跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.138) 您好!臺灣時間:2025/12/07 17:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李敏綺
研究生(外文):LEE,MIN-CHI
論文名稱:在存在自私節點之行動隨意網路下設計基於護衛節點之多重路由協定
論文名稱(外文):Guard Node Based Ad hoc On-demand Multipath Distance Vector Routing in the Presence of Selfishness
指導教授:王讚彬
指導教授(外文):WANG,TSAN-PIN
口試委員:嚴力行黃秀芬王丕中王讚彬
口試委員(外文):YAN,LI-XINGHUANG, XIU-FENWANG,PI-CHUNGWANG,TSAN-PIN
口試日期:2016-07-13
學位類別:碩士
校院名稱:國立臺中教育大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:76
中文關鍵詞:行動隨意網路AOMDV多重路徑護衛節點自私節點
外文關鍵詞:MANETAOMDVMultipath RoutingGuard nodeSelfish node
相關次數:
  • 被引用被引用:0
  • 點閱點閱:163
  • 評分評分:
  • 下載下載:4
  • 收藏至我的研究室書目清單書目收藏:0
隨著行動隨意網路的發展,加上節點的可移動性,使網路拓樸不斷地在變化。Ad hoc On-demand Multipath Distance Vector routing (AOMDV)是一種常見的路由協定,透過改良AODV方法,除了同時兼具AODV的特性之外,利用多重路由的方式,減少重新啟動路徑找尋(Routing discovery)的延遲與消耗,讓路徑即使失敗也能快速的透過備用路徑繼續傳送。在資源有限的行動隨意網路中,節點會出現自私行為來減少消耗,但AOMDV原有的方法並沒有考慮到自私節點存在的環境,而容易受到攻擊。

因此為了維護傳輸路徑的安全性,本篇論文改良AOMDV,並提出Guard node-based Ad hoc On-demand Multipath Distance Vector routing (GAOMDV)方法,主要加入護衛節點(Guard node)機制來做傳送路徑的監控。首先,當來源節點選擇一條用來傳送資料的路徑後,利用每個傳送節點周圍的護衛節點當作觀察點。接著由路徑的傳送節點發動投票機制找出可疑的自私或惡意節點。每個護衛節點所投的票會由傳送節點做為決策,藉此可以監督每段連線之間的傳送狀況。最後,傳送節點會依據投票結果,決定是否需要更換路徑。我們利用NS2模擬器來比較AOMDV與GAOMDV,在不同比率的自私節點搭配不同投票門檻值時,觀察封包的傳送率與延遲狀況。除了路徑上的傳送節點可能出現惡意行為之外,其他鄰居節點包含護衛節點等也都有可能是惡意節點。因此,我們設計一個賽局,利用不同角色來實驗投票者中包含惡意節點時,對投票結果的影響,並找出最佳的投票策略。
With the development of Mobile Ad hoc Networks (MANET), and the mobility of nodes, network topologies may change constantly. Ad hoc On-demand Multipath Distance Vector routing (AOMDV) is a common routing protocol, which modified the AODV protocol to reduce the delay and consumption while restarting the route discovery by multipath extensions. If the route breaks while transferring, the packet will be send through the alternate paths. With limited resources in MANET, the node may have selfish behaviors to reduce its consumption, but the original AOMDV method does not take into account the presence of selfish nodes.
Therefore, to maintain the security of the transmission path, we modified the AOMDV, and proposed Guard node-based Ad hoc On-demand Multipath Distance Vector routing (GAOMDV) method by introducing guard nodes to monitor the transmission path. First, guard nodes around the senders on the transmission path will monitor the transmission. Moreover, the sender may launch a simple agreement mechanism to find out the suspicious selfish and/or malicious nodes. The results observed by the guard nodes will be sent to the sender for making routing decisions. Finally, based on the voting results, the sender determines whether the primary transmission path should be replaced by the other paths or not. We use NS2 simulator to compare AOMDV and GAOMDV, with different ratios of selfish nodes and different voting thresholds, and to observe transfer rate and packet delay. To find other malicious nodes hidden in the voting nodes, we designed a simple game to find the best voting strategy.

