Font Size: a A A

Research Of Secure Routing Protocols In Mobile Ad Hoc Networks

Posted on:2008-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2178360272467476Subject:Information security
Abstract/Summary:PDF Full Text Request
Recently, as advances in capability of mobility, wireless communication and storage of portable devices such as laptop computers, palmtop computers, mobile Ad Hoc networks(MANETs) have got wide and deep application, especially in military fields. Since the openness of wireless links and the particularity of military application, secure routing in MANETS is much more important.MANETs are a kind of multihop wireless networks without centralized administration, in which nodes perform routing discovery and routing maintenance in a self-organized way. Due to some of its characteristics such as the absence of infrastructure, frequent changes in network topology, openness of wireless links, no way to detect and isolate misbehaving nodes, and lack of self-stabilization property, MANETs are prone to be unstable and vulnerable. Possible attacks in MANETs routing protocols are modification, impersonation and fabrication, etc. Consequently, their security issues become more urgent requirements and it is more difficult to design and implement security solutions for MANETs than wired networks.Most of routing protocols proposed for Ad Hoc networks assume a trusted, non-adversarial environment and do not take security issues into account in their design. In this paper, we investigate the security of AODV-Clustering, and identify several attacks on it,which can have a significant impact on the performance of AODV-Clustering. The scheme strategy that take advantage of the threshold cryptography scheme,authentication,trust evaluation and trust based clustering algrithm in AODV-Clustering can prevent or mitigate the impact of these attacks, and then make nodes and AODV-Clustering protocol secury.We propose a novel intrusion detection and response system called Routeguard. Routeguard classifies the nodes into different categories depending on their current actions and previous history in order to effectively discover malicious nodes and then proceeds to protect the network. It produces a more natural system, which is more capable of dealing with malicious or suspected nodes than Pathrater. Finally, we propose RGAODV routing protocol which is a aodv routing protocol based on Routeguard.
Keywords/Search Tags:Mobile Ad Hoc Networks, Secure Routing, Trust Evaluation, Threshold Cryptography, Authentication
PDF Full Text Request
Related items