Performance Assessment of Secure Manet Routing Protocols in Malicious Environment

Performance Assessment of Secure Manet Routing Protocols in Malicious Environment

论文摘要

自组织网络(Ad Hoc)以它们的灵活性、节点等网络设备的独立性、网络拓扑结构动态变化的独特性、有限的带宽和有限的电源等为特点。和传统的网络相比路由是自组织网络中一个挑战,在白组织网络中路由选择很容易受到路由攻击。例如:黑洞攻击、牵制攻击、虫洞攻击、欺骗攻击、重发攻击和串通误解攻击,所有的这些攻击都在不同程度影响着网络的正常运行。在自组织网络的动态拓扑中,因为有固定的节点,路由的功能可以由可用的节点来执行。在这种路由环境下,每个节点既是路由器又是主机,这使得网络路由过程中存在安全性的问题,因为自组织的节点对于非有害的关键网络功能的执行不予信任。例如,在一个恶意的网络环境中,一个恶意的的节点能够发起洪泛攻击,使得网络带宽被完全的占用并消耗合法节点的资源如计算能力,电源功耗或者通过引起网络性能的严重下降从而使得破坏路由的运行。正如上面所提到的一样,这个领域的研究在近年变得很重要也吸引了很多学者来研究。我们的研究工作就是通过模拟各种情形的攻击估计那些在恶意环境中提出的MANET(包括ARIADNE和SAODV)的可靠的路由协议的性能和效果。为了达到这个目的,在我们的研究中使用了OPNET模拟工具来评价和分析恶意节点是如何进行和实现破坏DSR, ARIADNE, AODV和SAODV四个协议的。在这个过程中,我们设计一种方案来收集数据,这个方案用11个不同的可移动的终止时间重复做11次,这些终止时间的值得范围从0-100s。数据根据PDF和NLR这两个标准来收集,在本文的工作中,给定的方案中性能标准的实际值被许多因素影响。例如节点速度、节点的移动方向、移动的目的地址、数据流和特定节点的拥塞等等。因此,要想只从个别的方案的得到的标准直接来评价协议的性能是很困难的。为了得到更具代表性的性能指标,我们决定用多次运行结果的平均值。这11次的运行结果的平均值可推导两个指标,它们被用为在恶意环境的路由协议性能的评价基准。另外,通过在0-100s中选择移动模型的终止时间来实现模拟的多样化。收集到的数据的平均值被用来计算评价指标的值,然后再用这些指标来评价这四个协议的性能并用指标来衡量攻击的影响。根据模拟的分析结果,我们观察到在好的环境下(在给定的网络配置和移动设备的前提下)AODV和SAODV协议比DSR和ARIADNE表现的更好。这是因为节点的高移动性,就像是DSR和ARIADNE协议在这种环境下有个更差的影响。但是,对所有的协议一样,路由终止攻击导致收到的数据包减少而恶意节点数增加,从而很少的数据包能到达目的地址。例如ARIADNE和SAODV安全协议,在有路由修正的攻击的恶意环境下工作,得到了和在好环境下几乎一样高的PDF指标,但由于生成了更多的路由数据包,PDF指标有轻微的减少,正如我们实验观察到的,所以在恶意模拟环境下,正常的路由协议DSR和AODV未能将数据送至目的地。另外,最初在网络中恶意节点的布置对PDF指标的影响最大。ARIADNE协议不能正确的处理中间节点返回缓存路由的这种情形。我们注意到,如果为了利用更快的路由传播而使这个特征被激活,那么协议可能会很容易受到人为的攻击,这个弱点必须被克服因为缓存路由必须被有效的使用,但是SAODV协议在实际中是需要一个管理机制以实现在恶意环境下的工作。

论文目录

  • Abstract
  • 摘要
  • CHAPTER ONE INTRODUCTION
  • 1.1 Background of the study
  • 1.2 Statement of the problem
  • 1.3 The aim and objectives of the study
  • 1.4 Organization of the thesis
  • CHAPTER TWO LITERATURE REVIEW OF RELATED WORKS
  • 2.1 Secure routing protocol in Mobile ad hoc Network (MANET)
  • 2.2 General Routing issues in Manet and classification
  • 2.3 Dynamic Source Routing Protocol (DSR)
  • 2.3.1 Route Discovery Phase
  • 2.3.2 Route Maintenance
  • 2.4 Ad-hoc On-demand Distance Vector (AODV) routing protocol
  • 2.4.1 Route Discovery phase
  • 2.4.2 Route maintenance
  • 2.5 Routing Attacks against MANET Protocols
  • 2.6 Summary
  • CHAPTER THREE SECURITY ALERT IN ROUTING PROTOCOLS
  • 3.1 Security Goals
  • 3.2 Attacks and exploits on the existing protocols
  • 3.2.1 Attacks using Modification
  • 3.2.2 Attacks using Impersonation
  • 3.2.3 Attacks using Fabrication
  • 3.3 Proposed solutions
  • 3.3.1 ARIADNE
  • 3.3.2 Route Discovery Phase
  • 3.3.3 Route Maintenance Phase
  • 3.4 SAODV
  • 3.4.1 SAODV Hash Chains
  • 3.4.2 SAODV Digital signatures
  • 3.5 Summary
  • CHAPTER FOUR SIMULATION AND RESULTS ANALYSIS
  • 4.1 Simulation tool analysis
  • 4.2. OPNET Architecture
  • 4.2.1 Wireless support of OPNET Modeler
  • 4.2.2 Implementing the protocols in the OPNET modeler
  • 4.2.3 Implementing the attack Models in OPNET Modeler
  • 4.3 Attack models
  • 4.3.1 Route Drop Attack
  • 4.3.2 Route Modification Attack
  • 4.3.3 Fabrication Attack
  • 4.3.4 Impersonation Attack
  • 4.4. Scenario Setup
  • 4.5 Summary
  • CHAPTER FIVE EXPERINMENTS
  • 5.1 Experiments in the benign environments
  • 5.2 Malicious Environments Simulation Experiment
  • 5.2.1 Route Drop Attack
  • 5.2.2 Route Modification
  • 5.2.3 Route Fabrication
  • 5.2.4 Impersonation
  • 5.3 Summary
  • CONCLUSION
  • FUTURE WORK
  • REFERENCES
  • ACKNOWLEDGEMENT
  • 相关论文文献