目錄
摘要 I
Abstract II
目錄 III
表目錄 V
圖目錄 VI
第一章 緒論 1
1.1 前言 1
1.2 研究動機與目的 2
1.3 論文架構 3
第二章 背景與相關研究 4
2.1 AODV 路由協定簡介[2][3] 4
2.1.1路徑尋找(Route discovery) 5
2.1.2路徑維護(Route maintenance) 7
2.2 AOMDV 路由協定簡介[2][5] 8
2.3 相關文獻簡介 10
2.3.1 AOMDV Routing Algorithm for Wireless Mesh Networks with Local Repair (AOMDV-LR) [12] 10
2.3.2 Trust Evaluation Method Adapted to Node Behavior for Secure Routing in Mobile Ad hoc Networks [13] 11
2.3.3 Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs [14] 14
2.3.4 A Vote Based System to Detect Misbehaving Nodes in MANETs [15] 17
第三章 Guard node-based Ad hoc On-demand Multipath Distance Vector routing (GAOMDV) 18
3.1 問題描述 18
3.2 Guard node機制流程 19
3.2.1 Guard node的選擇 19
3.2.2 AOMDV修改 20
3.2.3 Guard node投票機制流程 22
3.2.4 Guard node的維護 25
3.3 投票機制 26
3.4 阿瓦隆投票規則應用[20] 26
3.4.1遊戲角色設定 26
3.4.2遊戲規則設定 27
第四章 Guard node-based Ad hoc On-demand Multipath Distance Vector routing (GAOMDV) 之系統實作 29
4.1 NS2 模組介紹 29
4.2 AOMDV 函數說明[22] [23] 31
4.3 GAOMDV 實作 34
4.3.1 選擇guard node 37
4.3.2 檢舉可疑節點 38
4.3.3 投票機制 43
4.4 GAOMDV 與阿瓦隆應用 44
4.5 小結 47
第五章 實驗結果與模擬分析 48
5.1 NS2網路模擬器介紹[23] 48
5.2 實驗模擬環境與參數設定 50
5.3 實驗方法與模擬結果分析 52
5.3.1 Simulation-1 封包到達率、延遲率之比較 52
5.3.2 Simulation-2 節點數、自私節點比率、門檻值之比較 54
5.3.3 Simulation-3 阿瓦隆簡易賽局 60
5.4 問題與討論 61
5.4.1 檢舉與路徑更換 61
第六章 結論 62
6.1 結論 62
6.2 未來工作 62
參考文獻 63

[1] “IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999),” June 12, 2007.
[2] 惠汝生(2006)。無線Ad hoc行動隨意網路架構之技術發展評析。IECQ 報導第四十九期,中華民國電子零件認證委員會。Available:http://www.cteccb.org.tw/pdf/IECQ-49-6.pdf
[3] Internet Engineering Task Force, Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561), Available: http://www.rfc-editor.org/rfc/rfc3561.txt
[4] Mahesh K. Marina and Samir R. Das, “Ad Hoc on-Demand Multipath Distance Vector Routing,” Wireless Communications and Mobile Computing, vol.6, no.7, pp. 969-988, nov. 2006
[5] 賴國楨(2011)。行動隨意網路中區域獨立多重路徑路由協定之改善。大同大學通訊工程研究所碩士論文,台北。
[6] Rupinder Kaur, Parminder Singh, “Review of Black Hole and Gray Hole Attack,” The International Journal of Multimedia & Its Applications ,IJMA, vol.6, no.6, pp. 35-45,Dec. 2014
[7] B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, vol. 17, 2006.
