Font Size: a A A

Research Of Intrusion Response Based On AODV In Mobile Ad Hoc Networks

Posted on:2009-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:C Y GuFull Text:PDF
GTID:2178360242977090Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc networks is a new type of wireless networks which appears with the development of wireless communication technology. Nodes in mobile Ad Hoc networks have autonomy and can communicate among themselves over multi-hop paths. All the nodes in the networks can move randomly without fixed routers forwarding messages and can maintain the link with others in spite of their moving. Recently, due to its mobility and convenience, mobile Ad Hoc networks are widely used in many fields. Because of its inherent vulnerability, mobile Ad Hoc networks receive widespread concern on its security. Intrusion response plays an important role in the routing security of the entire network.In this thesis, basic knowledge of mobile Ad Hoc networks is firstly introduced, such as the network structure and security problem. Then current research statues of intrusion response are summarized. Because most of the intrusions in mobile Ad Hoc networks are against routing protocols, this thesis analyzed AODV protocol and typical intrusions against AODV in detail. Followed, it discussed intrusion response technology in mobile Ad Hoc networks and pointed out that we can combine common characters of mobile agent and mobile Ad Hoc networks while design intrusion response system.On the basis of the above research, we proposed a model of intrusion detection and response system based on mobile agent technology. In the module, three mobile agents——monitor agent, decision agent and block agent that have different functions work together to response to intrusions in mobile Ad Hoc networks. This part analyzed the function of each module in detail. In the intrusion response part, it discussed methods to do response decision and used mobile firewall to execute the positive intrusion response. The mobile firewall, combined with the characters of mobile agent, isolate the intruder beyond the network by forming a firewall with the neighbors of the intruder. In this way, the intruder can be isolated and cannot disturb other nodes to communicate with each other in the network. An example is given to give more information of the working process of the intrusion response system at last.Finally, we simulated the model on NS-2. We simulated the network without intrusion response and with intrusion response included in three different intrusions, evaluated its performance by package get ratio. The result is satisfied and proved that the intrusion response system has significantly improved the performance when there's intruder in the network.
Keywords/Search Tags:Mobile Ad Hoc networks, Intrusion Response, Mobile Agent, AODV, NS-2
PDF Full Text Request
Related items