Secure high-throughput multicast routing in wireless mesh networks

Jing Dong, Reza Curtmola, Cristina Nita-Rotaru

Research output: Contribution to journalArticlepeer-review

30 Scopus citations


Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. In this work, we identify novel attacks against high-throughput multicast protocols in wireless mesh networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We conclude that aggressive path selection is a double-edged sword: While it maximizes throughput, it also increases attack effectiveness in the absence of defense mechanisms. Our approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The solution accommodates transient network variations and is resilient against attempts to exploit the defense mechanism itself. A detailed security analysis of our defense scheme establishes bounds on the impact of attacks. We demonstrate both the attacks and our defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting.

Original languageEnglish (US)
Article number5601734
Pages (from-to)653-668
Number of pages16
JournalIEEE Transactions on Mobile Computing
Issue number5
StatePublished - May 2011

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


  • Byzantine attacks.
  • Wireless mesh networks
  • high-throughput metrics
  • metric manipulation attacks
  • secure multicast routing


Dive into the research topics of 'Secure high-throughput multicast routing in wireless mesh networks'. Together they form a unique fingerprint.

Cite this