Font Size: a A A

The Study And Implementation Of Secure Data Forwarding Protocols

Posted on:2008-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:X H YangFull Text:PDF
GTID:2178360242498803Subject:Army commanding learn
Abstract/Summary:PDF Full Text Request
Routers play a key role in modern network communications. An intruded or malicious router can not only disturb the services it supplies, but also can disturb routing protocols and attack data packets flowing through it. Those attacks can lead to severe fault. Securing routing protocols has gotten a great deal of attention. By comparison, the security of packet forwarding has been neglected. A malicious router can drop, modify, divert and delay any packet flowing through it. All of those can severely disturb network traffic.The thesis focuses on the technique and implementation of secure data forwarding. The main contributions are as follows. Firstly, as secure data forwarding needs to authenticate each data packet, light weight authentication mechanisms is analyzed. Then attacks to routing protocols and data forwarding are studied. Some important secure routing protocols and secure data forwarding protocols are also analyzed. Following that, a Secure data Routing and Malicious routers Detecting protocol (SRMD) is proposed, which has low overhead and can provide secure data forwarding with Byzantine robustness. Through the simulation, SRMD is better than HSER. Secondly, an Information Conversation based Secure Data Forwarding protocol (ICSDF) for wireless ad hoc network is proposed, which is based on SRMD and can provide secure data forwarding with Byzantine robustness. Thirdly, implement the two protocols, SRMD and ICSDF, on NS2 and test average delay, byte overhead and packet delivery ratio of them two. We can conclude that the two secure protocols have low overhead and can provide high security.The products in this thesis are applied in a National Natural Science Foundation of China and provide an effective solution for secure data forwarding and malicious routers detecting.
Keywords/Search Tags:Network security, Data forwarding, Attack model, Authentication, Simulation
PDF Full Text Request
Related items