Font Size: a A A

Based On Trust Ad Hoc Network Intrusion Detection System Model

Posted on:2007-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhouFull Text:PDF
GTID:2208360185991216Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless Ad Hoc network is a kind of self-organized networks. The Ad Hoc network is organized by mobile nodes, so it has a character of dynamic changing topology. There is no centralized control node in Ad Hoc networks, each node is on a equal position, and all the nodes use wireless channel to communicate with each other, and now all the nodes has limited energy and processing capacity. Because of all the specialities of Ad Hoc networks, that traditional routing protocol and security mechanism can not be simply applied in Ad Hoc networks. According to these specialities, many kind of routing protocol were developed, but some of them were not adapt to Ad Hoc networks, or has advantage and disadvantage of each other. Also these specialities make Ad Hoc networks have many secure weaknesses that are differ form traditional networks, but as the technology of Ad Hoc networks progress, those weaknesses are studied more and more, and many solutions are brought forward consequently.After study, we proposed a clonal-based distributing Intrusion Detection System model that combined with the trustdegree of the nodes. First we chose a suitable protocol after analyzing some typical protocol of Ad Hoc networks, i.e. AODV protocol. Then we extend the protocol, and use this extended protocol to transmit the information of the trustdegree of nodes. At last we constitute a clonal-based distributing Intrusion Detection System model that generate and control the node s trustdegree to other nodes and utilize the information of trustdegrees that between other nodes, and we design trustdegree— control—module and net—alternation—module to make nodes can cooperate with each other.
Keywords/Search Tags:Ad Hoc, trustdegree, AODV, artificial immune, clonal, net alternation
PDF Full Text Request
Related items