A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks

碩士 === 國立清華大學 === 資訊系統與應用研究所 === 95 === Wireless network technology is demanding and continually growing. Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. Their dynamic and flexibility allow the networks to be easily set up without the requirement of a pred...

Full description

Bibliographic Details
Main Authors: Ci-Lun Chen, 陳啟倫
Other Authors: Hung-Min Sun
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/39162317762339507127
id ndltd-TW-095NTHU5394030
record_format oai_dc
spelling ndltd-TW-095NTHU53940302015-10-13T16:51:15Z http://ndltd.ncl.edu.tw/handle/39162317762339507127 A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks 行動隨意網路下抵擋路由攻擊之防禦機制 Ci-Lun Chen 陳啟倫 碩士 國立清華大學 資訊系統與應用研究所 95 Wireless network technology is demanding and continually growing. Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. Their dynamic and flexibility allow the networks to be easily set up without the requirement of a predetermined infrastructure. However, unconstrained dynamic nature of the topology of mobile ad hoc networks makes them vulnerable to various types of attacks including routing attacks. Black hole attacks belong to one such type of attacks which disrupt the routing functions in MANETs. Rushing attacks also enable the attackers with limited resources and no cryptographic material to destroy the operation in MANETs. Wormhole attacks which are more sophisticated attacks still can easily crumble the connection in MANETs. The packet-dropping problem usually accompanies these routing attacks. The attackers claim that they have routes to forward data packets. However, when the data packets are routed through them, they drop these data packets that are supposed to be forwarded. These attacks greatly reduce the performance of the networks. Moreover, they are able to partition the network and degrade the connectivity of the network. So, we propose a robust scheme to defense these routing attacks in MANETs and improve the performance of the networks. In our scheme, we design a strong detection system to effectively detect malicious nodes in the networks. It can work properly even if multiple malicious nodes are collusive and try to circumvent the detection. For effectively utilization of the observation in the networks, we design a secure and cooperative reputation system. The proposed reputation system can prevent false accusation created by malicious nodes. Finally, we propose two mechanisms to defense various types of routing attacks. Our experiments show that the proposed mechanisms can successfully improve the throughput of the network. Hung-Min Sun 孫宏民 2007 學位論文 ; thesis 75 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立清華大學 === 資訊系統與應用研究所 === 95 === Wireless network technology is demanding and continually growing. Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. Their dynamic and flexibility allow the networks to be easily set up without the requirement of a predetermined infrastructure. However, unconstrained dynamic nature of the topology of mobile ad hoc networks makes them vulnerable to various types of attacks including routing attacks. Black hole attacks belong to one such type of attacks which disrupt the routing functions in MANETs. Rushing attacks also enable the attackers with limited resources and no cryptographic material to destroy the operation in MANETs. Wormhole attacks which are more sophisticated attacks still can easily crumble the connection in MANETs. The packet-dropping problem usually accompanies these routing attacks. The attackers claim that they have routes to forward data packets. However, when the data packets are routed through them, they drop these data packets that are supposed to be forwarded. These attacks greatly reduce the performance of the networks. Moreover, they are able to partition the network and degrade the connectivity of the network. So, we propose a robust scheme to defense these routing attacks in MANETs and improve the performance of the networks. In our scheme, we design a strong detection system to effectively detect malicious nodes in the networks. It can work properly even if multiple malicious nodes are collusive and try to circumvent the detection. For effectively utilization of the observation in the networks, we design a secure and cooperative reputation system. The proposed reputation system can prevent false accusation created by malicious nodes. Finally, we propose two mechanisms to defense various types of routing attacks. Our experiments show that the proposed mechanisms can successfully improve the throughput of the network.
author2 Hung-Min Sun
author_facet Hung-Min Sun
Ci-Lun Chen
陳啟倫
author Ci-Lun Chen
陳啟倫
spellingShingle Ci-Lun Chen
陳啟倫
A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
author_sort Ci-Lun Chen
title A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
title_short A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
title_full A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
title_fullStr A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
title_full_unstemmed A Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
title_sort defense scheme to resist routing attacks in mobile ad hoc networks
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/39162317762339507127
work_keys_str_mv AT cilunchen adefenseschemetoresistroutingattacksinmobileadhocnetworks
AT chénqǐlún adefenseschemetoresistroutingattacksinmobileadhocnetworks
AT cilunchen xíngdòngsuíyìwǎnglùxiàdǐdǎnglùyóugōngjīzhīfángyùjīzhì
AT chénqǐlún xíngdòngsuíyìwǎnglùxiàdǐdǎnglùyóugōngjīzhīfángyùjīzhì
AT cilunchen defenseschemetoresistroutingattacksinmobileadhocnetworks
AT chénqǐlún defenseschemetoresistroutingattacksinmobileadhocnetworks
_version_ 1717776164861247488