首页--工业技术论文--无线电电子学、电信技术论文--无线通信论文--移动通信论文

Performance Assessment of Secure Manet Routing Protocols in Malicious Environment

Abstract第6-8页
摘要第9-17页
CHAPTER ONE INTRODUCTION第17-23页
    1.1 Background of the study第17-19页
    1.2 Statement of the problem第19-20页
    1.3 The aim and objectives of the study第20-21页
    1.4 Organization of the thesis第21-23页
CHAPTER TWO LITERATURE REVIEW OF RELATED WORKS第23-35页
    2.1 Secure routing protocol in Mobile ad hoc Network (MANET)第23-25页
    2.2 General Routing issues in Manet and classification第25-26页
    2.3 Dynamic Source Routing Protocol (DSR)第26-29页
        2.3.1 Route Discovery Phase第27-28页
        2.3.2 Route Maintenance第28-29页
    2.4 Ad-hoc On-demand Distance Vector (AODV) routing protocol第29-32页
        2.4.1 Route Discovery phase第29-31页
        2.4.2 Route maintenance第31-32页
    2.5 Routing Attacks against MANET Protocols第32-34页
    2.6 Summary第34-35页
CHAPTER THREE SECURITY ALERT IN ROUTING PROTOCOLS第35-49页
    3.1 Security Goals第35-37页
    3.2 Attacks and exploits on the existing protocols第37-40页
        3.2.1 Attacks using Modification第37-39页
        3.2.2 Attacks using Impersonation第39-40页
        3.2.3 Attacks using Fabrication第40页
    3.3 Proposed solutions第40-44页
        3.3.1 ARIADNE第40-41页
        3.3.2 Route Discovery Phase第41-44页
        3.3.3 Route Maintenance Phase第44页
    3.4 SAODV第44-48页
        3.4.1 SAODV Hash Chains第45-47页
        3.4.2 SAODV Digital signatures第47-48页
    3.5 Summary第48-49页
CHAPTER FOUR SIMULATION AND RESULTS ANALYSIS第49-61页
    4.1 Simulation tool analysis第49页
    4.2. OPNET Architecture第49-54页
        4.2.1 Wireless support of OPNET Modeler第50-51页
        4.2.2 Implementing the protocols in the OPNET modeler第51-53页
        4.2.3 Implementing the attack Models in OPNET Modeler第53-54页
    4.3 Attack models第54-57页
        4.3.1 Route Drop Attack第54-55页
        4.3.2 Route Modification Attack第55页
        4.3.3 Fabrication Attack第55-56页
        4.3.4 Impersonation Attack第56-57页
    4.4. Scenario Setup第57-60页
    4.5 Summary第60-61页
CHAPTER FIVE EXPERINMENTS第61-76页
    5.1 Experiments in the benign environments第61-64页
    5.2 Malicious Environments Simulation Experiment第64-74页
        5.2.1 Route Drop Attack第64-68页
        5.2.2 Route Modification第68-71页
        5.2.3 Route Fabrication第71-73页
        5.2.4 Impersonation第73-74页
    5.3 Summary第74-76页
CONCLUSION第76-77页
FUTURE WORK第77-78页
REFERENCES第78-82页
ACKNOWLEDGEMENT第82页

论文共82页,点击 下载论文
上一篇:面向衰落信道的协同MIMO通信系统编码技术研究
下一篇:Research on Routing Protocols for Wireless Body Area Network