Title : SECURE HIGH THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORKS

Type of Material: Thesis
Title: SECURE HIGH THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORKS
Researcher: P.BALAKUMAR
Guide: M.RAJANI
Department: Department of Engineering and Technology(Computer Science and Engineering)
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2011
Language: English
Subject: ECONOMICAL FEASIBILITY
SOCIAL FEASIBILITY
UNIT TESTING
INTEGRATION TESTING
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2011; D08CS025
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454571
003IN-AhILN
0052024-09-17 12:37:06
008__240917t2011||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454571
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aP.BALAKUMAR|eResearcher
110__|aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein
245__|aSECURE HIGH THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORKS
260__|aChennai|bBharath University, Chennai|c2011
300__|dDVD
502__|bPhD|d2011|oD08CS025|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai
518__|d2008-01-04|oDate of Registration
520__|aMulticast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. We identify novel attacks against high-throughput multicast protocols in wireless mesh networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We conclude that aggressive path selection is a double-edged sword: While it maximizes throughput, it also increases attack effectiveness in the absence of defence mechanisms. Our approach to defend against the identified attacks comb
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aECONOMICAL FEASIBILITY
653__|aSOCIAL FEASIBILITY
653__|aUNIT TESTING
653__|aINTEGRATION TESTING
700__|aM.RAJANI|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/170920|yShodhganga
905__|afromsg

User Feedback Comes Under This section.