Font Size: a A A

For The Wormhole Attack In Mobile Ad Hoc Network Security Routing And Simulation To Achieve

Posted on:2006-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:N LiuFull Text:PDF
GTID:2208360155465977Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with increasingly restriction of wire network applications and maturity of the wireless network technology, wireless network—especially MANET is widely applied to military affairs, emergency action, temporary office and meeting, mobile communication and sensor network etc. Once application of technology is possible, reliability and security of this technology become next goal. Focus of research in MANET is changing from route protocol to QoS and security. Researchers commit themselves to secure measures aiming at weakness of MANET. Thereinto, how to detect and prevent malicious attacks is important aspect on security of network. In this paper, wormhole attack—a kind of serious malicious attackes is analysed, a dectection protocol model that can effectively detect wormhole is brought forward.This paper briefly introduces the conceptions and corresponding contents, and then presents a protocol model of detecting wormhole attack and designs a simulation in OMNeT++ to certify the validity of the protocol. In Windows2000 system and simulation software—OMNeT++, simulation uses NED and Microsoft VC++6.0 as chiefly development kits. It builds up MANET topology model, wormhole model, AODV protocol model and wormhole detection protocol model, and simulates normal communication in MANET, communication under wormhole attack and detection protocol. Aiming at results of simulation, effects on detection protocol that are brought by all kinds of factors of MANET are analysed.It is an important and difficult point in the project that wormhole detection protocol model is designed. Because of hide of wormhole attackers, wormhole attack is difficultly detected. Wormhole attackers communicate with each other by top-quality and wide channel to break normal communication of network and to intercept useful informations. The key of detecting wormhole attack is locating wormhole node. The main methods include detecting time and distance of abnormal communication between nodes. On the realization of techonology aspect, it needs that all kinds of arithmetcs and protocols try themselves best to reduce complexity to drop consumption of bandwidth and CPU and memory of equipment. This detection protocol uses location information of node to calculate distance between two nodes to judge the rationality of position of node, and then detects the wormhole nodes. This method has lower complexity. On economy aspect, the cost of using temporal detection is higher because precision instruments that can supply strict clocksynchronization are expensive such as Rb.and Cs. clock, hydrogen maser clock. So this detection protocol uses loose clock synchronization and locates wormhole attack with position informations, which is economic. The definition of protocol model includes initialization, communication and detection processes. Detection process gains positions and list of neighbour nodes by location node. All nodes calculate distance with position information to detect abnormal communication, and then locate the wormhole node and discard the wormhole node from MANET.After detection protocol model is built up, how to prove its validity? Simulation experiment is a good method. Simulation experiment in OMENeT++ is another difficult point in the project. Topology model of MANET can dynamicly confirm scale of MANET. AODV protocol model is built up to complete communication of MANET. According to theory of wormhole, wormhole model is designed by that effect on AODV protol is observed. At last, detecting process is simulated in terms of wormhole detection protocol model. It certifies the protocol can availably reduce wormhole's effects on AODV.Brief and efficient wormhole locating arithmatic is the kernel of the wormhole detection protocol model, which is an effective way to prevent the wormhole attack in MANET. Visual simulating process clearly presents the results of simulation, which powerfully certifies the efficiency of this wormhole detection protocol.
Keywords/Search Tags:Mobile Ad hoc, Wormhole attack, Location node, OMNeT++, Ad hoc on-demand distance vector
PDF Full Text Request
Related items