A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 === Because the vantage of conveniences and costs, there are more and more people involved in the area of research in Ad Hoc networks. However, because the efficiency was concerned first at the initial time of the protocol design, leads to the lack of security i...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/02199724345510228535 |
id |
ndltd-TW-093NCKU5652007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NCKU56520072017-07-30T04:40:30Z http://ndltd.ncl.edu.tw/handle/02199724345510228535 A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection 安全隨意網路之研究:動態路由訊息之防護 Jr-Ming Hou 侯智明 碩士 國立成功大學 電腦與通信工程研究所 93 Because the vantage of conveniences and costs, there are more and more people involved in the area of research in Ad Hoc networks. However, because the efficiency was concerned first at the initial time of the protocol design, leads to the lack of security inborn. Although there are many security schemes can be applied to those protocols, the security is still not enough. The node in Ad Hoc networks plays both the role of routers and terminals. This leads to the difference of the secure design between Ad Hoc networks and wired networks. Moreover, the routing path in Ad Hoc networks is dynamic; it is not fixed as in wired networks. Therefore, some secure mechanisms used in wired networks can not simply be applied to the protocols in Ad Hoc networks. After analyzing various types of attack against Ad Hoc networks, we will propose a secure scheme for the famous routing protocol, AODV. Fist, we divide routing information (the content of routing packets) into two parts. They are static and dynamic fields. For the static part, the messages transmitted between two end nodes are fixed, so it is suitable to use the digital signature to protect this part. Furthermore, because of the problem for the public key distribution, we use the ID-based digital signature with our method to achieve the security. For the dynamic part, the messages transmitted between two end nodes are mutable, so it is not suitable to use the above method to protect this part. We use the one-way function with the property of homomorphism through our method to guarantee the security. Furthermore, we use NS2 (Network Simulator) to simulate our scheme and discuss how well the efficiency is from the simulation results. Finally, we try to achieve the simple implementation to ensure the feasibility. Chi-Sung Laih 賴溪松 2005 學位論文 ; thesis 75 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 === Because the vantage of conveniences and costs, there are more and more people involved in the area of research in Ad Hoc networks. However, because the efficiency was concerned first at the initial time of the protocol design, leads to the lack of security inborn. Although there are many security schemes can be applied to those protocols, the security is still not enough.
The node in Ad Hoc networks plays both the role of routers and terminals. This leads to the difference of the secure design between Ad Hoc networks and wired networks. Moreover, the routing path in Ad Hoc networks is dynamic; it is not fixed as in wired networks. Therefore, some secure mechanisms used in wired networks can not simply be applied to the protocols in Ad Hoc networks.
After analyzing various types of attack against Ad Hoc networks, we will propose a secure scheme for the famous routing protocol, AODV. Fist, we divide routing information (the content of routing packets) into two parts. They are static and dynamic fields. For the static part, the messages transmitted between two end nodes are fixed, so it is suitable to use the digital signature to protect this part. Furthermore, because of the problem for the public key distribution, we use the ID-based digital signature with our method to achieve the security. For the dynamic part, the messages transmitted between two end nodes are mutable, so it is not suitable to use the above method to protect this part. We use the one-way function with the property of homomorphism through our method to guarantee the security. Furthermore, we use NS2 (Network Simulator) to simulate our scheme and discuss how well the efficiency is from the simulation results. Finally, we try to achieve the simple implementation to ensure the feasibility.
|
author2 |
Chi-Sung Laih |
author_facet |
Chi-Sung Laih Jr-Ming Hou 侯智明 |
author |
Jr-Ming Hou 侯智明 |
spellingShingle |
Jr-Ming Hou 侯智明 A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection |
author_sort |
Jr-Ming Hou |
title |
A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection |
title_short |
A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection |
title_full |
A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection |
title_fullStr |
A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection |
title_full_unstemmed |
A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection |
title_sort |
study of securing ad hoc network: dynamic routing information protection |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/02199724345510228535 |
work_keys_str_mv |
AT jrminghou astudyofsecuringadhocnetworkdynamicroutinginformationprotection AT hóuzhìmíng astudyofsecuringadhocnetworkdynamicroutinginformationprotection AT jrminghou ānquánsuíyìwǎnglùzhīyánjiūdòngtàilùyóuxùnxīzhīfánghù AT hóuzhìmíng ānquánsuíyìwǎnglùzhīyánjiūdòngtàilùyóuxùnxīzhīfánghù AT jrminghou studyofsecuringadhocnetworkdynamicroutinginformationprotection AT hóuzhìmíng studyofsecuringadhocnetworkdynamicroutinginformationprotection |
_version_ |
1718507866054197248 |