver compensation data packets through MISTRAL flooding mechanism.

Problem Statement:

Many of the existing approaches posses’ difficulty in the identification of the metric attacks. They provide less page link quality and sudden throughput degradation due to malicious attack. They wrongly choose path which leads to new vulnerabilities.

Contribution:

An Efficient Flooding Mechanism: MISTRAL was contributed for delivering the compensation packets. It compensates for dropped data packets by periodically broadcasting compensation packets. Every compensation packet encodes a set of packets that have been dropped by the sender. A node’s neighbors, upon receipt of such a packet, can recover missing packets.

INDEX TERMS
Wireless mesh networks, high-throughput metrics, secure multicast routing, metric manipulation attacks, Byzantine attacks.

CITATION
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, "Secure High-Throughput Multicast Routing in Wireless Mesh Networks", IEEE Transactions on Mobile Computing, vol.10, no. 5, pp. 653-668, May 2011, doi:10.1109/TMC.2010.194
REFERENCES
[1] J. Dong, R. Curtmola, and C. Nita-Rotaru, "On the Pitfalls of Using High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks," Proc. Fifth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '08), 2008.
[2] Y.B. Ko and N.H. Vaidya, "Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 471-480, 2002.
[3] R. Chandra, V. Ramasubramanian, and K. Birman, "Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks," Proc. 21st IEEE Int'l Conf. Distributed Computing Systems (ICDCS '01), 2001.
[4] Y.-B. Ko and N.H. Vaidya, "GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks," Proc. Int'l Conf. Network Protocols (ICNP), pp. 240-250, 2000.
[5] E.L. Madruga and J.J. Garcia-Luna-Aceves, "Scalable Multicasting: the Core-Assisted Mesh Protocol," Mobile Networks and Applications, vol. 6, no. 2, pp. 151-165, 2001.
[6] S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
[7] E.M. Royer and C.E. Perkins, "Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing," Internet Draft, July 2000.
[8] J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc. ACM MobiHoc, 2001.
[9] H. Lundgren, E. Nordstrom, and C. Tschudin, "Coping with Communication Gray Zones in IEEE 802.11b Based Ad Hoc Networks," Proc. Fifth ACM Int'l Workshop Wireless Mobile Multimedia (WOWMOM '02), 2002.
[10] D.S.J.D. Couto, D. Aguayo, J.C. Bicket, and R. Morris, "A High-Throughput Path Metric for Multi-Hop Wireless Routing," Proc. ACM MobiCom, 2003.
[11] S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2006.
[12] A. Chen, D. Lee, G. Chandrasekaran, and P. Sinha, "HIMAC: High Throughput MAC Layer Multicasting in Wireless Networks," Proc. IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS '06), 2006.
[13] B. Awerbuch, D. Holmer, and H. Rubens, "The Medium Time Metric: High Throughput Route Selection in Multirate Ad Hoc Wireless Networks," Mobile Networks and Applications, Special Issue on Internet Wireless Access: 802.11 and Beyond, vol. 11, no. 2, pp. 253-266, 2005.
[14] A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou, "A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks," Proc. First Int'l Conf. Broadband Networks (BroadNets '04), 2004.
[15] S. Keshav, "A Control-Theoretic Approach to Flow Control," Proc. ACM SIGCOMM, 1993.
[16] R. Draves, J. Padhye, and B. Zill, "Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks," Proc. ACM MobiCom, 2004.
[17] P. Papadimitratos and Z. Haas, "Secure Routing for Mobile Ad Hoc Networks," Proc. SCS Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS), pp. 27-31, Jan. 2002.
[18] Y.-C. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA), 2002.
[19] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP), 2002.
[20] S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, Aug. 2000.
[21] P. Papadimitratos and Z. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," Proc. Second ACM Workshop Wireless Security (WiSe), pp. 41-50, 2003.
[22] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure on-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, 2002.
[23] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks," ACM Trans. Information Systems Security, vol. 10, no. 4, pp. 1-35, 2007.
[24] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "On the Survivability of Routing Protocols in Ad Hoc Wireless Networks," Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), 2005.
[25] S. Roy, V.G. Addada, S. Setia, and S. Jajodia, "Securing MAODV: Attacks and Countermeasures," Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '05), 2005.
[26] R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-Hop Wireless Networks," IEEE Trans. Mobile Computing, vol. 8, no. 4, pp. 445-459, Apr. 2009.
[27] R. Draves, J. Padhye, and B. Zill, "Comparison of Routing Metrics for Static Multi-Hop Wireless Networks," Proc. ACM SIGCOMM, 2004.
[28] S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Ad Hoc Networks, vol. 6, no. 6, pp. 878-899, 2007.
[29] S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques," Wireless Networks, vol. 13, no. 6, pp. 799-816, 2007.
[30] L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
[31] R. Pickholtz, D. Schilling, and L. Milstein, "Theory of Spread-Spectrum Communications—A Tutorial," IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, May 1982.
[32] N. Abramson, "The Aloha System—Another Alternative for Computer Communications," Proc. AFIPS Fall Joint Computer Conf., 1970.
[33] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), 2004.
[34] C. Piro, C. Shields, and B.N. Levine, "Detecting the Sybil Attack in Mobile Ad Hoc Networks," Proc. Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm), 2006.
[35] Y. Yang and R. Kravets, "Contention-Aware Admission Control for Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, July/Aug. 2005.
[36] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. Second ACM Workshop Wireless Security (WiSe), 2003.
[37] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
[38] J. Eriksson, S.V. Krishnamurthy, and M. Faloutsos, "Truelink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks," Proc. 14th IEEE Int'l Conf. Network Protocols (ICNP '06), 2006.
[39] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," Proc. Network and Distributed System Security Symp. (NDSS), 2004.
[40] A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and Secure Source Authentication for Multicast," Proc. Network and Distributed System Security Symp. (NDSS), Feb. 2001.
[41] M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '08), 2008.
[42] D.S. Moore and G.P. McCabe, Introduction to the Practice of Statistics. W.H. Freeman, 2003.
[43] "Global Mobile Information Systems Simulation Library— GloMoSim," http://pcl.cs.ucla.edu/projectsglomosim, 2010.
[44] M. Guerrero Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," Proc. First ACM Workshop Wireless Security (WiSe '02), 2002.
[45] P. Papadimitratos and Z.J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," Proc. IEEE Symp. Applications and the Internet (SAINT '03) Workshops, 2003.
[46] P.P. Papadimitratos and Z.J. Haas, "Secure Route Discovery for QoS-Aware Routing in Ad Hoc Networks," Proc. IEEE/Sarnoff Symp. Advances in Wired and Wireless Comm., 2006.
[47] T. Zhu and M. Yu, "A Dynamic Secure QoS Routing Protocol for Wireless Ad Hoc Networks," Proc. IEEE Sarnoff Symp., 2006.

