跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 02:52
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:吳奕叡
研究生(外文):Yi-Jui Wu
論文名稱:在無線隨意網路中抵抗蟲洞攻擊之動態來源路由協定
論文名稱(外文):A Wormhole-Proof Dynamic Source Routing Protocol for Wireless Ad-hoc Networks
指導教授:簡榮宏簡榮宏引用關係
指導教授(外文):Rong-Hong Jan
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學與工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:36
中文關鍵詞:無線網路無線隨意網路網路安全路由協定蟲洞攻擊
外文關鍵詞:wireless networkswireless ad-hoc networksnetwork securityrouting protocolwormhole attacks
相關次數:
  • 被引用被引用:0
  • 點閱點閱:205
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,無線行動隨意網路無論在研究上或實務上都越來越受受重視。由於無線網路的傳輸訊號暴露在空氣中,使得惡意攻擊者可以輕易地干擾、竊聽甚至入侵無線行動隨意網路;然而,現存許多無線行動隨意網路方面的研究,大都假設無線網路環境是安全且可信賴,這與實際狀況有所不符。在本篇論文中,我們主要針對蟲洞攻擊,進行研究與探討,提出一個在網路結點上,不需要時間同步或特殊硬體的動態來源路由協定,所提出的協定可抵抗蟲洞攻擊。藉由模擬的結果顯示,我們提出的方法可有效地偵測蟲洞攻擊,且所提出的協定耗費的網路資源相當微小。
In recent years, wireless mobile ad-hoc networks (MANet) have becoming attractive and important in both research and practice. However, many previous works on MANet assume a trusty network environment, while malicious adversaries can easily disrupt, eavesdrop and intrude because of the nature of wireless communication. In this thesis, we study a particular attack called wormhole attacks, and develop a wormhole-proof dynamic source routing protocol, which requires neither time synchronization nor specialized hardware, to counter wormhole attacks. The results show that the proposed protocol can effectively detect wormhole attacks and involve less computation overhead while compared to the previous works.
1. Introduction 4
1.1 Wormhole Attacks ... 5
2. Related Works 10
2.1 Theoretic Analysis . 10
2.2 Distance or Time Limiting Detection Approaches ..... 11
2.3 False Geometry or Topology Detection Approaches .... 15
2.4 Neighbor Nodes Monitoring Approaches 17
3. The Proposed Wormhole Proof Protocol: WP-DSR 19
3.1 Dynamic Source Routing ..... 19
3.2 The Proposed Protocol: WP-DSR 21
3.2.1 An Observation on DSR ..... 21
3.2.2 The Proposed Protocol ..... 22
4. Simulation Results 27
4.1 Overheads of WP-DSR ..... 27
4.2 Wormhole Attacks Impact on DSR .. 29
4.3 Performance of WP-DSR ... 30
5. Conclusion 33
6. References 34
[1] A. D. Wood and J.A. Stankovic, “Denial of service in sensor networks,” IEEE Computer, vol. 35, no.10, pp. 54-62, 2002.
[2] J. F. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” Proceedings of Design Issues in Anonymity and Unobservability Workshop, pp. 7-26, Berkeley, California, USA, 2000.
[3] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for ad hoc networks,” Proceedings of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, Paris, France, 2002.
[4] Y. C. Hu and A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,” Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 12-23, Atlanta, Georgia, USA, 2002.
[5] Y. C. Hu and A. Perrig, “A survey of secure wireless ad hoc routing,” IEEE Security & Privacy, vol. 2, issue 3, pp. 28-39, 2004.
[6] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” IEEE Wireless Communications, vol.1, issue 1, pp. 38-47, 2004.
[7] P. G. Argyroudis, and D. O'Mahony, “Secure routing for mobile ad hoc networks,” IEEE Communications Surveys & Tutorials,” vol.7, no.3, pp. 2 – 21, 2005.
[8] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR), ” IETF MANET Working Group, Internet Draft 2003.
[9] D. Johnson, D. Maltz, and U. Hu, “The dynamic source routing protocol for mobile ad hoc networks,” IETF MANET Working Group, Internet Draft 2003.
[10] C. Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” IETF MANET Working Group, Internet Draft 2003.
[11] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach,” Proceedings of IEEE Wireless Communications & Networking Conference (WCNC), vol. 2, pp. 1193-1199, New Orleans, USA, 2005.
[12] M. Khabbazian, H. Mercier, and V. K. Bhargava, “Wormhole attack in wireless ad hoc networks: analysis and countermeasure,” Proceedings of IEEE Global Communications Conference (GLOBECOM), San Francisco, California, 2006.
[13] Y. C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, 2006.
[14] S. Capkun, L. Buttyan, and J-P Hubaux, “SECTOR: secure tracking of node encounters in multi-hop wireless networks,” Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32, 2003.
[15] N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” Proceedings of ACM Workshop on Wireless Security (WiSe), pp. 1-10, San Diego, California ,USA, 2003.
[16] J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “Truelink: a practical countermeasure to the wormhole attack in wireless networks,” Proceedings of IEEE International Conference on Network Protocols (ICNP), pp. 75-84, Santa Barbara, California, USA, 2006.
[17] H. S. Chiu and K. S. Lui, “DelPHI: wormhole detection mechanism for ad hoc wireless networks,” Proceedings of International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 2006.
[18] F. Na¨ıt-Abdesselam, B. Bensaou, and J.Yoo, “Detecting and avoiding wormhole attacks in optimized link state routing protocol,” Proceedings of IEEE Wireless Communications & Networking Conference (WCNC), Hong Kong, 2007.
[19] W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” Proceedings of the ACM Workshop on Wireless Security (WiSe), pp. 51–60, Philadelphia Pennsylvania, 2004.
[20] R. Maheshwari, J. Gao, and Samir R. Das, "Detecting wormhole attacks in wireless networks using connectivity information,'' Proceedings of IEEE Infocom, Anchorage, Alaska, USA, 2007.
[21] L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 131-141, San Diego, California, Baltimore, Maryland. 2004.
[22] I. Khalil, S. Bagchi, and N. B. Shroff, “MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks,” Proceedings of the Second International Conference on Security and Privacy in Communication Networks (SecureComm), 2006.
[23] I. Khalil, S. Bagchi, and N. B. Shroff, “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,” Proccedings of the International Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, pp. 612-621, 2005.
[24] ns-2. [Online]. Available: http://www.isi.edu/nsnam/ns/ .
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