Basic Search / Detailed Display

Author: 劉芳菱
Fang-ling Liu
Thesis Title: 防止共謀型黑洞的安全路由協定之設計
On the design of secure routing protocol to prevent cooperative black hole attack
Advisor: 羅乃維
Nai-wei Lo
Committee: 賴源正
Yuan-cheng Lai
林伯慎
Bor-shen Lin
Degree: 碩士
Master
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2011
Graduation Academic Year: 99
Language: 英文
Pages: 34
Keywords (in Chinese): 無線隨意網路黑洞攻擊共謀型
Keywords (in other languages): Cooperative Black Hole Attack
Reference times: Clicks: 279Downloads: 3
Share:
School Collection Retrieve National Library Collection Retrieve Error Report

無線行動隨意網路(MANET)是近年來興起的重要議題,它是由行動節點(如PDA、筆記型電腦)所建構而成。此網路能隨意的讓具有無線設備的裝置加入,再加上不需任何的固定裝置與集中型的無線網 路管理,因此常被應用在軍事方面、個人家庭網路或是緊急救援之上。
在本論文中,首先簡介了無線行動隨意網路的分類及特色。包括又可分為主動式的表格驅動式路由及被動式的需求式路由。然而它的網路模式可隨使用者的移動而改變,這些利於任意移動的特性卻也導致頻寬、電力及資源消耗的問題。
同時,這些特別的網路拓蹼特性也會引來惡意使用者的攻擊。在本論文中則是針對共謀性黑洞攻擊提出了保護方式,並且經由模擬結果得知此防護方法可有效的抵禦攻擊與增進整體網路環境的安全性。


The Mobile Ad Hoc Network (MANET) is a collection of mobile nodes. It is a simple peer-to-peer network. Ad hoc network has many uses, such as personal networks, household networks, military applications, and emergency rescue operations.
Since the network without any physical infrastructure and central base station, network management is done cooperatively by the other nodes. The feature about Ad hoc network is constraint resources, low bandwidth, and limited battery power. These kinds of networks are wide open to different types of attacks because unknown nodes can easily join the ad hoc networks. That is the reason why network security becomes a major concern.
In this article, we are going to present a mechanism which can detect a kind of Cooperative Black Hole Attack. About this attack, the multiple malicious node acting in a group, they can advertises itself have shortest and fresher route. When these malicious nodes received data packet from source node, they may drop them or intercept them. This attack may cause to reduce the packet delivery ratio and the throughput.
Our solution is basic on normal AODV, and it has a simply change on AODV protocol. Computer simulation used QualNet to show that our protocol provide better performance in the delivery rate than the normal AODV protocol which under the cooperative black hole attack.

中文摘要 i Abstract ii 致謝 iii Contents iv List of Figures v List of Tables vi Chapter 1. Introduction 1 1.1 Background 1 1.2 Motivation 4 Chapter 2. Related Work 5 2.1 AODV Routing Protocol 5 2.2 Black Hole Attack 9 2.3 Cooperative Black Hole Attack 12 Chapter 3. CBDAODV: Cooperative Black Hole Detection Mechanism on AODV 15 3.1 Attack Model 15 3.2 Algorithm of CBDAODV 16 Chapter 4. Simulation Result 25 4.1 Simulation Scenario 25 4.2 Performance Analysis 26 Chapter 5. Conclusion 31 References 32

[1] H. Dei, W. Li and D. P. Agarwal, ”Routing Security in Wireless Ad Hoc Networks”, IEEE Communication magazine, Vol. 40, no.10, October 2002.
[2] E. M. Royer, and C. Toh, ”A Review of Current Roting Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communication, pp.46-55, 1999.
[3] L. Abusalah, A. Khokhar, and M. Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, 2008
[4] T. Liu and K. Liu , “Improvements on DSDV in Mobile Ad Hoc Networks”, Wireless Communications, Networking and Mobile Computing, pp. 1637-1640, 2007.
[5] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, “Optimized link state routing protocol for ad hoc networks”, Multi Topic Conference, 2001.
[6] P. Khatri, M. Rajput, A. Shastri and Keshav Solanki, “Performance Study of Ad-Hoc Reactive Routing Protocols”, Journal of Computer Science 6 (10): pp.1130-1134, 2010.
[7] C. E. Perkins, E. M. Belding-Royer and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF Internet Draft, Work in Progress, 2002.
[8] D. B. Johnson, D. A. Maltz and J. Broch, "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks", Ad hoc networking, chapter 5, pp. 139–172, 2001.
[9] V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proc. IEEE INFOCOM ’97, pp.1405–1355, 1997.
[10] Z. J. Haas , “A new routing protocol for the reconfigurable wireless networks”, Proceedings of 6th IEEE International Conference on Universal Personal Communications, Vol.2, pp. 562-566, 1997.
[11] M. Joa-Ng and I. T. Lu, “A Peer-to Peer Zone-Based Two Level Link State Routing for Mobile Ad hoc Networks,” IEEE JSAC, vol. 17, no. 8, pp. 1415–25.55, 1999.
[12] H. Deng ,W. Li and Agrawal, D.P, “Routing security in wireless ad hoc networks” , IEEE Communications Magazine, Vol.40, Issue:10, pp70-75, 2002.
[13] M. Medadian,, M.H. Yektaie and A.M Rahmani, “Combat with Black Hole Attack in AODV routing protocol in MANET”, Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on, 2009.
[14] N. H. Mistry, D. C. Jinwala and M. A. Zaveri, “MOSAODV: Solution to Secure AODV against Blackhole Attack” , International Journal of Computer and Network Security, 2009.
[15] L. Tamilselvan and Dr. V Sankaranarayanan, “Prevention of Blackhole Attack in MANET”, In Proceedings of The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, pp. 21-21, 2007.
[16] P. N. Raj and P. B. Swadas, “DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009
[17] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J.Dixon and K. Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”, In proceedings of the 2003 International Conference on Wireless Networks (ICWN’03), 2003.
[18] H. Weerasinghe, and H. Fu, “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, International Journal of Software Engineering and Its Applications (IJSEIA), Vol.2 No.3, 2008.
[19] L. Tamilselvan and Dr. V Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET”, JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008.

QR CODE