Font Size: a A A

A Routing Protocol Simulation In Mobile Ad Hoc Networks With Intrusion And Detection System

Posted on:2009-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q LiuFull Text:PDF
GTID:2178360242977072Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Mobile Ad hoc Network,a kind of network with no infrastructure,is famous for its convenient deployment,robust communication,and dynamic topology,upon which we can provide kinds of services including data and multi-media transmission. All hosts in Mobile Ad hoc Network can move freely and communicate with each other with the help of wireless communication technologies and proper routing protocols. It is because of Mobile Ad hoc Network' s flexible characteristics that computer auxiliary simulations are employed,to save money and time,into sorts of academic researches on Mobile Ad hoc Network,especially on its routing protocols. At the same time,Security of Mobile Ad hoc network is much more important due to its public transmission media,dynamic topology,cooperative route algorithm,lack of monitoring and managing and etc. Safe routing is regarded as having the first priority over other aspects and attracts, more and more researchers to involved in. Test and Evaluation of safety of routing protocols are new problems brought into our eyes.This thesis,in turn,started at building a Mobile Ad hoc Network environment,in which 3 kinds of malicious nodes had intruded and done attacks accordingly,for example,black-hole nodes which are eager to play the router role in order to discard the useful data packet; To minimize the cost of energy,selfish nodes would skip the responsibility of a router; And faulty nodes don't forward or pop up packets due to software or hardware fault. We added these features to the original DSR routing protocol,defined part of the nodes misbehaved following the intrusive DSR routing protocol,simulated in a self-defined Mobile Ad hoc Network scenario on NS,then analyzed the traffic file run out. We analyzed the average routing hops and packet loss ratio,found out the result turned out that the quality of the network had been ruined by the intrusive system.Then we added the function of monitoring to the DSR routing protocol,compared the results to that without the monitor system,and basically the monitor system turned down the packet loss ratio and get the increase of average route hop under control.
Keywords/Search Tags:Mobile Ad hoc networks, DSR Routing Protocol, Intruded Nodes, Detection system, NS Simulation
PDF Full Text Request
Related items