Font Size: a A A

Wireless Ad Hoc Networks Trusted Aodv Routing Protocol

Posted on:2013-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:H F ZhangFull Text:PDF
GTID:2218330371457251Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Wireless Ad hoc network which is composed by a group of wireless mobile nodes can be deployed rapidly with the absence of fixed communication infrastructure, can also be organized by themselves automatically with the least manual intervention, so it has a very broad application prospects in military communications, disaster relief and daily life. However, because of its dynamic topology, centerlessness and open wireless communication channel, wireless Ad hoc network faces lots of security threats, in which the security of routing protocol is the most important. For this purpose, this thesis designed an enhanced AODV protocol based on the new constructed trust model. The main contributions of this thesis are listed as follows.1) The current research status about wireless Ad hoc network is introduced, characteristics and security threat of it are analyzed and the existing protection measures for those security threats are summarized.2) Considering the attacks of malicious node, an enhanced trust model with attacks' detection is presented. The trust model composed by the attribute of direct trust, malicious behavior and collaboration is constructed to collect the evidences, get the trust value and make scientific trust decision.3) The improved AODV protocol based on the proposed trust model is designed. This protocol is composed by the modules of node trust and routing selection. The module of node trust is responsible for the collection of interaction evidences between neighboring nodes to obtain their trust degrees. The other is used to filter malicious nodes and select the most reliable routing among several alternative ones.4) Based on the network simulation software OPNET, TAODV protocol is tested and proved to be effective to defend attacks from malicious nodes.Finally, a summarization of the dissertation is given and the future work is prospected.
Keywords/Search Tags:Trust model, Trusty routing protocol, AODV, WirelessAd hoc network
PDF Full Text Request
Related items