Font Size: a A A

Research On Secure Routing Mechanism For Selfish Attack In Mobile Ad Hoc Networks

Posted on:2014-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:D C LiuFull Text:PDF
GTID:2348330482956043Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As a kind of centreless, self-organized networks, Ad Hoc networks is widely used since they don't need the support of basic establishment in information networks, and they are suitable for battlefield, disaster, temporary session and so on. Because of wireless communication, distributed control, etc, there are many security risks in Ad Hoc networks. With the expansion of the network size, hierarchical structure is commonly used to increase network's scalability, and the security of the Hierarchical Ad Hoc networks becomes a hotspot.A dynamic reputation evaluation model is proposed to meet the characteristic and security requirement in hierarchical Ad Hoc networks. This model consists of reputation calculating, reputation management and reoutation updating. In reputation calculating, considering different roles of cluster head, gateway and cluster member in hierarchical Ad Hoc networks, different calculating methods are taken respectively, the reputation evaluation is more accurate and reasonable through the nodes'cooperation in node behaviour and routing; In reputation management, the reputation evaluation is managed by cluster head to solve the slow convergence issue in the calculation caused by complex computations, which is suitable to the need of network extension. Then, based on the social characteristic of node, a social characteristic evaluation model is proposed. This model uses vector to represent the relationship between two nodes. At the last, the two models above are considered together to give a synthesized evaluation of node.Using of simulation software NS-2, dynamic reputation evaluation model based on node roles is tested. The results show that, the model can more timely and accurately reflect the security status of nodes, and routes are choosed and adjusted based on the security status, which protect the routing's relative safety and reliability, and improve the network performance. Therefore, the proposed scheme is suitable to the security requirement of hierarchical Ad Hoc networks.
Keywords/Search Tags:Hierarchical Ad Hoc networks, Reputation evaluation, Node roles, Correlation
PDF Full Text Request
Related items