Font Size: a A A

Performance Simulation Of Routing Protocols With Byzantine Attacks For Ad Hoc Wireless Network

Posted on:2012-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y H XiaFull Text:PDF
GTID:2178330335466793Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With mobile communications technology continues to progress, mobile communications network has developed rapidly. Being one of the mobile communications networks, Ad hoc network received significant attention in recent years because it can be used to provide a supporting environment of communication in the absence of network infrastructure.Ad hoc network is a type of non-base station communication networks that can be set up temporarily and fast in special environment. In Ad hoc networks the nodes act as a router simultaneously, and they exchange network topology information by creating, deleting and updating the network routing, however, mobile Ad hoc networks routing protocol security is fragile due to the characteristics of its own, it is easy to implement and can cause serious destructive when the internal attacks caused by active attacks in network, indeed, coping with proactive internal attacks in Ad hoc routing security issues is very crucial. Reza Curtmola and Baruch Awerbuch defined Byzantine attacks as adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network, they also defined Byzantine black hole, flood rushing, Byzantine wormhole attack and Byzantine overlay network wormhole attack.In this paper, we describe four types of Byzantine attacks and analysis their working mechanism, meanwhile extending Sybil attack according to definition of Byzantine attacks. Then we extend protocol independent Sybil attack modules. Finally simulations are carried out in two types of routing protocol (i.e. AODV and DSDV) on NS2 simulation tool in different environment. The conclusion reflects characters of Table-driven routing and ondemand routing, and validates the performance changes caused by Byzantine Attacks besides we propose a new simulation method for further study on Byzantine attack detection and protection way.
Keywords/Search Tags:Ad hoc network, Byzantine attacks, routing protocol, NS2
PDF Full Text Request
Related items