Font Size: a A A

Research On Intrusion Detection System In Mobile Ad Hoc Networks

Posted on:2009-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z S YinFull Text:PDF
GTID:2178360242477090Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Ad Hoc network , which is also called MANET (Mobile Ad hoc NETwork), is a collection of wireless computers, communicating among themselves over possible multi-hop paths, without the help of any infrastructure, such as base stations or access points. Nodes in mobile Ad Hoc network collaboratively contribute to routing functionality by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range, hence practically all nodes may act as both hosts and routers. Mobile Ad Hoc networks require no centralized administration or fixed network infrastructure and can be quickly and inexpensively set up as needed.With the rapid proliferation of Ad Hoc network in many areas, the Ad Hoc network has become an exciting and important technology in recent years. The features of the Ad Hoc network include infrastructureless, multi-hop, mobility and so on, which makes it very vulnerable to an adversary's malicious attacks and more difficult to prevent the intrusions than in traditional wired network. Therefore, intrusion detection which presents a second wall of defense is a necessity in any high-survivability network. In the thesis, the attack behaviors are divided into two kinds, including route logic compromise and traffic pattern distortion after the analysis on them. Route logic compromise can be prevented and detected by secure routing protocols to ensure the route information safety and reliability. The thesis presents an attack detection policy based on data link monitoring with the support of secure routing protocol, which aims at traffic pattern distortion. The nodes on data link monitor the behaviors of the previous and next nodes to assure the security of data link on a base of trustworthy routing information. Analysis and simulation results show that the policy is efficient.
Keywords/Search Tags:Ad Hoc Networks, Intrusion detection, Secure routing protocol, Data link monitoring
PDF Full Text Request
Related items