Danh mục

Security Threats in Mobile Ad Hoc Network

Số trang: 48      Loại file: pdf      Dung lượng: 0.00 B      Lượt xem: 8      Lượt tải: 0    
tailieu_vip

Phí tải xuống: 12,000 VND Tải xuống file đầy đủ (48 trang) 0
Xem trước 5 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodesthat wish to communicate without any fixed infrastructure and pre-determinedorganization of available links. The nodes in MANET themselves are responsible fordynamically discovering other nodes to communicate. Although the ongoing trend is toadopt ad hoc networks for commercial uses due to their certain unique properties, themain challenge is the vulnerability to security attacks. A number of challenges like openpeer-to-peer network architecture, stringent resource constraints, shared wirelessmedium, dynamic network topology etc. are posed in MANET.......
Nội dung trích xuất từ tài liệu:
Security Threats in Mobile Ad Hoc Network Master ThesisComputer ScienceThesis no: MCS-2007:0722nd March, 2007 Security Threats in Mobile Ad Hoc Network Kamanshis Biswas and Md. Liakat AliDepartment ofInteraction and System DesignSchool of EngineeringBlekinge Institute of TechnologyBox 520SE – 372 25 RonnebySwedenThis thesis is submitted to the Department of Interaction and System Design, School ofEngineering at Blekinge Institute of Technology in partial fulfillment of the requirements forthe degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks offull time studies.Contact Information:Author(s):Kamanashis BiswasE-mail: avrobth@gmail.comMd. Liakat AliE-mail: liakat3026@gmail.comAdvisor:Rune GustavssonE-mail: rgu@bth.seDepartment of Computer ScienceDepartment ofInteraction and System Design Internet: www.bth.se/tekBlekinge Institute of Technology Phone: +46 457 38 50 00Box 520 Fax: + 46 457 102 45SE – 372 25 RonnebySweden i AcknowledgementsFirst and foremost, we would like to express our heartiest gratitude to our honorablesupervisor Prof. Dr. Rune Gustavsson for his suggestions, guidance, constantencouragement and enduring patience throughout the progress of the thesis. We wouldalso like to express our sincere thanks to Martin Fredriksson for his advices and all-outcooperation. ii AbstractMobile Ad Hoc Network (MANET) is a collection of communication devices or nodesthat wish to communicate without any fixed infrastructure and pre-determinedorganization of available links. The nodes in MANET themselves are responsible fordynamically discovering other nodes to communicate. Although the ongoing trend is toadopt ad hoc networks for commercial uses due to their certain unique properties, themain challenge is the vulnerability to security attacks. A number of challenges like openpeer-to-peer network architecture, stringent resource constraints, shared wirelessmedium, dynamic network topology etc. are posed in MANET. As MANET is quicklyspreading for the property of its capability in forming temporary network without the aidof any established infrastructure or centralized administration, security challenges hasbecome a primary concern to provide secure communication. In this thesis, we identifythe existent security threats an ad hoc network faces, the security services required to beachieved and the countermeasures for attacks in each layer. To accomplish our goal, wehave done literature survey in gathering information related to various types of attacksand solutions, as well as we have made comparative study to address the threats indifferent layers. Finally, we have identified the challenges and proposed solutions toovercome them. In our study, we have found that necessity of secure routing protocol isstill a burning question. There is no general algorithm that suits well against the mostcommonly known attacks such as wormhole, rushing attack etc. In conclusion, we focuson the findings and future works which may be interesting for the researchers like robustkey management, trust based systems, data security in different layer etc. However, inshort, we can say that the complete security solution requires the prevention, detectionand reaction mechanisms applied in MANET.Keywords: MANET, blackhole, wormhole, DoS, routing, TCP ACK storm, backoffscheme iii ContentsChapter OneIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.3 Research Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.4 Guidance to the Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.5 Our Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Chapter TwoSecurity Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62.1 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Tài liệu được xem nhiều: