Font Size: a A A

Research On Trust-based Secure Routing Protocol In Ad Hoc Networks

Posted on:2014-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:X Z HuoFull Text:PDF
GTID:2268330392473724Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Ad hoc network is a special kind of wireless mobile communication network,where nodes are equal, therefore, these is no need to set the central control node.Also, since nodes can act as both routers and hosts, they will automatically establishan independent network quickly. It has a broad application future in the field of civiland military communications. However, due to the use of radio channel, the limitedpower and distributed control technology, nodes in the network will suffer moreattacks, and more complex security problems arise. Therefore, this research whichfocuses on secure routing issues is of great significance and application value.The current studies for secure routing are based on key mechanism and trustmechanism. Since trust mechanism only requires little computation and has lowdemand for nodes, and is easy to expand, so it is widely used. However, the trustfactors which impact trust mechanism are not comprehensive, and most importantly,trust evaluation did not take into account the ability of the node itself, which finallyled to the routing process select a trusted node, while the node can t complete thedata forwarding. Due to this situation, the paper proposed a new trust evaluationmechanism, which collects and quantizes the historical property, noderecommendation property and node current attributes to get the overall trust of thenode. This trust mechanism not only takes into account all aspects of the trustproperty, but also evaluates the ability of node. When the node s capacity isinsufficient, the overall trust will be affected. Thus, it will avoid the node to beselected, also, this will avoid the node with high trust value to be selected passively.Based on the new trust evaluation mechanism, this paper proposes an Ad hocnetwork secure routing protocol called TBSRP (Trust Based Secure RoutingProtocol). The protocol is not only able to monitor the behaviors of nodes in thenetwork, to quickly obtain changed trust value of node, but also is ready to accessthe state of each node to assist the node to make routing decision, which will ensurethe next hop node is trusted and capable in the process of packet forwarding. At thesame time, the protocol is designed to prevent and deal with the malicious attacks toenhance the security of the protocol. This research uses NS2to simulate TBSRP in network with and withoutmalicious nodes. Experiments show that, in the two scenarios, TBSRP protocol canmaintain a high packet delivery rate, and it is effective to resist the black holeattacks, serial attacks and DoS attacks, at the same time, it will avoid nodes selfishbehaviors. Therefore, this protocol not only reduces routing overhead, but alsosolves the problem of secure routing in Ad hoc networks.
Keywords/Search Tags:Ad hoc networks, Network security, Routing, Secure routing, Trustevaluation
PDF Full Text Request
Related items