Font Size: a A A

The Research Of Mobile Ad Hoc Network Intrusion Detection Technology

Posted on:2011-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:C X GaoFull Text:PDF
GTID:2198330332973981Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc network is a kind of multi-hop, supporting mobility, having no infrastructure, dynamic topology wireless self-organized network. As a result of a fast and flexible network, simple configuration, strong survivability of overall system and low cost structure, it is used more and more widely in the military, commercial and civil areas. But precisely because of the characteristics of the Ad Hoc network, it is more vulnerable and the construction of the network security system is also more complex. Therefore Ad Hoc network security is one of the current research focus.First of all, this paper introduces the Ad Hoc Network, intrusion detection technology and the knowledge of clustering algorithms, and proposes CDIDS (Cluster-based Distributed Intrusion Detection System) through study of the Ad Hoc network intrusion detection model. Then, for CDIDS the clustering algorithm based on the cluster head credibility,the cluster structure stability and load balancing is proposed.Based on the detailed study of existing clustering algorithms,the original algorithm is optimized.This paper discusses about the defects of the current node credibility rating, improves the calculation of the credibility rating and proposes a more comprehensive and accurate calculation.Finally, this paper verifies the effectiveness of the optimization algorithm respectively through theoretical analysis and NS2 simulation test.The main characteristics and innovations of:(1) For the CDIDS model of this article, based on the study of existing WCA and AOW, this article proposes a new MAOW clustering algorithm of cluster head reliability, cluster structure stability and load balancing in MANET.(2) For the defects of the current calculation of the credibility rating, the calculation of the credibility rating is improved in this article.
Keywords/Search Tags:MANET, Intrusion Detection, Clustering, Credibility, NS2
PDF Full Text Request
Related items