Final Review
Final Review
Multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data.
propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously.
Path selection is based on the greedy approach of selecting path with best metric . An estimation of the target performance derived from the path metric. Previous work showed vulnerabilities of unicast routing protocols that use hop count as a metric. There exists an efficient metric refreshment protocol that allows nodes to obtain correct metrics for attack recovery. metric can be
Operating System
Windows XP
Software
Tool User Interface
:
: :
: 512MB 40GB
Intel Pentium
The RSA algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in 1977. The RSA cryptosystem is the most widely-used public key cryptography algorithm in the world. It can be used to encrypt a message without the need to exchange a secret key separately. The RSA algorithm can be used for both public key encryption and digital signatures. Its security is based on the difficulty of factoring large integers.
Generate two large prime numbers, p and q Let n = pq Let m = (p-1)(q-1) Choose a small number e, coprime to m Find d, such that de % m = 1
Encryption C = Pe % n Decryption P = Cd % n
Digital signatures employ a type of asymmetric cryptography. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital
that the signer cannot successfully claim they did not sign a
message, while also claiming their private key remains secret.
Signature verification may be performed by any party (i.e., the signatory, the intended recipient or any other party) using the signatorys public key. A signatory may wish to verify that the computed signature is correct, perhaps before sending the signed message to the intended recipient.
The intended recipient (or any other party) verifies the signature to
determine its authenticity. Prior to verifying the signature of a signed message, the domain parameters, and the claimed signatorys public key and identity shall be made available to the verifier in an authenticated manner.
Router
Server
Client A
Generating keys
We considered the security implication of using high throughput metrics in multicast protocols in wireless mesh networks. In particular, we identified metric manipulation attacks that can inflict significant damage on the network. The attack snot only have a direct impact on the multicast service, but also raise additional challenges in defending against them due to
their metric poisoning effect. We overcome the challenges with our novel
defense scheme that combines measurement-based attack detection and accusation-based reaction. Our defense also copes with transient network variations and malicious attempts to attack the network indirectly by exploiting the defense itself. We demonstrate through experiments that our defense is effective against the identified attacks, resilient to malicious exploitations, and imposes a small overhead.