Font Size: a A A

Research On Ntvr Based Malicious Nodes Detection In Manet

Posted on:2014-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:H G HeFull Text:PDF
GTID:2248330398972137Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In recent years, due to the rapid expansion of communications equipment and the mobile communications, researchers have paid a lot of attention to mobile ad-hoc networks (MANET). A MANET is a self-organizing system which is composed of a large number of mobile nodes connected by wireless. Each node in the MANET is not only a terminal system, but also a route for forwarding packets. The nodes are free to move about and self-organization into a network. A MANET has several significant features, such as dynamic topology, bandwidth restrictions, variable performance link, limited energy, etc. Due to these features, a MANET is vulnerable to a variety of attacks from a compromised node. The malicious node which has unsafe wireless connection can easily lead to network jamming, and will cause the equipment paralysis.Due to the limited, computing power and battery capacity, the node must trade-off between security and resource consumption of the device. In this paper, the concept of trust is introduced to MANET. With the help of the monitoring system for MANET, the MANET trust model is proposed. The model is capable isolating the malicious node. By the research of the various attacks to the MANET, the behavior of malicious nodes in security issues is summarized, and the malicious behavior is classified. Moreover, the security defense and detection strategies aim at specific attacks are analyzed. Alarm technology on MANET node is researched. On the business perspective, the key performance indicators that affect network communication are analyzed. The structure of the alarm system is introduced. The system collects information by using the probe without additional equipment. The MANET node key performance indicators are calculated by health model. Applying the concept of node trust value rank, the nodes select the path of trust and high priority. The activity of malicious nodes is reduced in this way. Finally, the malicious node can be excluded from the MANET. In particular, the influence of the time for node trust is considered. With the passage of time, the normal node and the malicious node which have no interaction with other node tend to be neutral.
Keywords/Search Tags:MANET, malicious nodes, security, alarm systems, node trust value rank, node detection
PDF Full Text Request
Related items