Font Size: a A A

DSR-based Intrusion In Ad Hoc & The Application Of IBE To Improving Security In Ad Hoc

Posted on:2008-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2178360212494046Subject:Information security
Abstract/Summary:PDF Full Text Request
A mobile ad hoc network(MANET) is a new wireless networking paradigm for mobile hosts(nodes). Unlike traditional mobile wireless networks,Ad hoc networks do not rely on any fixed infrastructure such as base stations or mobile switching cen-ters.Instead ,hosts rely on each other to keep the network connected. Mobile nodes that are within each other's radio range communicate directly via wireless links,while those that are far apart rely on other nodes to relay messages as routers. Node mobility in an Ad hoc network causes frequent changes of the networks topology.Since an Ad hoc network can be deployed rapidly with relatively low cost,it becomes an attaractive option for commercial uses such as sensor networks or virtual classrooms.Security is an important issue for Ad hoc networks,especially for those security-sensitive applications.Many research groups focus on the security problems in Ad hoc networks.The problmes are: Routing Security in Ad hoc networks(Secure Routing Protocols),Authentication and Key Management,Intrusion Detection Sys-tem(IDS)etc. Unlike networks using dedicated nodes to support basic functions like packet forwarding ,routing,and network management ,in Ad hoc networksthose functions are carried out by all available nodes. This very difference is at the core of the security problems that are specific to Ad hoc networks.These security problems call on the other hand for different solutions.There are two principal achievements in this paper:1.Building a Intrusion-Test platform for DSR protocol in real environmentSince MANET was founded in 1997,it has worked on the Standards and interface based on IP in Ad hoc.Nodes of an Ad hoc nework rely on one another in forwarding a packet ot its destination ,due to the limited range of each mobile host wireless transmissions .MANET has proposed many Routing Protocols for Ad hoc net-works,such as DSR[22](Dynamic Source Routing),AODV[41](Ad Hoc On-demand Distance Vector),DSDV[46](Destination Sequenceld Distance Vector),TORA[42]ect. In these Ad hoc routing protocols ,nodes are tursted in that they do not maliciously tamper with the content of protocol messages transferred among nodes. Many researchers proposed malicios behaviors in Ad hoc routing proto-cols[7-17],and also some solutions. Most of these solutions or IDSes are based on simulation ,and few worked in real environment. As far as we know,there is only research result on IDS for AODV protocol in real environment.For more details ,referring[7] by Gwalani.It makes sense to set up an Intrusion-Test platform in real environment. It can help researchers to study security problems especially on IDS in Ad hoc networks. We firstly discuss some potential threats to Ad hoc networks ,and specifically present some attacks against DSR routing protocol. Secondly,we construct DSR protocol under Linux with Click script.Then we develop the Intrusion-Test platform under Linux by Click script and C++. The test platform is felpful to research and management Ad hoc network with DSR.2. Improving Security by using IBE idea in Ad hoc network In 1984 Shamir asked for a public key encryption scheme in which the publickey can be an arbitrary string. Encryption schemes of this type are called Identity Based Encryption (IBE).IBE is a key authentication system in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address).In other words, it allows users to verify digital signatures using only public information such as the user's identity.As a result, parties may encrypt messages (or verify signatures) with no prior distribution of keys between individual participants. This is extremely useful in cases where pre-distribution of authenticated keys is inconvenient or infeasable due to technical restraints, such as Ad hoc networks.In this paper, two examples are brought out to show how to improve the security in Ad hoc network by using IBE idea. One is an improved DSR routing protocol; and the other one is an ID-based Authentictable Key Agreement protocol.Two commonly used cryptographic techniques, Diffie-Hellman Key Exchange Protocol and key Encryption Technology, are implemented in this protocol. After that, we have made the analysis to show that they are suitable for Ad hoc wireless networks and they meet the basic security needs.From these two examples, we can see that the IBE idea does improve the security in Ad hoc networks, which tells us classical ideas in cryptography are still useful nowadays. They are still helpful to further research on Ad hoc wireless network security.
Keywords/Search Tags:Ad hoc Netorks, DSR Protocol, attack, click, IBE, Secrue Routing Protocol, Key Agreement
PDF Full Text Request
Related items