A Study of Securing Ad Hoc Network:Routing Static Information Protection

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 ===  Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are m...

Full description

Bibliographic Details
Main Authors: Jing-Hung Chen, 陳勁宏
Other Authors: Chi-Sung Laih
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/87874762820027111721
Description
Summary:碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 ===  Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are many problems in considering with security. As to wire network, the router and the terminals are separated. The route also has been protected securely. It can guarantee that the network route is correct. But in Ad Hoc network, nodes act two different roles meanwhile. It is a route and a terminal at the same time. Besides the research in communication security is important, correct route setup becomes a very important subject. We will do the research and simulation to different kinds of route attacks, and then we will design a secure routing protocol.  On the based of the characteristics of Ad Hoc network, we have researched into two secure parts, one is the integrality verification of the routing information, and another is the identity authentication of node. Routing information can be divided into two parts, one is the routing static information, and another is the routing dynamic information. Static part is what we want to protect; dynamic part, it will be discuss in J.M Hou’s thesis. We have quoted RFC-3561 AODV route protocol as the example. We proposed two comparatively safe and practical methods. One is ID-Based signature based on pairing, and another is the asymmetric ID-MAC. The latter method besides solves the problems of routing forging, modifying, and identity authentication. It also reduces the large amount operation of signature. Finally we use NS2 to simulation and discuss the whole efficiency.