BSMR Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#1
02-07-2010, 06:43 PM


Abstract :-
Multihop wireless networks rely on node cooperation to provide multicast services. The multihop communication offers
increased coverage for such services but also makes them more vulnerable to insider (or Byzantine) attacks coming fromcompromised nodes that behave arbitrarily to disrupt the network. In this work, we identify vulnerabilities of on-demand multicast
routing protocols for multihop wireless networks and discuss the challenges encountered in designing mechanisms to defend againstthem. We propose BSMR, a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries.
Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results thatdemonstrate that BSMR effectively mitigates the identified attacks.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#2
27-09-2012, 11:12 AM

BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks


.doc   BSMR.doc (Size: 26 KB / Downloads: 19)

Abstract

Multihop wireless networks rely on node cooperation to provide multicast services. The multihop communication offers increased coverage for such services but also makes them more vulnerable to insider (or Byzantine) attacks coming from compromised nodes that behave arbitrarily to disrupt the network. In this work, we identify vulnerabilities of on-demand multicast routing protocols for multihop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. We propose BSMR, a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results that demonstrate that BSMR effectively mitigates the identified attacks.

Existing System

MULTICAST routing protocols deliver data from a source to multiple destinations organized in a multicast group. A major challenge in designing protocols for wireless networks is ensuring robustness to failures and resilience to attacks. Wireless networks provide a less robust communication than wired networks due to frequent broken links and a higher error rate. Security is also more challenging in multihop wireless networks because the open medium is more susceptible to outside attacks and the multihop Communication makes services more vulnerable to insider attacks coming from compromised nodes. Although an effective mechanism against outside attacks, authentication is not sufficient to protect against insider attacks because an adversary that compromised a node also gained access to the node’s cryptographic keys. Insider attacks are also known as Byzantine [9] attacks and protocols able to provide service in their presence are referred to as Byzantine-resilient protocols.

Proposed System

We propose BSMR, a secure on-demand multicast protocol for multihop wireless networks that provides resiliency against a representative set of strong Byzantine attacks (black hole, wormhole, and flood rushing). BSMR uses a selective data forwarding mitigation mechanism based on a reliability metric that captures adversarial behavior. Nodes determine the reliability of links by comparing the perceived data rate with the one advertised by the source. Adversarial links are avoided during the route discovery phase. BSMR also prevents attacks that try to prevent or arbitrarily influence route establishment. We show through simulations that the impact of several Byzantine attacks (flood rushing, black hole, and wormhole) on a previously proposed secure multicast routing protocol is considerable and cannot be ignored. We also demonstrate through simulations that our protocol BSMR mitigates the attacks, while incurring a small overhead.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Switching and Traffic Grooming in WDM Networks at java project topics 3 951 09-09-2016, 02:27 PM
Last Post: Dhanabhagya
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,747 09-12-2014, 09:25 PM
Last Post: Guest
  MABS: Multicast Authentication Based on Batch Signature seminar class 20 12,316 03-07-2014, 06:19 PM
Last Post: Guest
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,808 02-06-2014, 09:51 AM
Last Post: seminar project topic
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 722 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract seminar projects maker 2 760 08-03-2014, 12:43 PM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Enhancing the Trust of Internet Routing With Lightweight Route Attestation Report project girl 2 951 10-01-2014, 04:16 PM
Last Post: seminar project topic
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,140 30-09-2013, 10:54 AM
Last Post: Guest
  Routing Security in Ad Hoc Wireless Networks seminar projects maker 0 554 26-09-2013, 02:20 PM
Last Post: seminar projects maker