Citations
782 A High-Throughput Path Metric for Multi-Hop Wireless Routing - Couto, Aguayo, et al. (Show Context)
720 Ariadne: A secure on-demand routing protocol for ad hoc networks - Hu, Perrig, et al. - 2002 (Show Context)
519 Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks - Hu, Perrig, et al. - 2003 (Show Context)
505 Secure routing for mobile ad hoc networks - Papadimitratos, Haas - 2002 (Show Context)
462 Routing in multi-radio, multi-hop wireless mesh networks - Draves, Padhye, et al. - 2004 (Show Context)
429 SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks”, Ad Hoc Networks Volume 1, Issue 1 - Hu, B, et al. - 2003 (Show Context)
419 The ALOHA System: another alternative for computer communications - Abramson - 1970 (Show Context)
405 A secure routing protocol for ad hoc networks - Sanzgiri, Dahill, et al. - 2002 (Show Context)
398 A control-theoretic approach to flow control - Keshav - 1991 (Show Context)
326 Stimulating cooperation in self-organizing mobile ad hoc networks - Buttyán, Hubaux (Show Context)
232 Comparison of routing metrics for static multi-hop wireless networks - Draves, Padhye, et al. - 2004 (Show Context)
229 Efficient and secure source authentication for multicast - Perrig, Canetti, et al. - 2001 (Show Context)
212 The basic practice of statistics - Moore - 1995 (Show Context)
150 On-demand multicast routing protocol in multihop wireless mobile networks - Lee, Su, et al. - 2002 (Show Context)
135 Adaptive demand-driven multicast routing in multihop wireless ad hoc networks - Jetcheva, Johnson - 2001 (Show Context)
134 Using Directional Antennas to Prevent Wormhole Attacks - Hu, Evans - 2004 (Show Context)
117 A multi-radio unification protocol for IEEE 802.11 wireless networks - Adya, Bahl, et al. - 2004 (Show Context)
111 Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks - Chandra, Ramasubramaniam, et al. - 2001 (Show Context)
102 Coping with communication gray zones in IEEE 802.11b based ad hoc networks - Lundgren, Nordstrom, et al. - 2002 (Show Context)
95 Mitigating Routing Misbehavior - Marti, Giuli, et al. - 2000 (Show Context)
83 On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks – an integrated approach using game theoretical and cryptographic techniques - Zhong, Li, et al. - 2003 (Show Context)
83 Contention-aware admission control for ad hoc networks,” Univ. Illinois at - Yang, Kravets - 2003 (Show Context)
82 A Multi-Radio Unification Protocol for - Adya, Bahl, et al. - 2004 (Show Context)
78 Secure page link state routing for mobile ad hoc networks - Papadimitratos, Haas - 2003 (Show Context)
75 GeoTORA: A protocol for geocasting in mobile ad hoc networks - Ko, Vaidya - 2000
74 Theory of spread-spectrum communications—a tutorial - Pickholtz, Schilling, et al. - 1982 (Show Context)
69 On-Demand Multicast Routing - Lee, Su, et al. - 2002 (Show Context)
64 Flooding-based geocasting protocols for mobile ad hoc networks - Ko, Vaidya - 2002 (Show Context)
63 Multicast ad hoc ondemand distance vector (MAODV) routing - Royer, Perkins - 2000 (Show Context)
55 Garcia-Luna-Aceves, “Scalable multicasting: the core-assisted mesh protocol,” Mob - Madruga, J (Show Context)
54 Secure Data Transmission in Mobile Ad Hoc Networks - Papadimitratos, Haas - 2003 (Show Context)
49 Rushing Attacks and Defense - Hu, Perrig, et al. - 2003 (Show Context)
40 The medium time metric: High throughput route selection in multirate ad hoc wireless networks - Awerbuch, Holmer, et al. - 2005 (Show Context)
33 Truelink: A practical countermeasure to the wormhole attack - Eriksson, Krishnamurthy, et al. - 2006 (Show Context)
30 Securing Adhoc Routing - Zapata, Asokan (Show Context)
24 ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks - Awerbuch, Curtmola, et al. - 2007 (Show Context)
23 High-throughput multicast routing metrics in wireless mesh networks,” Elsevier Ad Hoc Ntwks - Roy, Koutsonikolas, et al. - 2007 (Show Context)
22 Coping with Communication Gray Zones - Nordstrom - 2002 (Show Context)
20 The Sybil Attack - Newsome, Shi, et al. - 2004 (Show Context)
16 Detecting the Sybil attack in mobile ad hoc networks - Piro, Shields, et al. - 2006 (Show Context)
10 HIMAC: High throughput MAC layer multicasting in wireless networks - Chen, Lee, et al. - 2006 (Show Context)
10 BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks - Curtmola, Nita-Rotaru - 2007 (Show Context)
8 Securing MAODV: Attacks and countermeasures - Roy, Addada, et al. - 2005 (Show Context)
6 On the Survivability of Routing - Awerbuch, Curtmola, et al. - 2005 (Show Context)
5 On the pitfalls of using high-throughput multicast metrics in adversarial wireless mesh networks - Dong, Curtmola, et al. - 2008 (Show Context)
5 GeoTORA: A Protocol for Geocasting - Ko, Vaidya - 2000 (Show Context)
4 Secure Neighbor Discovery - Poturalski, Papadimitratos, et al. - 2008 (Show Context)
4 A Dynamic Secure QoS Routing Protocol for Wireless Ad Hoc Networks - Zhu, Yu - 2006 (Show Context)
2 Secure Route Discovery for QoS-Aware Routing - Papadimitratos, Haas - 2006 (Show Context)

