Font Size: a A A

Research On Routing Secure Protocols In Ad Hoc Networks

Posted on:2009-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:J C SongFull Text:PDF
GTID:2178360245482182Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc networks is a special wireless networks, Comparing with regular mobile network and fixed network, Ad Hoc networks are non-center, self-organize, multi-hop and dynamic topology. and it can construct any network topology. Ad Hoc networks can work solely, and it also connects internet or cellular networks. These characteristic makes many differences in architecture, network organization and protocol designing. Ad Hoc networks are easy to be suffer form various attacks. Routing secure especially Routing algorithm has become one of the focus in ad hoc.Aiming the secure requirement and practical base, this dissertation researches the related theory and pivotal technology. The main tasks include several aspects:(1) Improving SORI(The secure and objective reputation-based incentive scheme for ad-hoc networks). SORI has some shortcomings. For example, SORI are easy misled by malicious nodes by spreading false reputation, In this paper, we introduced a fair and secure reputation Based on SORI for ad hoc networks. The experimental results suggest that the proposed scheme can punish malicious nodes spreading false reputation and identify selfish and malicious nodes successfully.(2) Trusted Routing Protocol (TRP) is a trust model based routing protocol for secure MANETs, which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol trust among nodes is represented by opinion, . The opinions are dynamic and updated frequently as the protocol specification. A trust recommendation mechanism is also designed to exchange trust information among nodes, maintain the whole system at a certain security level and greatly reduces the computation(3)A novel and simple end-to-end QoS(Quality-of-Service) routing mechanism in a physically hierarchical environment is presented. By defining a special role called Leader, The proposed algorithm operates by Leader using Hyper-channel to communicate. Network simulator (ns-2) has shown that the end-to-end algorithm outperforms AODV protocol on all the performance metrics: stabilization of communication, data packet delivery ratio and packet delivery between heterogeneity node.
Keywords/Search Tags:Ad-hoc Networks, Secure routing, Reputation evaluation, QoS routing
PDF Full Text Request
Related items