Type of Material: | Thesis |
Title: | SECURE HIGH THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORKS |
Researcher: | P.BALAKUMAR |
Guide: | M.RAJANI |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2011 |
Language: | English |
Subject: | ECONOMICAL FEASIBILITY | SOCIAL FEASIBILITY | UNIT TESTING | INTEGRATION TESTING | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2011; D08CS025 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454571 | |
003 | IN-AhILN | |
005 | 2024-09-17 12:37:06 | |
008 | __ | 240917t2011||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454571 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aP.BALAKUMAR|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein |
245 | __ | |aSECURE HIGH THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORKS |
260 | __ | |aChennai|bBharath University, Chennai|c2011 |
300 | __ | |dDVD |
502 | __ | |bPhD|d2011|oD08CS025|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai |
518 | __ | |d2008-01-04|oDate of Registration |
520 | __ | |aMulticast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. We identify novel attacks against high-throughput multicast protocols in wireless mesh networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We conclude that aggressive path selection is a double-edged sword: While it maximizes throughput, it also increases attack effectiveness in the absence of defence mechanisms. Our approach to defend against the identified attacks comb |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aECONOMICAL FEASIBILITY |
653 | __ | |aSOCIAL FEASIBILITY |
653 | __ | |aUNIT TESTING |
653 | __ | |aINTEGRATION TESTING |
700 | __ | |aM.RAJANI|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/170920|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.