首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信网论文--一般性问题论文--网络安全论文

防御污水池攻击和黑洞路由攻击的安全的无线传感器网络

摘要第7-9页
Abstract第9-10页
Chapter 1 Introduction第14-22页
    1.1 Research Motivation第15-17页
    1.2 Problem Statement第17页
    1.3 Research Objectives第17-18页
    1.4 Research Significance and Contributions第18-20页
    1.5 Thesis Synopsis第20-22页
Chapter 2 Literature Review and Related Work第22-54页
    2.1 Wireless Sensor Network第22-23页
    2.2 Applications of Wireless Sensor Networks第23-25页
    2.3 Characteristics of Wireless Sensor Networks第25-26页
    2.4 Security Vulnerabilities in Wireless Sensor Networks第26-28页
    2.5 Routing Attacks in Ad hoc and WSNs第28-32页
        2.5.1 Sinkhole Attack第28-29页
        2.5.2 Selective Forwarding Attack第29-30页
        2.5.3 Wormhole Attack第30-31页
        2.5.4 Black Hole Attack第31-32页
        2.5.5 Sybil Attack第32页
        2.5.6 HELLO flood attack第32页
    2.6 Existing Sinkhole Detection Techniques第32-40页
        2.6.1 IDS Based Solutions第33-35页
        2.6.2 Neighbor Based Solutions第35-37页
        2.6.3 Cryptographic Based Solutions第37-38页
        2.6.4 Statistic Based Solutions第38-39页
        2.6.5 Graph Based Solutions第39-40页
        2.6.6 Location and Time Based Solutions第40页
    2.7 Black Hole Detection Approaches第40-41页
    2.8 Routing Protocols in Ad hoc and WSNs第41-46页
        2.8.1 Topology-based Routing Protocols第42-44页
        2.8.2 Position-based Routing Protocol第44页
        2.8.3 Routing Protocols in WSNs第44-45页
        2.8.4 Comparison of Routing Protocols第45-46页
    2.9 Ad-hoc On-demand Distance Vector Routing Protocol (AODV)第46-51页
        2.9.1 AODV Terminology第47页
        2.9.2 AODV Messages第47-50页
        2.9.3 Hello Messages第50页
        2.9.4 Gratuitous Route Replies第50页
        2.9.5 Timeouts第50-51页
        2.9.6 AODV Route Discovery Phase第51页
    2.10 Security Goals第51-52页
    2.11 Summary第52-54页
Chapter 3 Circumventing Sinkhole Attack in Ad hoc Networks第54-72页
    3.1 Introduction第54-55页
    3.2 Weakness in AODV第55-56页
    3.3 Network Model第56-57页
        3.3.1 Multiple Neighbors第56页
        3.3.2 Linear Paths第56-57页
        3.3.3 Active Routes第57页
        3.3.4 Unicast Validation Packet第57页
        3.3.5 No Mobility第57页
    3.4 Detection of Sinkhole Attack第57-58页
    3.5 Identification of Malicious Node第58-60页
    3.6 Validation packet第60-61页
        3.6.1 Link Disjoint Paths第60-61页
        3.6.2 Node Disjoint Paths第61页
    3.7 Maintaining RREPs第61页
    3.8 Test scenarios第61-65页
        3.8.1 Test Scenario 1第62-63页
        3.8.2 Test scenario 2第63-64页
        3.8.3 Test scenario 3第64-65页
    3.9 Experiment and Analysis第65-71页
        3.9.1 Network Simulator (NS-2)第65-67页
        3.9.2 Network Parameters第67页
        3.9.3 Simulated Network Scenario第67-71页
    3.10 Summary第71-72页
Chapter 4 Black Hole Attack Detection by Using Neighbor Based Authentication Approach第72-84页
    4.1 Introduction第72-73页
    4.2 Black Hole Problem第73-74页
    4.3 Proposed Solution第74-77页
    4.4 Simulation Results and Evaluation第77-82页
        4.4.1 Network Parameters第80页
        4.4.2 Network Throughput第80-81页
        4.4.3 Packet Delivery Ratio第81-82页
        4.4.4 End-to-End Delay第82页
        4.4.5 Number of Transmissions第82页
    4.5 Summary第82-84页
Chapter 5 Detection of Malicious Node in WSN by Using Acknowledgement Based Approach第84-92页
    5.1 Introduction第84-85页
    5.2 Proposed Solution第85-87页
    5.3 Simulation Results and Evaluation第87-91页
        5.3.1 Network Parameters第87页
        5.3.2 Number of Transmissions第87-89页
        5.3.3 Path Establishment Delay第89-90页
        5.3.4 Energy Consumption第90-91页
    5.4 Summary第91-92页
Chapter 6 An Efficient Approach for Detecting and Removing Black Hole Attack in WSNs第92-100页
    6.1 Introduction第92-93页
    6.2 Proposed Solution第93-95页
    6.3 Simulation Results and Evaluation第95-99页
        6.3.1 Network Parameters第95-97页
        6.3.2 Network Throughput第97-98页
        6.3.3 Average Path Establishment Delay第98页
        6.3.4 Energy Consumption第98-99页
    6.4 Summary第99-100页
Chapter 7 Conclusions and Future Research第100-104页
    7.1 Thesis Overview第100页
    7.2 Research Achievements第100-102页
    7.3 Practical Implication第102页
    7.4 Research Limitations第102-103页
    7.5 Research Recommendations and Future Work第103-104页
List of Research Publications during the Doctoral Degree(攻读博士学位期间所发表的学术论文)第104-106页
References第106-116页
Acknowledgement第116页

论文共116页,点击 下载论文
上一篇:海拉尔区共青团组织参与社会治理研究
下一篇:空间随机网络的队列年龄分析与优化