Font Size: a A A

Study On Mobile Ad Hoc Network Route Security

Posted on:2015-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y N SongFull Text:PDF
GTID:2298330467977017Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The fast development of wireless communication leads the current information trend. MobileAd Hoc Network is a new wireless communication technology that needs no fixed infrastructure,and it can be established fast and temporarily. It is widely used in military, industry, commerce etc,it has broad applicable value and development potential. Mobile Ad Hoc Networks is continuouslystudied by internal and external, and route protocol is its key technology. However, owing to itscenter-less, self-organization, dynamic topology and limited resource, Mobile Ad Hoc Networksroute protocols suffer security threats easily, and this will hinder the development and application ofMobile Ad Hoc Networks seriously. The dissertation briefly focuses on studying and dissecting twokinds of route security threats: data packet abandon attack and flooding attack, presentscorresponding solutions.For the data packet abandon attack, the dissertation divides it into two situations: entirely andpartly data packet abandon attack. For the first case, we design a defense strategy based on timestatistics’ hand-up report and punishment. Hand-up report scheme can locate the malicious nodebetween two nodes. Punishment scheme can dismiss the malicious node from network thoroughly.For the second case, we design a defense strategy based on data packet statistics’ hand-up reportand punishment, adopting data packet statistics, hand-up report and periodically punishment schemeto defend partly data packet abandon attack. Simulation studies have shown that the above schemecan resist data packet abandon attack.For the flooding attack, the dissertation proposes an improved strategy.The dissertation alsodivides the attack into two situations: RREQ flooding and DATA flooding. For the first case, wedesign a defense strategy based on monitoring RREQ transmission frequency and number, judgingand isolating the malicious nodes by monitoring RREQ transmission frequency, arranging thepriority of dealing with RREQ by monitoring RREQ transmission number, promoting the fairnessof the Network and relieving the harm of RREQ flooding attack. For the second case, we design adefense strategy based on monitoring and feedback. The destination nodes monitor rubbish datapackets, and then feedback RERR to cut off the route link, then isolates malicious nodes to defendDATA flooding attack. Simulation studies have shown that the above scheme can better resistflooding attack.
Keywords/Search Tags:Ad Hoc Network, Route Security, Data Packet Abandon Attack, Flooding Attack
PDF Full Text Request
Related items