Font Size: a A A

Research On Secure Routing Protocol Based On Mobile Ad Hoc Networks

Posted on:2012-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z L LuoFull Text:PDF
GTID:2218330338971973Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
There is no fixed network infrastructure in the Mobile Ad hoc Networks, since its network topology frequently changes and wireless channels are completely open. These characteristics cause the security of routing protocols much more complex than that of traditional networks. As a result, some of the existing wired network security solutions can not be applied directly to the Mobile Ad hoc Networks.In MANET routing protocols, most of the unicast routing protocols focus on efficiency and function, almost none of which is the security concerned. Whereas the multicast has a unique advantage for the burden considerations of bandwidth and CPU. It doesn't need to broadcast on the basis of unicast routing protocols. The multicast becomes the best choice when more than one receiver receive the messeages from the sender. Multicast routing can improve network resource utilization, reduce communication cost, but its secure problem is particularly prominent.Designing security-effective routing protocols has become a recent research focus in MANET. Some security mechanisms have been proposed for the unicast protocols. Although multicast communication is very important, the researches on secure multicast communication are less let alone on the secure multicast routing protocols. Relevent reasearches have been slowly improved and there has been no IETF standard of security routing protocol let alone the security routing protocol on the basis of the original AODV routing algorithm.To solve the above problems, secure unicast routing scheme ISAODV and secure multicast routing scheme ISMAODV based on the design of ID-based cryptography are proposed on the basis of the original AODV and MAODV routing algorithm In the improved protocols, we use the ID-based cryptography to enhance security. The advantages of ID-based cryptography are that it simplifies the highest burden of key management process of the traditional certificate-based public key system. There are some advantages and natual intergration point when using this kind of password system in resource-limited wireless Ad hoc networks.We provide comparisons between AODV, MAODV and ISAODV, ISMAODV in our simulation. The simulation results show that the ID-based cryptology can simplify the miscellaneous and trivial administration process of the secret key on certificate-based password system. The new improved protocols which use the ID-based cryptography can basically meet the network security and resource utilization requirements. The greater advantage of the protocols is saving overhead of the system.
Keywords/Search Tags:Mobile Ad hoc network, Security routing protocol, AODV routing protocol, MAODV routing protocol, Identity-based cryptosystem
PDF Full Text Request
Related items