23-04-2012, 03:35 PM
Secure Traffic Monitoring High Efficiency Multicast Routing in Wireless Mesh Networks
JOURNAL.doc (Size: 152 KB / Downloads: 33)
. INTRODUCTION
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways, while the APs that do not have wired connections are called the mesh routers. The Mesh Routers are connected to the Internet Gateways using multi-hop communication.
Due to the recent research advances in WMNs, these networks have been used in numerous applications such as in home networking, community and neighborhood monitoring security surveillance systems, disaster management and rescue operations etc (Franklin et al., 2007). As there is no wired infrastructure to deploy in the case of WMNs, they are considered cost-effective alternative to wireless local area networks (WLANs) and backbone networks to mobile clients. The existing wireless networking technologies such as IEEE
RELATED WORK
The paper [1] considers the problem of providing a geocast service in mobile ad hoc networks and provides a novel geocasting algorithm combining both unicasting and flooding. Geocast is extensively used for sending messages to everyone located in a specified geographical region. The proposed protocol is named GeoTORA, because it is derived from the TORA (unicast) one of the routing protocol. Flooding is also incorporated in GeoTORA, but it is limited to nodes within a small region. This integration of TORA and flooding can significantly reduce the overhead of geocast delivery, while maintaining reasonably high accuracy.
METHODOLOGY
To evaluate high efficient multicast routing in wireless mesh networks, we identify the redundant identity techniques by way of preventing sybil attacks and dismiss masquerading adversary nodes. The proposed scheme creates a local identity that accepts a neighbor identity based on certificate of user authority and at the same time ensures a one-to-one correspondence between neighbor multicast nodes. Multicast user identity are validated either directly or indirectly. In direct validation local node queries user authority to validate the neighbor nodes and in case of indirect validation local node relies on already accepted identities.
Traffic volume in multicast mesh network
The communication is established in the node level by way of multicasting in the mesh network. The next step consists of applying the variation in traffic volume in multicast mesh network. The multicast is carried out in a normal traffic rate by varying the data transfer rate. Multicasting routing consists of multicast the packets from source to destination. The volume of multicast traffic is raised with different nodes of sources and receivers.
Initiation of sybil attack
The next process comprises of the initiation of sybil attack. This process subverts authentication system of multicast wireless mesh network. It creates a large number of redundant unique user identities. The module gain influence on authentic multicast users. The job of adversary nodes is to advertise itself on multicast mesh network by way of presenting itself as a fake unique identity.