首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信网论文--一般性问题论文--网络安全论文

Localization and Isolation of Corrupted Nodes Using Trust-Based Routing Mechanism

DEDICATION第5-6页
ABSTRACT第6页
摘要第7-8页
TABLE OF CONTENTS第8-11页
LIST OF FIGURES第11-13页
LIST OF TABLES第13-14页
CHAPTER 1 INTRODUCTION第14-16页
    1.1 Background of the study第14-15页
    1.2 Motivation第15页
    1.3 Thesis Contribution第15页
    1.4 Thesis Organization第15-16页
CHAPTER 2 BACKGROUND AND LITERATURE REVIEW第16-50页
    2.1 Presentation of Ad hoc Networks第16-17页
    2.2 Routing Protocols in MANETs第17页
    2.3 Security Challenges and Purpose in MANETs第17-19页
        2.3.1 Security Challenges in Ad Hoc Networks第17-18页
        2.3.2 Security Purpose for Ad hoc Network第18-19页
    2.4 Routing Attacks and Security in MANET第19-26页
        2.4.1 Routing Attacks in MANET第19-25页
        2.4.2 Routing Security in MANET第25-26页
    2.5 Routing Security Mechanisms第26-33页
        2.5.1 Secure AODV第26页
        2.5.2 Secure Routing Protocol for Ad Hoc Networks(Aran)第26-28页
        2.5.3 Secure Efficient Ad hoc Distance Vector(Sead)第28页
        2.5.4 Ariadne第28-29页
        2.5.5 SORP第29-30页
        2.5.6 Security Aware Routing(Sar)第30-31页
        2.5.7 Secure Routing Protocol(Srp)第31-32页
        2.5.8 TIARA第32-33页
    2.6 Description of Concept of Trust第33-43页
        2.6.1 The Concept of Trust第33页
        2.6.2 The Properties of Trust第33-35页
        2.6.3 Presentation of the Current System第35-42页
        2.6.4 Blacklists Exchange using SSL第42-43页
    2.7 Intrusion Detection System第43-44页
    2.8 Literature Review第44-49页
    2.9 Summary第49-50页
CHAPTER 3 THE LOCALISATION AND ISOLATION SCHEME USING TRUST-BASED ROUTING MECHANISM第50-63页
    3.1 Problem Statement第50页
        3.1.1 The route management第50页
        3.1.2 The trust management第50页
        3.1.3 The resource management第50页
    3.2 Example of Problematic Scenarios第50-56页
        3.2.1 Problem of Packet Dropping attacks or Black hole Attack第50-52页
        3.2.2 Problem of Security without Tolerance: example of Routing Loop第52-56页
    3.3 Proposed Schemes第56-60页
        3.3.1 Trust Modeling Based on Routing Mechanism第56-58页
        3.3.2 The Algorithm for Detecting a Packet Dropping Attack and Managing the Security第58-59页
        3.3.3 The Algorithm for Detecting a Routing Loop Attack and Managing the Security第59-60页
    3.4 Blacklists exchange using SSH第60-63页
CHAPTER 4 EXPERIMENTAL RESULTS AND ANALYSIS第63-66页
    4.1 Simulation and Parameters第63页
    4.2 Simulation results第63-66页
        4.2.1 Number of sources vs.packets dropped第63-64页
        4.2.2 Number of source nodes Vs number of malicious nodes detected第64-65页
        4.2.3 Number of sources vs. packets delivery fraction(PDF)第65-66页
CHAPTER 5 CONCLUSION AND FUTURE WORK第66-67页
    5.1 Conclusion第66页
        5.1.1 Achievements第66页
        5.1.2 Limitations第66页
    5.2 Future Work第66-67页
REFERENCES第67-71页
ACKNOWLEDGEMENTS第71-72页
APPENDIX A TCL CODE第72-76页
APPENDIX B SOME PRINT SCREENS第76-78页

论文共78页,点击 下载论文
上一篇:若干规则网络的混沌同步研究
下一篇:职业中学女生管理策略研究--以伊旗职业高级中学为例