Font Size: a A A

A Study Of Critical Nodes Detection And Anonymous Protection In Ad Hoc Network

Posted on:2016-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:H LiFull Text:PDF
GTID:2308330464970312Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Ad hoc network is widely used in military and civilian, which is based on these features like without relying ground infrastructures and fast networking technology, so the network also faces huge challenge of security issues.The research of security issues in Ad hoc network has been divided into many directions, and the matured researches are topology control, communication link encryption, routing protocols and authentication protocols. For the critical nodes, researchers mainly study its effect in Ad hoc network, and it is one of hot researches at present. This paper mainly does some research for critical nodes in Ad hoc network, and does a further research and analysis in the critical node detection algorithms and anonymous protection method, finally, we proposed a new critical nodes detection algorithm, and realized anonymous protection for critical nodes.This paper proposed a new detection algorithm for critical nodes, its main features:(1) the paper uses a trust model to calculate nodes trust degree;(2) using clustering to divide network through the research for topo logy control and clustering algorithms;(3) the paper takes nodes trust degree and residual energy to calculate cluster head nodes after network clustering, and then choose critical nodes using cluster head selection mechanism. The two characteristics: high trust degree and sufficient remaining energy are possessed by critical nodes, which also can forward large packets. The simulation result shows that these critical nodes are high trusted, and also they can prolong the network lifetime, actually they are very important in the network.The nodes anonymity can protect its security of identity information, location information and routing information. This paper chooses an anonymous routing protocol to protect critical nodes. Based on the analysis of Anonymous On Demand Routing, this paper improves this protocol:(1) selecting critical nodes to establish routing links, so that can ensure link nodes energy;(2) protecting nodes real identity from pseudonym mechanism and updating timely;(3) the process of forwarding data uses the shared session key established in adjacent nodes, and do not need establish key when forwarding data every time. The improved anonymous routing protocol in thispaper can ensure critical nodes anonymity, and expends lesser protocol overhead. The simulation result shows that the improved anonymous protocol can protect critical nodes effectively, and it is also low energy consumption and high security.
Keywords/Search Tags:Ad hoc network, Critical Nodes, Trust Degree, Clustering Technology, Anonymous Protection
PDF Full Text Request
Related items