Loading...
- Type of Document: M.Sc. Thesis
- Language: English
- Document No: 47423 (52)
- University: Sharif University of Technology, International Campus, Kish Island
- Department: Science and Engineering
- Advisor(s): Izadi, Mohammad
- Abstract:
- Nowadays, use of wireless networks and devices is inevitable due to their beneficial features, such as ease of use, portability, rapid and comfortable access to information. On the other hand, the security for wireless networks is a challenging matter by overwhelming increase over the number of mobile hardware and devices. Mobile Ad-hoc network (MANET) is a class of wireless networks, which forms dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. This kind of network in comparison to other types of networks, is prone to various security threats or attacks due to its unique characteristics (dynamic topology, open medium, lack of central monitoring, etc.). Moreover, it is possible that each mobile node acts as a host or router. Essentially, any node may compromise the routing protocol functionality by disrupting the route discovery process. Therefore, routing security is known as a vital scope in MANET. One of the on-demand reactive routing protocols, which is the most well-known in MANET, is Ad-hoc On-demand Distance Vector (AODV) protocol that initially was introduced without considering security protection. This protocol is vulnerable to security threats and attacks; and though significant attempts have been made about its security, there are still critical challenges to overcome. Succeeding that, in the present study, after reviewing secured protocols of some previous researches, an improved protocol is presented to enhance the security of AODV routing protocol against black hole and gray-hole attacks in particular. For this purpose, we used a different level of trust for MANET nodes and imposed the limitations based on the nodes’ trust level, in order to detect the compromised nodes and malicious behaviors inside MANET; which leads to the low delay and high packet delivery ratio against the mentioned particular attacks in the network. Subsequently, we discussed the achievements of the proposed protocol in comparison to some other secured protocols that presented previously. Finally, we simulated proposed protocol with NS-2 simulator as a means to validate it and evaluate its results. In fact, the results, demonstrate the efficiency of the presented protocol and its resistance to the attacks in comparison to AODV routing protocol
- Keywords:
- AODV Protocol ; Mobile Ad Hoc Network ; Black-hole Attack ; Gray-hole Attack ; Trust-based Technique ; Secure Routing
-
محتواي کتاب
- view
- Chapter 1
- Introduction
- 1.1 Introduction
- 1.2 Aims and Objectives
- 1.3 Thesis Outline
- Chapter 2
- Basic Concepts
- 2.1 Why Wireless Network?
- 2.2 IEEE 802.11 Standards
- 2.3 Wireless Network Classification
- 2.4 Overview of Mobile Ad-hoc Network
- 2.5 Routing Attacks and Threats in MANET
- 2.5.1 Passive and Active Attacks
- 2.5.2 External and Internal Attacks
- 2.5.3 Some Attacks against MANET
- 2.5.3.1 Wormhole Attack
- 2.5.3.2 Black Hole Attack
- 2.5.3.3 Flooding Attack
- 2.5.3.4 Gray Hole Attack
- 2.5.3.5 Modification Attack
- 2.5.3.6 Selfishness Attack
- 2.5.3.7 Denial of Service (DoS) attack
- 2.5.4 MANET Weaknesses
- 2.6 Attributes of Security
- 2.7 MANETs Routing Protocols
- 2.8 Summery
- Chapter 3
- AODV Routing Protocol
- 3.1 Overview of Ad-hoc On-demand Distance Vector (AODV) protocol
- 3.2 Control message formats and their operations
- 3.2.1 Route Request Message
- 3.2.2 Route Reply Message
- 3.2.3 Route Error Message
- 3.2.4 Route Reply Acknowledgment Message
- 3.2.5 Hello Message
- 3.3 Some Parameters and Technique in AODV
- 3.3.1 Ring Search Technique
- 3.4 AODV Mechanism
- 3.4.1 Route Discovery
- 3.4.1.1 Gratuitous Route Reply
- 3.4.2 Route Maintenance
- 3.4.1 Route Discovery
- 3.5 AODV in Contrast of Black Hole and Gray Hole Attacks
- 3.6 Summery
- Chapter 4
- Related Work
- 4.1 Introduction
- 4.2 Secured Protocols Based on Cryptographic Technique
- 4.3 Secured Protocols Based on Trust Technique
- 4.4 Other Secured Protocols
- 4.5 Summary
- Chapter 5
- Proposed Protocol
- 5.1 Introduction
- 5.2 Trust-Based Technique in AODV Routing Protocol
- 5.3 Implementation
- 5.4 Simulation
- 5.4.1 Performance Metrics
- 5.4.2 Simulation Setup
- 5.4.3 Simulation Results
- 5.4.3.1 Throughput
- 5.4.3.2 Protocol Overhead
- 5.4.3.3 Packet Delivery Ratio
- 5.4.3.4 Average End to End Delay
- 5.5 Protocol Achievements
- 5.6 Summary
- Chapter 6
- 6.1 Conclusion
- 6.2 Future Work
- References
- Appendix A
