Font Size: a A A

Design And Simulation Implementation Of Security And Energy Conservation Routing Algorithm Based On Trust Recommendation In Ad Hoc Networks

Posted on:2017-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:A B BenFull Text:PDF
GTID:2428330572964662Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As nodes in Ad Hoc network are equal,and can act as both routers and hosts,they will automatically establish an independent network quickly.It has a broad application future in the field of civil and military communications.However,energy of nodes is limited because of limited battery power,with the promotion of the performance and the perfection of functions,there will be more and more consumption and requirement of energy.Energy becomes one of the important factors which limits the widely using of Ad Hoc network.At the same time,because of the wireless chanel and the mobility of nodes in Ad Hoc network,the topology changes dynamically,which makes nodes more vulnerable,security is more complex than traditional wired network.Therefore,this research which focuses on secure and energy conservation routing algorithm is of great significance and application value.In view of the incomprehensive factors of the existing trust evaluation mechanism,and not considering the nodes capacity and other issues,the thesis proposed a new trust evaluation mechanism,which collects and quantizes the historical property,node recommendation property to get the overall trust of the node.Based on the new trust evaluation mechanism,this thesis proposed an Ad hoc network secure and energy conservation routing algorithm called TREC-AODV.The algorithm is not only able to monitor the behaviors of nodes in the network,to quickly obtain changed trust value of node,but also is ready to access the state of each node to assist the node to make routing decision,which will ensure the next hop node is trusted and capable in the process of packet forwarding.At the same time,the algorithm is designed to prevent and deal with the malicious attacks to enhance the security of the protocol.Moreover,in view of the mobility and energy consumption of nodes,this thesis adopted a strategy of energy conservation,to move out of transmission range of nodes with the method of adjusting the transmission radius dynamically,the purpose is to reduce energy consumption without increasing the complexity of algorithm.In order to verify the validity of the algorithm,this research uses NS2 to simulate TREC-AODV in Ad Hoc networks with and without malicious nodes.The simulation results show that,in the scenario with malicious nodes,TREC-AODV protocol achieved an outstanding performance of the network robustness compared with the MT-AODV and AODV.It has lower average energy consumptions,route overhead and end to end delay,and they can be reduced by 16%,8%and 9%respectively,the malicious nodes isolated rate can be up to 82%in average.TREC-AODV is more secure and it can perform well under normal network environment.
Keywords/Search Tags:Ad Hoc networks, Network security, Trust recommendation mechanism, Energy conservation, Routing algorithm
PDF Full Text Request
Related items