Font Size: a A A

Study Of A Security Routing Protocol Of Wireless Mesh Networks

Posted on:2011-11-17Degree:MasterType:Thesis
Country:ChinaCandidate:J C YaoFull Text:PDF
GTID:2178360308962531Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the development of wireless communications and mobile computing technology, wireless city construction has become the direction of today's wireless broadband technology. In the wireless city construction, the Wireless Mesh Networks is known as an emerging technology which has gained widespread attention. Wireless Mesh networks, however, beginning in the design, considering the main objective is fast and convenient networking, and network scalability, while security is not the main point of this technology. However, in the wireless application environment, Wireless Mesh Networks will face a lot of security problems, in particular, the routing-level security issues. Because most of the existing routing protocols are designed only in order to establish routing, nodes need to exchange network topology information, which makes routing protocols as a malicious attack on the network nodes in the main objective. When the Wireless Mesh Networks experiment from the campus into the business environment, improving the security of the Wireless Mesh Networks, in particular the routing level security is considered as an urgent research.Based on the fully explanation of the characteristics and security goals to Wireless Mesh Networks, as well as a comprehensive understanding of existing routing protocols of Wireless Mesh Networks, a security routing protocol against two typical of routing attacks, black holes and wormholes attacks has been proposed in this paper, which is proper for the Wireless Mesh Networks. Based on the core idea of "only allow the node to carry a small amount of useful information", the network is divided into two processes, and eight kinds of related message format are also defined. Through the design of how to use the defined message format for information transmission and verification in the communication process between access points and the Mesh nodes, the security of the Wireless Mesh Network routing has been ensured.After the modulation of relevant events, NS2 is also introduced for the simulation of this security routing protocol, the performance of the Wireless Mesh Networks security routing protocols has been verified and analyzed. Prior to adding the mechanism to prevent the routing layer attacks, under the circumstances of the malicious node attack, the performances of AODV, DSR and the security routing protocol proposed in this paper are presented. After a statistical processing of simulation data, the network latency, the network packet loss rate and network throughput curves are compared and analyzed, which proves the effectiveness of the proposed Wireless Mesh Network security routing protocol.
Keywords/Search Tags:Wireless Mesh Networks, routing level attack, AODV, DSR, NS2 simulation
PDF Full Text Request
Related items