跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2024/12/04 11:27
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張舜超
研究生(外文):Chang Shun Chao
論文名稱:一個解決隨意網路黑洞問題的分散式機制
論文名稱(外文):A Distributed and Cooperative Mechanism for Solving Black Hole Attack in Ad Hoc Networks
指導教授:俞征武俞征武引用關係
學位類別:碩士
校院名稱:中華大學
系所名稱:資訊工程學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:54
中文關鍵詞:隨意網路黑洞網路安全路由
外文關鍵詞:Ad Hoc NetworksBlack HoleNetwork SecurityRouting Protocol
相關次數:
  • 被引用被引用:2
  • 點閱點閱:415
  • 評分評分:
  • 下載下載:24
  • 收藏至我的研究室書目清單書目收藏:2
黑洞攻擊(black hole attack)是存在於隨意網路(Ad hoc network)中極待解決的一種阻斷攻擊問題,黑洞的惡意節點會利用路由協定的路由回復封包,告知來源端經由惡意節點有到目的端的最短路徑,而當來源端將資料封包傳出,惡意節點將不會協助轉送資料封包並且將其丟棄,如此將照成網路中資料無法傳遞。在本論文中,提出一種分散(Distributed)與合作(Cooperative)的機制,讓行動節點(Mobile node)利用合作的方式解決黑洞攻擊問題,我們的方法利用區域資料收集步驟分析鄰近節點是否可疑;為避免網路資源耗用,先利用區域偵測步驟達到簡易的評估;為求更高的評估可信度,才進行合作偵測步驟;並在全域回覆步驟中提出更適當的方式,來告知網路上的所有行動節點有黑洞惡意節點存在。利用此機制不單能解決黑洞攻擊問題,同時能防止黑洞惡意節點利用合作的方式攻擊,且此機制能夠讓偵測更可靠與偵測時的網路資源浪費更少。
Ad hoc network is collection of mobile nodes that dynamically form a temporary network. There exists a black hole attack problem in ad hoc network. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose data packets it wants to intercept. In our dissertation, a distributed and cooperative mechanism is proposes to solve the black hole attack. Every node analyzes whether 1-hop neighbors are suspicious by collecting local data. Network traffic can be avoided, because nodes will achieve simple appraisal by exploiting local detection and will limit the detection scope to a neighboring area of 1-hop neighbors. When the node is confirmed to be suspicious, cooperative detection will be started for reaching more reliable detection. This method can avoid single and cooperative black hole attack. And this method can make detection more reliable and also decrease network traffic during detection.
1. Introduction 1
2. Background 3
2.1 Ad Hoc Networks 4
2.2 Black Hole Attack 6
2.3 The Protocol Stack 9
2.4 Ad Hoc Routing Protocols 13
2.4.1 Proactive Routing Protocols 14
2.4.2 Reactive Routing Protocols 15
2.4.3 Hybrid Routing Protocols 18
2.5 Security Principles 19
3. Relate Work 22
3.1 Eliminating Single Black Hole 23
3.2 Eliminating Single Black Hole 25
4. The Distributed and Cooperative Mechanism 29
4.1 Local Data Collection 31
4.2 Local Detection 34
4.3 Cooperative Detection 38
4.4 Global Reaction 42
5. Simulation Results 44
5.1 Simulation Model 44
5.2 Evaluation Metrics 45
5.3 Simulations Results 46
6. Conclusions 51
7. References 52
[1] Lidong Zhou and Zygmunt J. Haas, “Securing Ad hoc networkss, ” IEEE Network Magazine, vol. 13, no.6, November/December 1999.
[2] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad hoc networks,” IEEE Communications Magzine, vol. 40, no. 10, October 2002.
[3] Elizabeth M. Royer and Chai-Keong Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal Communications, pp. 46-55, April 1999.
[4] Charles E. Perkins and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, November 2002.
[5] David B. Johnson and David A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
[6] D. Nguyen, L. Zhao, P. Uisawang, and J. Platt, “Security Routing Analysis for Mobile Ad hoc networkss,” wahrscheinlich 2001, Publikation unbekannt.
[7] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc networkss,” 6th Int’l. Conference Mobile Comp. Net., Mobicom 2000, pp. 275-283, August 2000.
[8] S. Bhargava and D.P. Agrawal, ”Security enhancements in AODV protocol for wireless ad hoc networkss,” VTC 2001 Fall. IEEE VTS 54th , vol.4, pp 2143 -2147, Oct. 2001.
[9] V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial of service attacks at the MAC layer in wireless ad hoc networkss,” MILCOM 2002. Proceedings, vol.2, pp 1118 -1123, Oct. 2002.
[10] Arun Kumar, Jessi K. Koput, Saijai Chancham, and YoungMi Kim, “Denial of Service Attacks in Ad hoc networkss” A capstone paper submitted as partial fulfillment of the requirements for the degree of Masters in Interdisciplinary Telecommunications at the University of Colorado, Boulder, May 2, 2003. Project directed by Professor Timothy X Brown.
[11] R. Sanjay, F. Huirong, S. Manohar, D. John, and N. Kendall, “Prevention of Cooperative Black Hole Attack in Wireless Ad hoc networks,” The 2003 International Conference on Wireless Networks (ICWN 2003).
[12] 台灣電腦網路危機處理曁協調中心”無線網路安全白皮書” http://www.cert.org.tw/document/docfile/Wireless_Security.pdf
[13] William Stallings ”Network Security Essentials Applications and Standards” Prentice Hall Publishers.
[14] Seungjoon Lee, Bohyung Han, Minho Shin ”Robust Routing in Wireless Ad hoc networkss” 2002 International Conference on Parallel Processing Workshops (ICPPW''02) August 18 - 21, 2002 Vancouver, B.C., Canada
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