Font Size: a A A

Trusted Network Coding Aware Multicast Routing For Ad Hoc Networks

Posted on:2012-07-01Degree:DoctorType:Dissertation
Country:ChinaCandidate:W Z YangFull Text:PDF
GTID:1228330344451860Subject:Information security
Abstract/Summary:PDF Full Text Request
It is not only new opportunity but also more extensive applications for wireless multicast that wireless network is increasingly popular. However, due to the complexity of wireless network, the limitedness of wireless transmission frequency band and the unreliability and insecurity of wireless channel, conventional multicast service encounters new challenge, therefore, the trusted multicast routing for Ad Hoc networks becomes the new significant research direction. In order to adapt to the high demanding environment of Ad Hoc networks, supported by the National Natural Science Foundation of China (The Key Theory and Application Research of Trustd Mobile Internet), this thesis investigates the key technologies of trusted network coding aware multicast routing for Ad Hoc networks, such as performance model of intra-flow network coding aware multicast routing, inter-flow network coding opportunities analysis, reliable mechanism of multicast routing based on network coding and opportunistic routing, NULL key detection method of lightweight anti packet pollution attack and so on so as to overcome the theory defects and technical blocks from reliability and security the both aspects. Trusted network coding aware multicast routing for Ad Hoc networks is the main concern in this thesis from reliability and security the two sides, The details are as follows:1. Network coding aware routing metric. The premise that trusted network coding aware multicast routing can work is that there is a network coding aware multicast routing, augmenting it by adding reliabile and secure mechanism can result in trusted network coding aware multicast routing. The wireless network throughput approaching the maximal flow minimum cut capacity limit can be improved by network coding. In fact, how to select nodes to encode the received packets will affect the performance of trusted network coding aware multicast routing. Therefore, analysis and research of the network coding capability or opportunisties of a node is involved in the practical network coding aware multicast routing. Choosing the node with the better network coding ability will make a progress further in throughput for network coding aware multicast routing, so the network coding aware multicast routing can be easily formulated based on this network coding aware routing metric.2. The reliable mechanism of network coding aware mutlicast routing. There are two issues to be addressed for reliable network coding aware multicast routing. The first one is retransmission due to the lossy wireless channel, the other one is fault-tolerance of multicast routing. The first one can be addressed using network coding by mixing multi-lost packets into one coded packet. The second one can be overcomed by opportunistic routing due to the adaptability of it. So, integrating network coding and opportunistic routing can provide a fairly perfect scheme for the reliable mechanism of network coding aware multicast routing, which not only improve the reliability of network coding aware multicast routing but also boost the throughput of it.3. The secure mechanism of network coding aware multicast routing. The confidentiality, integrity and repudiation of multicast packets and the availability of multicast service must be supported in secure network coding aware multicast routing. In high-security level environment, the confidentiality, integrity and repudiation of multicast packets can be implemented by encryption and digital signature. However, in low-security level environment, the confidentiality and integrity of multicast packets can be resorted to network coding itself and NULL key, since the coded packet can confuse other nodes in the network and the NULL key is also a low complex packet integrity detection method. The availability of multicast service can be guaranteed by the reliable mechanisim of the multicast routing and the NULL key. Based on the reliable and secure mechanism of the network coding aware multicast routing, it is feasible for trusted network coding aware multicast routing protocol from the perspective of information security.Based on the research mentioned above, the achievements of this thesis are as follows:1. Intra-flow network coding aware multicast routing protocol. The performance model of intra-flow network coding aware multicast routing derived from the mutli-dimension Markov Chain can provide the equation of expected successful transmission delay of a batch of packets on the multicast tree. The approximate optimal intra-flow network coding aware multicast routing protocol can be formulated from the perspective of minimizing the expected transmission delay of a batch of packets.2. Inter-flow network coding aware routing protocol. The inter-flow network coding opportunities not only provide knowledge for inter-flow network coding aware multicast routing but also establish the base for routing metric of it. Based on the network coding aware routing metric, iner-flow network coding aware routing protocol can be formulated.3. The reliable mechanism of network coding aware multicast routing. Opportunistic routing and network coding defeat the dynamics of wireless network and the inefficiency of wireless retransmission respectively, so the reliable mechanism of multicast is guaranteed by the combination of network coding and opportunistic routing.4. The secure mechanism of network coding aware multicast routing. Due to the packet integrity detection approach based on NULL key, the time-consuming packet integrity decection algorithm based on secure Hash function is avoided, so it is the key of the secure mechanism of network coding aware routing.The key technologies and theory of trusted network coding aware multicast routing are developed in this thesis, the achievements in this thesis promises to the insight for the further popular of Ad Hoc networks.
Keywords/Search Tags:Multicast, Network Coding, Ad Hoc networks, network coding aware, Trustworthiness
PDF Full Text Request
Related items