Font Size: a A A

Research On The Secure Routing Protocol Based On AODV In Ad Hoc Network

Posted on:2019-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:L Y SunFull Text:PDF
GTID:2438330566490172Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The Mobile Ad Hoc Network(MANET)is an emerging wireless network,it is composed of a set of freely moving nodes with wireless transceivers.The network does not rely on the fixed infrastructure and it can be quickly deployed.It is widely used in military communications,civil communications and emergency rescue.Because the Ad Hoc network has not the fixed infrastructure like the traditional network,the network is more vulnerable to attacks,and the routing protocol is the target of many attacks.Therefore,it is very important to design a routing protocol that not only meets the Ad Hoc group flexibility,but also makes the network performance index not be reduced after the improvement process.This paper analyzes the AODV routing protocol in Ad Hoc networks and the black hole attacks against this protocol.It improves the AODV routing protocol on the basis of ensuring network security.Firstly,it introduces the network structure and characteristics of Ad Hoc network as well as security mechanisms and security policies.And it introduces a several routing protocols of the network.Secondly,it analyzes the AODV routing protocol in Ad Hoc networks.Then it proposes an algorithm that based on the detection of intermediate nodes.In the route seeking process of the AODV routing protocol,when the source node receives the RREP sent by the intermediate node,it verifies the node to ensure the reliability of the route passing through the node.If it is reliable,the data is transmitted through this route,otherwise,the route finding mechanism is reinitiated.Thirdly,it proposes an algorithm that based on the credit mechanism.Based on the detection of intermediate nodes,the link of determining the credit value of nodes is added.The source node decides whether to give up the node directly,trust the node,or perform further verification based on the credit value of the received intermediate node.If it needs further verification,it adopts an intermediate node-based method for verification.Finally,the AODV routing protocol which before and after the improvement in the virtual network environment is simulated.Then It analyzes the experimental results,and evaluates the improved AODV routing protocol.
Keywords/Search Tags:Ad Hoc network, network security, AODV, black hole attack
PDF Full Text Request
Related items