[8] L. Perrone and S. Nelson, “A study of on-off attack models for wireless ad hoc networks”, in proc. First IEEE International Workshop on Operator-Assisted Community Networks, OpComm’06, Berlin, German, 18-19 Sep. 2006, pp. 1-10
[9] Younghun Chae and DiPippo, L.C. and Sun, Y.L., "Trust Management for Defending On-Off Attacks", IEEE Transactions on Parallel and Distributed Systems, vol.26, no.4, pp.1178-1191, Apr. 2015
[10] X. Mao and J. McNair, "Effect of on/off misbehavior on overhearing based cooperation scheme for MANET", Proc. Military Commun. Conf., pp. 1086-1091, 2010
[11] Farid Bin Beshr, Ahmed Bin Ishaq, Saeed Aljabri, Tarek R. Sheltami, “A Guard Node (GN) based Technique against Misbehaving Nodes in MANET,” Journal of Ubiquitous Systems & Pervasive Networks, vol.7, no.1, pp.13-17, 2016
[12] Kushwaha, U.S., P. K. Gupta, “AOMDV routing algorithm for Wireless Mesh Networks with local repair (AOMDV-LR)”, in Proc. International Conference on Communications and Signal Processing ,ICCSP, Melmaruvathur, India, 3-5 April. 2014, pp. 818-822
[13] Sayaka Umeda and Sonoko Takeda and Hiroshi Shigeno, ” Trust Evaluation Method Adapted to Node Behavior for Secure Routing in Mobile Ad hoc Networks ”, in proc. International Conference on Mobile Computing and Ubiquitous Networking .ICMU‘15, Hakodate, Japan, 20-22 Jan. 2015, pp.143-148
[14] Juan A. Martinez, Daniel Vigueras, Francisco J. Ros, and Pedro M. Ruiz, “Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs”, Journal of Communication and Networks, vol.15, no.2, pp.122-131, April 2013
[15] Rahul Talreja and Vimla Jethani, ”A Vote Based System to Detect Misbehaving Nodes in MANETs”, in proc. IEEE International Advance Computing Conference.IACC’14, Gurgaon, India, 21-22 Feb.2014, pp. 391-394
[16] Alfarez Abdul-Rahman and Stephen Hailes, "A distributed trust model", in proc. New Security Paradigms Workshop.NSPW'97, Langdale, Cumbria, United Kingdom, 23-26 Sep. 1997, pp.48-60
[17] Amit Chauhan and Arti Patle and Anita Mahajan, ” A Better Approach towards Securing Mobile Adhoc Network”, International Journal of Computer Applications, vol.20, no.8, pp.6-11, Apr. 2011
[18] Kshirsagar, R.V, “Multipath Reliable Range Node Selection Distance Vector Routing for VANET: Design Approach”, in Proc. International Conference on Electronic Systems, Signal Processing and Computing Technologies, ICESC, Nagpur, India, 9-11 Jan. 2014, pp. 280 – 283
[19] Ehsan Mostajeran, Rafidah Md Noor, Hassan Keshavarz, “A novel improved neighbor discovery method for an Intelligent-AODV in Mobile Ad hoc Networks,” in Proc. 2013 International Conference of Information and Communication Technology, ICoICT, Bandung, Indonesian, 20-22 Mar. 2013, pp. 395 – 399
[20] Game wiki, The Resistance: Avalon, Available:http://web.eecs.umich.edu/~gameprof/gamewiki/index.php/The_Resistance:_Avalon
[21] The Network Simulator - ns-2, Available: http://www.isi.edu/nsnam/ns/
[22] Francisco J. Ros and Pedro M. Rui, “Implementing a New MANET Unicast Routing Protocol in NS2,”Dec. 2004.
[23] NS2.26SourcesOriginal Class Hierarchy, Available: http://www.netlab.ecnu.edu.cn/software/ns-class/namespaces.htm
[24] ns-2 Tutorial, Available: http://www.isi.edu/nsnam/ns/tutorial/nsindex.html
[25] 程榮祥、柯志亨、鄧德雋、丁建文(2009)。NS2網路模擬實驗。台北市:學貫行銷

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