Font Size: a A A

Research On Secure Routing Protocol In Ad Hoc Network

Posted on:2011-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2178360308473181Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
As information technology continuously develops, the requirement for mobile communications becomes more and more strong, and wireless communications networks had also been rapid development and popularization. But for some special situations, the traditional fixed network and the wireless networks which require pre-deployment network infrastructure have been impossible or difficult to be used effectively. For example, the army deploying and advancing in battlefield, rescuing after earthquake or flood and so on. In such a case a temporary and quick self-organizing wireless network technology is required, named Ad Hoc network communication technologies.Ad Hoc network is a wireless, mobile, self-organizing network. It has no central control node, and the mobile nodes can be in communication with each other using multi-hop wireless links. These particularities in Ad Hoc networks bring challenges on network topology and network security. Cluster structure in Ad Hoc networks is an important topology in which the critical research is algorithm. With respect to security, node authentication technology, key management and the safety of route are research focus.By analyzing of Ad Hoc network routing and security, we could find that the clustering structure plays a very important role in the realization of network security in Ad Hoc networks. This thesis has research on several classical clustering algorithms and found that Adaptive on-demand weighted (AOW) clustering algorithm has higher practicality. However, AOW algorithm has some problems and the thesis present improvement on them. It has verified that the improved algorithm has better effect on performance and security model through experiments. The thesis proposes a secure routing model based on clustering structure, using Location-oriented. Network nodes use elliptic curve cryptography to distribute keys. With the advantages of clustering structure, Cluster heads assign cluster members distributed authentication to the new nodes, balancing the node energy. The establishment of Route and transmission of information are used symmetric key system and the public key system, routing information needs to be encrypted and signed, at the same time the location information makes the routing establishment have a directional. Cluster head node also provides the function of path test. The analysis found that the security of the routing model has a high security, and the feasible of model is proved by the experiment.
Keywords/Search Tags:Mobile Ad Hoc Network, clustering algorithm, Location-oriented, secure routing
PDF Full Text Request
Related items