Font Size: a A A

Research On Secure Routing Protocols In Mobile Ad Hoc Networks

Posted on:2009-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q P LiuFull Text:PDF
GTID:2178360245980102Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Such convenience and fast to built, and unrestricted by the time and space, MANETS can be applied in succors, sessions, militaries, explorations and objects monitor of long distance or dangerous environments, Besides it can be used to extend the terminal network, so mobile Ad Hoc networks have got wide and deep application. It has an infrastructure less distributed mufti-hop structure; all nodes have an equal status and act as two roles-router and node itself. MANETS are a kind of multi-hop wireless networks without centralized administration, in which nodes perform routing discovery and routing maintenance in a self-organized way. All nodes have an equal status and act as two roles-router and node itself. According the scale of different networks, MANETS have two kinds of structure: flat structure and hierarchy structure. Routing protocols in MANETS have some special requirements, such as distributed operation, loop freedom, sleep period operation, unidirectional link support, etc.Due to some of its characteristics such as the absence of infrastructure, frequent changes in network topology, openness of wireless links, no way to detect and isolate misbehaving nodes, and lack of self-stabilization property, MANETS are prone to be unstable and vulnerable. Possible attacks in MANETS routing protocols are modification, impersonation and fabrication, etc. Consequently, their security issues become more urgent requirements and it is more difficult to design and implement security solutions for MANETS than for wired networks.This dissertation starts with the basic conceptions and characteristics of wireless mobile Ad Hoc network, introduces the system structure of wireless mobile Ad Hoc network and the current problems and future application. We also discuss the goal of security protocol, as well as against MANETS routing protocols malicious attacks, followed by detailed analysis of the current domestic and foreign security MANETS routing protocol ,proposed the exist problems on the base of comparing them. In view of the inadequacy of the exist routing protocol, the paper present the Secure Ad Hoc On-demand Routing(SAOR) protocol, which uses pair wise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity of the route requests and route replies. By binding the MAC address with ID of every node, the paper propose a reliable neighbor-node authentication scheme to defend against complex attacks, such as wormhole attacks, An interesting property of SAOR is the small communication overhead caused by the key establishment process, which is due to the exploitation of a Self-Certified Key(SCK) cryptosystem. Analysis and NS-2 simulation results show that SAOR effectively detects or thwarts a wide range of attacks to MANETS.
Keywords/Search Tags:Mobile Ad Hoc networks (MANETS), Routing Attack, Routing Security
PDF Full Text Request
Related items