A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 ===   Because the vantage of conveniences and costs, there are more and more people involved in the area of research in Ad Hoc networks. However, because the efficiency was concerned first at the initial time of the protocol design, leads to the lack of security i...

Full description

Bibliographic Details
Main Authors: Jr-Ming Hou, 侯智明
Other Authors: Chi-Sung Laih
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/02199724345510228535
id ndltd-TW-093NCKU5652007
record_format oai_dc
spelling ndltd-TW-093NCKU56520072017-07-30T04:40:30Z http://ndltd.ncl.edu.tw/handle/02199724345510228535 A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection 安全隨意網路之研究:動態路由訊息之防護 Jr-Ming Hou 侯智明 碩士 國立成功大學 電腦與通信工程研究所 93   Because the vantage of conveniences and costs, there are more and more people involved in the area of research in Ad Hoc networks. However, because the efficiency was concerned first at the initial time of the protocol design, leads to the lack of security inborn. Although there are many security schemes can be applied to those protocols, the security is still not enough.   The node in Ad Hoc networks plays both the role of routers and terminals. This leads to the difference of the secure design between Ad Hoc networks and wired networks. Moreover, the routing path in Ad Hoc networks is dynamic; it is not fixed as in wired networks. Therefore, some secure mechanisms used in wired networks can not simply be applied to the protocols in Ad Hoc networks.   After analyzing various types of attack against Ad Hoc networks, we will propose a secure scheme for the famous routing protocol, AODV. Fist, we divide routing information (the content of routing packets) into two parts. They are static and dynamic fields. For the static part, the messages transmitted between two end nodes are fixed, so it is suitable to use the digital signature to protect this part. Furthermore, because of the problem for the public key distribution, we use the ID-based digital signature with our method to achieve the security. For the dynamic part, the messages transmitted between two end nodes are mutable, so it is not suitable to use the above method to protect this part. We use the one-way function with the property of homomorphism through our method to guarantee the security. Furthermore, we use NS2 (Network Simulator) to simulate our scheme and discuss how well the efficiency is from the simulation results. Finally, we try to achieve the simple implementation to ensure the feasibility. Chi-Sung Laih 賴溪松 2005 學位論文 ; thesis 75 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 ===   Because the vantage of conveniences and costs, there are more and more people involved in the area of research in Ad Hoc networks. However, because the efficiency was concerned first at the initial time of the protocol design, leads to the lack of security inborn. Although there are many security schemes can be applied to those protocols, the security is still not enough.   The node in Ad Hoc networks plays both the role of routers and terminals. This leads to the difference of the secure design between Ad Hoc networks and wired networks. Moreover, the routing path in Ad Hoc networks is dynamic; it is not fixed as in wired networks. Therefore, some secure mechanisms used in wired networks can not simply be applied to the protocols in Ad Hoc networks.   After analyzing various types of attack against Ad Hoc networks, we will propose a secure scheme for the famous routing protocol, AODV. Fist, we divide routing information (the content of routing packets) into two parts. They are static and dynamic fields. For the static part, the messages transmitted between two end nodes are fixed, so it is suitable to use the digital signature to protect this part. Furthermore, because of the problem for the public key distribution, we use the ID-based digital signature with our method to achieve the security. For the dynamic part, the messages transmitted between two end nodes are mutable, so it is not suitable to use the above method to protect this part. We use the one-way function with the property of homomorphism through our method to guarantee the security. Furthermore, we use NS2 (Network Simulator) to simulate our scheme and discuss how well the efficiency is from the simulation results. Finally, we try to achieve the simple implementation to ensure the feasibility.
author2 Chi-Sung Laih
author_facet Chi-Sung Laih
Jr-Ming Hou
侯智明
author Jr-Ming Hou
侯智明
spellingShingle Jr-Ming Hou
侯智明
A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
author_sort Jr-Ming Hou
title A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
title_short A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
title_full A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
title_fullStr A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
title_full_unstemmed A Study of Securing Ad Hoc Network: Dynamic Routing Information Protection
title_sort study of securing ad hoc network: dynamic routing information protection
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/02199724345510228535
work_keys_str_mv AT jrminghou astudyofsecuringadhocnetworkdynamicroutinginformationprotection
AT hóuzhìmíng astudyofsecuringadhocnetworkdynamicroutinginformationprotection
AT jrminghou ānquánsuíyìwǎnglùzhīyánjiūdòngtàilùyóuxùnxīzhīfánghù
AT hóuzhìmíng ānquánsuíyìwǎnglùzhīyánjiūdòngtàilùyóuxùnxīzhīfánghù
AT jrminghou studyofsecuringadhocnetworkdynamicroutinginformationprotection
AT hóuzhìmíng studyofsecuringadhocnetworkdynamicroutinginformationprotection
_version_ 1718507866054197248