    • [1].A routing algorithm for FPGAs with time-multiplexed interconnects[J]. Journal of Semiconductors 2020(02)
    • [2].AN EFFECTIVE DETAILED ROUTING ALGORITHM CONSIDERING ADVANCED TECHNOLOGY NODES[J]. Annals of Applied Mathematics 2020(01)
    • [3].Effective local dynamic routing strategy for air route networks[J]. Chinese Journal of Aeronautics 2015(06)
    • [4].Optimized routing strategy for complex network with multiple priorities[J]. Chinese Physics B 2016(08)
    • [5].Vehicle routing problem for save fuel consumption[J]. 科技视界 2016(17)
    • [6].Virtual Strategy QoS routing in satellite networks[J]. Science China(Information Sciences) 2016(09)
    • [7].Multi-hop routing for energy-efficiency enhancement in relay-assisted device-to-device communication[J]. The Journal of China Universities of Posts and Telecommunications 2015(02)
    • [8].A secure routing model based on distance vector routing algorithm[J]. Science China(Information Sciences) 2014(01)
    • [9].Profile based routing in vehicular ad-hoc networks[J]. Science China(Information Sciences) 2014(06)
    • [10].Research of multi-path routing based on network coding in space information networks[J]. Chinese Journal of Aeronautics 2014(03)
    • [11].Component based ant routing protocols analysis over mobile ad hoc networks[J]. Journal of Central South University 2013(09)
    • [12].Integrating local and partial network view for routing on scale-free networks[J]. Science China(Information Sciences) 2013(10)
    • [13].An immune-theory-based model for monitoring inter-domain routing system[J]. Science China(Information Sciences) 2012(10)
    • [14].Performance analysis of QoS routing protocol for WiMedia networks[J]. Journal of Central South University 2012(12)
    • [15].A reliable and high throughput hybrid routing protocol for vehicular ad-hoc network[J]. Journal of Harbin Institute of Technology 2012(06)
    • [16].Self-healing routing: failure,modeling and analysis[J]. Science China(Information Sciences) 2011(03)
    • [17].Autoregressive moving average model as a multi-agent routing protocol for wireless sensor networks[J]. Journal of Beijing Institute of Technology 2011(03)
    • [18].Multi-path routing based on load-balance for cognitive packet networks[J]. The Journal of China Universities of Posts and Telecommunications 2011(05)
    • [19].Novel optimized routing algorithm for LEO satellite IP networks[J]. Journal of Systems Engineering and Electronics 2011(06)
    • [20].Generalized minimum information path routing strategy on scale-free networks[J]. Chinese Physics B 2011(08)
    • [21].Research of novel complex optical network routing architecture[J]. The Journal of China Universities of Posts and Telecommunications 2010(05)
    • [22].MiniTE:data acquisition routing for wireless sensor networks[J]. The Journal of China Universities of Posts and Telecommunications 2009(01)
    • [23].QoS routing based on mobile agent for LEO satellite IP networks[J]. The Journal of China Universities of Posts and Telecommunications 2009(06)
    • [24].AFAR:adaptive fuzzy ant-based routing for communication networks[J]. Journal of Zhejiang University(Science A:An International Applied Physics & Engineering Journal) 2008(12)
    • [25].Adaptive ant-based routing in wireless sensor networks using Energy~* Delay metrics[J]. Journal of Zhejiang University(Science A:An International Applied Physics & Engineering Journal) 2008(04)
    • [26].Link reliability based hybrid routing for tactical mobile ad hoc network[J]. Journal of Systems Engineering and Electronics 2008(02)
    • [27].Joint multi-QoS and energy saving routing for LEO satellite network[J]. The Journal of China Universities of Posts and Telecommunications 2019(03)
    • [28].A hybrid multiple copy routing algorithm in space delay-tolerant networks[J]. Science China(Information Sciences) 2017(04)
    • [29].Spray and forward:Efficient routing based on the Markov location prediction model for DTNs[J]. Science China(Information Sciences) 2012(02)
    • [30].Reliable energy-efficient routing with novel route update in wireless sensor networks[J]. Journal of Zhejiang University-Science C(Computers & Electronics) 2012(09)

    标签:;  ;  ;  ;  

    Performance Assessment of Secure Manet Routing Protocols in Malicious Environment
    下载Doc文档

    猜你喜欢