Documente Academic
Documente Profesional
Documente Cultură
Team Members:
1. SaiKiran - 11671A1237
2. Sridhar
- 11671A1225
3. Priyanka - 11671A1205
4. Srujan
- 11671A1203
ABSTRACT
Multicast routing for wireless mesh networks has focused on metrics that estimate link
quality to maximize throughput.
Nodes must collaborate in order to compute the path metric and forward data. But, during
data forwarding, it may leads to unexpected consequences in which nodes act
maliciously.
We identify attacks against high-throughput multicast protocols in wireless mesh
networks.
While it maximizes throughput, it also increases attack effectiveness in the absence of
defense mechanisms. Our approach to defend against the identified attacks.
We demonstrate both the attacks and our defense using ODMRP(On Demand Multiple
Routing Protocol), a representative multicast protocol for wireless mesh networks.
Existing System:
Previously we used unicast routing protocols that use Hop count as a
metric
Path selection is based on the greedy approach of selecting path with best
metric
An estimation of the target performance metric can be derived from the
path metric.
Proposed System:
To provide Multicast services for multi-hop wireless networks.
Focusing primarily on network connectivity and using the number of hops
(or hop count) between the source and receivers as the route selection
metric.
Perform a detailed security analysis and establish bounds on the impact of
attacks.
Extensive simulations with ODMRP it confirms our analysis and show
that our strategy is very effective in defending against the attacks.
HARDWARE REQUIREMENTS:
Processor
RAM
Hard Disk
:
:
:
Intel Pentium-IV
1GB
50GB
SOFTWARE REQUIREMENTS:
Operating System
: Windows 8.1
Software
: JAVA (JDK 1.6)
Tool
: Eclipse
Front End
:
Java, RMI, Swings
SYSTEM ARCHITECTURE
Architecture of
Wireless Mesh Network
Modules:
1.High Throughput Mesh-Based Multicast Routing
2. Attacks against High-Throughput Multicast
3. Metric Manipulation Attacks
4. Local Metric Manipulation Attacks
5. Global Metric Manipulation Attacks
UML DIAGRAMS
Use Case Diagram:
Class Diagram:
Activity Diagram:
Sequence Diagram:
UI SCREENS