Font Size: a A A

Research Of Secure AODV Routing Protocol Based On Chaos Algorithm

Posted on:2007-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:X M YanFull Text:PDF
GTID:2178360212466462Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Ad Hoc Networks is widely applied to situations needed to set up temporary communication network like military affairs, disaster rescue, etc. Ad Hoc Networks is usually used to enhance the scalability, mobility of the wireless network and make it to be managed easily. Security issue is a quite crucial task in the study of the Ad Hoc Networks. The security targets of the Ad Hoc Networks include availability, confidentiality, integrality, authentication and nonrepudiation.Due to the particularity of the Ad Hoc Networks, security becomes the challenge in the Ad Hoc Networks.AODV is an on Demand Driven Routing Protocol and an important and popular protocol in the Ad Hoc Networks. Source node initializes the route finding process when it needs to communicate with destination node. The nodes in the Ad Hoc Networks hold limited energy, limited processing and storing capacity. On Demand Driven Routing Protocol reduces energy spoilage. AODV is the hotspot in the research of the Ad Hoc Networks and has widely application foreground. Wherefore this paper focuses on the secure AODV protocol for the Ad Hoc Networks.Firstly this thesis evaluates time performance of the two stream cipher, RC4 and CHAOS. The evalutating programs written by C++ are tested in Linux. In the paper, cipher algorithm is not only used to implement encryption and decryption but also used to source authentication.Secondly, after reviewing some different secure routing protocol, expansion and modification on the security of the AODV protocol are performed, an ameliorate project is put forward: securing AODV routing protocol based on chaos encryption. The scheme divides the data into nonvoliatile fields or volatile fields,and hash chain is applied to authenticate volatile fields. Then chaotic ciphers are introduced to provide source authentication and message integrity for the nonvolatile fields. This paper describes the details of the improved protocol and the presents the security analysis.Thirdly, for simulating the improved protocol on NS-2, original AODV route protocol is expanded. After recompiles NS-2, the metric related to the time performance such as end to end delay, speed of the mobile nodes, packets delivery fraction are tested. Finally the paper plots and analyses the results and makes out the conclusions.
Keywords/Search Tags:Ad Hoc, AODV, Chaos, Security, NS
PDF Full Text Request
Related items