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: efficient multicast algorithms for multichannel wireless mesh networks, secure high throughput, us 2004 elections, code in ns2 for throughput, who is ricki lee, multicast wsn ns2, self reconfigurable wireless mesh networks with source code free download,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  free download source code of online college magazine 5 17,427 29-06-2018, 10:09 AM
Last Post: Guest
  opengl source code for butterfly 3 3,234 14-05-2018, 08:57 AM
Last Post: Akshatha k
  ice cream parlour management system in vb source code 4 5,245 04-04-2018, 11:58 PM
Last Post: vprk77
  source code in php for online training and placement cell management 1 6,654 23-03-2018, 09:06 AM
Last Post: ritzi
  free download college website project in html with source code 2 4,580 24-02-2018, 10:46 AM
Last Post: Guest
  source code for hospital management system in jsp 4 1,931 13-01-2018, 10:51 AM
Last Post: dhanabhagya
  source code in c for dna cryptography in computer sc ppt 1 1,508 09-01-2018, 09:59 PM
Last Post: harshavarshinib
  transmission lines and networks umesh sinha pdf 3 1,597 17-11-2017, 10:30 AM
Last Post: jaseela123d
  java programmings for bus ticket reservation source code 1 6,200 09-11-2017, 11:28 PM
Last Post: Ayushi Nagar
  skin cancer detection using neural networks matlab code 13 3,789 23-10-2017, 02:52 PM
Last Post: Guest

Forum Jump: