performance assessment of secure manet routing protocols in malicious environment

上传人:小** 文档编号:89348343 上传时间:2019-05-23 格式:DOC 页数:79 大小:1.75MB
返回 下载 相关 举报
performance assessment of secure manet routing protocols in malicious environment_第1页
第1页 / 共79页
performance assessment of secure manet routing protocols in malicious environment_第2页
第2页 / 共79页
performance assessment of secure manet routing protocols in malicious environment_第3页
第3页 / 共79页
performance assessment of secure manet routing protocols in malicious environment_第4页
第4页 / 共79页
performance assessment of secure manet routing protocols in malicious environment_第5页
第5页 / 共79页
点击查看更多>>
资源描述

《performance assessment of secure manet routing protocols in malicious environment》由会员分享,可在线阅读,更多相关《performance assessment of secure manet routing protocols in malicious environment(79页珍藏版)》请在金锄头文库上搜索。

1、PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentOctober 2011University Id : 10532Student Id: LY2009017Security Level : NormalHUNAN UNIVERSITYPerformance assessment of secure MANET routingprotocols in malicious environmentMASTERS THESISByFoday Konko KamaraCollegeMajorResearch

2、 FieldSupervisor: Information Science and Engineering: Computer Applications: Computer Networking: Professor Wang DongSubmission DateDefense Date:15th October 201128th October 2011Defense committee Chairman: Professor LiaoHunan University二Octor 2011PerformanceassessmentofSecureMANETroutingprotocolsi

3、naMaliciousEnvironmentPerformance assessment of secure MANET routingprotocols in malicious environmentByFoday Konko KamaraDiploma in Computer Hardware Engineering (Africa InformationTechnology Holdings Limited, Freetown Sierra Leone) 2008A Thesis Submitted in partial fulfillment of theRequirements f

4、or the Degree ofMaster of EngineeringinComputer Science and TechnologyInThe graduate SchoolofHunan University Changsha ChinaSupervisorProfessor Wang DongOctober 2011Copyright 2011, Foday Konko KamaraHunan University三Octor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentH

5、unan University四Octor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentHUNAN UNIVERSITYDECLARATIONI, Foday Konko Kamara hereby declare that the work presented in this Masters thesistitled “Performance assessment of secure MANET routing protocols in maliciousenvironment” i

6、s my original work and has not been presented elsewhere for anyacademic qualification. Where references have been used from books, publishedpapers, reports and websites, it is fully acknowledged in accordance with the standardreferencing practices of the discipline.Students signature:Date:Copyright

7、StatementPermission is herewith granted to Hunan University to circulate and reproduce fornon-commercial purposes, at its discretion, this thesis upon the request of individualsor institutions. The author does not reserve other publication rights and the thesis norextensive extracts from it be print

8、ed or otherwise reproduce without the authorswritten permissionThis thesis belongs to:1. Secure, and this power of attorney is valid after2. Not secure(Please mark the above corresponding check box with“”)Authors Signature:Supervisors Signature:Date:Date:Hunan UniversityIOctor 2011Performanceassessm

9、entofSecureMANETroutingprotocolsinaMaliciousEnvironmentDEDICATIONI dedicate this thesis to my family for the love and courage they have shown to methroughout this time.Hunan UniversityIIOctor 2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentAbstractMobile Ad-hoc Network (

10、MANET), by virtue of their flexibility and independence ofnetwork infrastructures like base stations and unique characteristics such as dynamicnetwork topology, limited bandwidth and limited battery power, routing in thisnetwork is a particularly challenging task as compared to a conventional networ

11、k. InMANET, routing is severely vulnerable to various kinds of routing attacks viz-a-viz:black hole attack, link with holding attack, link spoofing attack, replay attack,wormhole attack and colluding mis-relay attack. All of these attacks influence thenormal operations of MANET in different ways. With the dynamic network topologyin MANET, routing functions are carried out by available nodes since there are fixedbase stations. In such routing environment, each node acts both as a

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 商业/管理/HR > 管理学资料

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号