SECURING MOBILE AD HOC NETWORK

SECURING MOBILE AD HOC NETWORK - SECURING MOBILE AD HOC...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
SECURING MOBILE AD HOC NETWORK ROUTING PROTOCOLS NG KENG SENG NATIONAL UNIVERSITY OF SINGAPORE 2003
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
SECURING MOBILE AD HOC NETWORK ROUTING PROTOCOLS NG KENG SENG (B.Eng.(Hons.), UNIMAS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING NATIONAL UNIVERSITY OF SINGAPORE 2003
Background image of page 2
Acknowledgements In preparing of this thesis, I have been fortunate to receive valuable assistance, suggestion, and support from my supervisor, and friends. I greatly appreciate their generosity in devoting their time to help me with this research. I would like to express my thanks to my supervisor Dr. Winston Seah Khoon Guan, who has guided me throughout my entire candidature as a Research Scholar at the Institute for Infocomm Research (I 2 R). I sincerely appreciate his enormous, innumerable pieces of advice, and insightful criticism. In addition, thanks to the National University of Singapore (NUS) for the Research Scholarship. Besides, I would also like to extend my greatest thanks to my mother, Tina Loh Yoke Ying, my sister, Sandy Ng Sim Yee, and my girlfriend, Frances Chia Foong Sin, for their caring and love. A very special thanks go to my close circle of friends, especially, Alvin, Yang Luqing, Li Feng, Wu Wei, Cheng Jing, Gao Qing, Hu Hongjie, Bijay and Luo Haihong, for their support, help and encouragement. i
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Table of Contents ACKNOWLEDGEMENTS . ......................................................................................... i TABLE OF CONTENTS . ............................................................................................ ii LIST OF FIGURES. ..................................................................................................... v LIST OF TABLES. ..................................................................................................... vii LIST OF FLOWCHARTS. ....................................................................................... viii SUMMARY . ................................................................................................................. ix CHAPTER 1 MOBILE AD HOC NETWORKS. ...................................................... 1 1.1 I NTRODUCTION ................................................................................................ 1 1.2 C HARACTERISTICS AND C HALLENGES ............................................................. 2 1.2.1 Network Origin . .......................................................................................... 4 1.2.2 Network Capabilities . ................................................................................. 5 1.2.3 Network Transiency . ................................................................................... 5 1.3 A PPLICATIONS ................................................................................................. 5 1.3.1 Military Tactical Networks . ........................................................................ 6 1.3.2 Personal Area Networks . ............................................................................ 6 1.3.3 Sensor Networks. ......................................................................................... 6 1.3.4 Collaborative Networking. .......................................................................... 7 1.3.5 Disaster Area Networks. ............................................................................. 7 1.4 M OTIVATION .................................................................................................... 8 1.5 O UR C ONTRIBUTION ........................................................................................ 9 1.6 T HESIS O RGANIZATION .................................................................................... 9 ii
Background image of page 4
CHAPTER 2 NETWORK SECURITY ISSUES . .................................................... 10 2.1 N ETWORK S ECURITY ..................................................................................... 10 2.1.1 Security Services . ...................................................................................... 10 2.1.2 Security Attacks. ........................................................................................ 11 2.1.3 Security Mechanisms . ............................................................................... 13 2.2 C RYPTOGRAPHY B ACKGROUND ..................................................................... 14 2.2.1 Symmetric Encryption. .............................................................................. 14 2.2.2 Public Key Encryption . ............................................................................. 15 2.2.3 Digital Signature. ...................................................................................... 17 2.2.4 Digital Certificate. .................................................................................... 18 2.2.5 Secret Sharing. .......................................................................................... 19 2.3 S ECURITY I SSUES IN A D HOC N ETWORKS ...................................................... 22 CHAPTER 3 SECURITY IN MOBILE AD HOC NETWORKS. ......................... 23 3.1 I NTRODUCTION .............................................................................................. 23 3.2 R ELATED W ORK ............................................................................................ 25 3.2.1 Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks . .................................................................................................. 25 3.2.2 Secure Routing for Mobile Ad hoc Networks. ........................................... 27 3.2.3 Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. 28 3.2.4 Authenticated Routing for Ad Hoc Networks. ........................................... 29 3.2.5 Secure Ad hoc On-Demand Distance Vector Routing. ............................. 30 CHAPTER 4 THE SECURE ROUTING PROTOCOL (SEROP) FOR MOBILE AD HOC NETWORKS. ..................................................................... 33 iii
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4.1 O PERATION OF CHAMP. ............................................................................... 33 4.2 T HE P ROPOSED P ROTOCOL - SEROP. ............................................................ 36 4.2.1 Assumptions . ............................................................................................. 36 4.2.2 Distribution of Key. ................................................................................... 37 4.2.3 Route Discovery Request . ......................................................................... 38 4.2.4 Route Reply . .............................................................................................. 40 4.2.5 Intermediate Node Reply. .......................................................................... 41 4.2.6 Route Maintenance & Deletion . ............................................................... 43 4.2.7 Key Revocation . ........................................................................................ 45 4.3 R EASONING L OGIC ........................................................................................ 46 4.4 A PPRAISAL OF SEROP. .................................................................................. 51 CHAPTER 5 SIMULATIONS AND RESULTS. ..................................................... 55 5.1 I NTRODUCTION .............................................................................................. 55 5.2 P ERFORMANCE E VALUATION ......................................................................... 56 5.3
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 102

SECURING MOBILE AD HOC NETWORK - SECURING MOBILE AD HOC...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online