资源预览内容
第1页 / 共79页
第2页 / 共79页
第3页 / 共79页
第4页 / 共79页
第5页 / 共79页
第6页 / 共79页
第7页 / 共79页
第8页 / 共79页
第9页 / 共79页
第10页 / 共79页
亲,该文档总共79页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentOctober 2011University Id : 10532Student Id: LY2009017Security Level : NormalHUNAN UNIVERSITYPerformance assessment of secure MANET routingprotocols in malicious environmentMASTERS THESISByFoday Konko KamaraCollegeMajorResearch FieldSupervisor: Information Science and Engineering: Computer Applications: Computer Networking: Professor Wang DongSubmission DateDefense Date:15th October 201128th October 2011Defense committee Chairman: Professor LiaoHunan University二Octor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentPerformance assessment of secure MANET routingprotocols in malicious environmentByFoday Konko KamaraDiploma in Computer Hardware Engineering (Africa InformationTechnology Holdings Limited, Freetown Sierra Leone) 2008A Thesis Submitted in partial fulfillment of theRequirements for the Degree ofMaster of EngineeringinComputer Science and TechnologyInThe graduate SchoolofHunan University Changsha ChinaSupervisorProfessor Wang DongOctober 2011Copyright 2011, Foday Konko KamaraHunan University三Octor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentHunan University四Octor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentHUNAN UNIVERSITYDECLARATIONI, Foday Konko Kamara hereby declare that the work presented in this Masters thesistitled “Performance assessment of secure MANET routing protocols in maliciousenvironment” is my original work and has not been presented elsewhere for anyacademic qualification. Where references have been used from books, publishedpapers, reports and websites, it is fully acknowledged in accordance with the standardreferencing practices of the discipline.Students signature:Date:Copyright StatementPermission is herewith granted to Hunan University to circulate and reproduce fornon-commercial purposes, at its discretion, this thesis upon the request of individualsor institutions. The author does not reserve other publication rights and the thesis norextensive extracts from it be printed or otherwise reproduce without the authorswritten permissionThis thesis belongs to:1. Secure, and this power of attorney is valid after2. Not secure(Please mark the above corresponding check box with“”)Authors Signature:Supervisors Signature:Date:Date:Hunan UniversityIOctor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentDEDICATIONI dedicate this thesis to my family for the love and courage they have shown to methroughout this time.Hunan UniversityIIOctor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentAbstractMobile Ad-hoc Network (MANET), by virtue of their flexibility and independence ofnetwork infrastructures like base stations and unique characteristics such as dynamicnetwork topology, limited bandwidth and limited battery power, routing in thisnetwork is a particularly challenging task as compared to a conventional network. InMANET, routing is severely vulnerable to various kinds of routing attacks viz-a-viz:black hole attack, link with holding attack, link spoofing attack, replay attack,wormhole attack and colluding mis-relay attack. All of these attacks influence thenormal operations of MANET in different ways. With the dynamic network topologyin MANET, routing functions are carried out by available nodes since there are fixedbase stations. In such routing environment, each node acts both as a
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号