1. Trang chủ
  2. » Luận Văn - Báo Cáo

ĐÁNH GIÁ VỀ AN TOÀN GIAO THỨC ĐỊNH TUYẾN TRONG MẠNG MANET LUẬN VĂN THẠC SĨ CÔNG NGHỆ THÔNG TIN

85 24 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 85
Dung lượng 1,7 MB

Nội dung

Manet Unicast  Routing Protocol Protocol in NS-2” NS-2”,, December, 2004 9.  C P Vandana and A F S Devaraj, “MLDW - A MultiLayered Detection mechanism for Wormhole attacks in AODV based MANET”, MANET” , in International Journal of Security, Privacy and Trust Management (IJSPTM) vol 2, no 3, (2013) June 10. H Deng, W Li and D P Agrawal (2002), “Routing Security in Wireless  Ad Hoc Networks”,University Networks”,University of Cincinnati, IEEE Communication Magazine, October 2002 11. The VINT Project, “The NS manual”, manual”, A Collaboration between researches at UC Berkeley, LBL, USC/ISI, and Xerox PARC, March March 14,2008 12. https://en.wikipedia.org/wiki/Open_Shortest_Path_First    80 13. Elizabeth M.Royer, C-K Toh (1999), “A review of current routing  protocol for Ad hoc Mobile Wireless Networks”, Networks”, IEEE Personal Communications, 6(2):46–55, April 1999   14. Charles E Perkins, Pravin Bhagwat, “ Highly “ Highly Dynamic DestinationSequenced Distance Vector Routing (DSDV) for Mobile Computers”, Computers” , Comp Commun Rev, Oct 1994  15. David B Johnson, David A Maltz, Josh Broch, “ DSR: “ DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad Hoc Networks”, Networks”, t Imielinski and H.Korth , Eds Kluwer, 1996 16. Jathe S.R., Dakhane D.M (2012), “A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Tech-niques”,  Tech-niques”,   International Journal of Cryptography and Security, ISSN: 2249-7013 & E-ISSN: 2249-7021, Volume 2, Issue 1, pp.-22-26 17. Kimaya Sanzgiri, Bridget Dahill, Brian N Levine, and Elizabeth M Belding-Royer, “A Secure Routing Protocol for Ad Hoc Networks” Networks” Proceedings of 10th IEEE International Conference on Network Protocols (ICNP’02), Paris, France, November 2002, pp 78-90 18. Yi-an Huang and Wenke Lee, “Attack analysis and Detection for Ad-hoc  Routing protocols” protocols” Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04), French Riviera, France September 2004  19. Mishra Amitabh, Nadkarni Ketan M., Ilyas Mohammad,  Mohammad,  “Chapter 30: Security in wireless ad-hoc networks, networks, the handbook of Ad hoc wireless network”,, CRC PRESS Publisher, 2003 network” 20. C.Siva Ram Murthy, B S Manoj, “ Ad hoc wireless networks:  Architecture and Protocols”.  Protocols”.  Prentice Hall Publishers, May 2004, ISBN 013147023X 21. William Stallings, “Network Security essentials: Application and Standards”,, Pearson Education , Inc 2003, ISBN 0130351288 Standards” 22. Preeti Sachan, Pabitra Mohan Khilar (2011), “Securing AODV routing  protocol in MANET based cryptographic authentication”, authentication”,  International  Journal of Network Security Security & Its Applications, Volume (5)   81 PHỤ LỤC Phụ lục - Kịch mô # Define options set val(chan) set val(prop) set val(netif) set val(mac) set val(ifq) set val(ll) set val(ant) set val(ifqlen) set val(nn) set val(nnaodv) set val(rp) set val(x) set val(y) set val(cstop) set val(stop) set val(cp) Connections set val(cc) Channel/WirelessChannel Channel/Wireles sChannel ;#Channel Type Propagation/TwoRayGround Propagation/Two RayGround ;# radio-propagation model Phy/WirelessPhy ;# network interface type Mac/802_11 ;# MAC type Queue/DropTail/PriQueue Queue/DropTail/ PriQueue ;# interface queue type LL ;# link layer type Antenna/OmniAntenna Antenna/OmniAnt enna ;# antenna model 150 ;# max packet in ifq 50 ;# total number of mobilenodes 49 ;# number of AODV mobilenodes AODV ;# routing protocol 1000 ;# X dimension of topography 1000 ;# Y dimension of topography 600 ;# time of connections end 600 ;# time of simulation end "…/kichban-n50-t600-1000-1000 "…/kichban-n50 -t600-1000-1000" " ;#Connection Pattern "…/cbr" ;#CBR Connections set ns_ [new Simulator] $ns_ use-newtrace set tracefd [open aodv1.tr w] $ns_ trace-all $tracefd set namtrace [open aodv1.nam w] $ns_ namtrace-all-wireless $namtrace $val(x) $val(y) # set up topography object set topo [new Topography] $topo load_flatgrid $val(x) $val(y) # Create God create-god $val(nn) # Create channel #1 and #2 set chan_1_ [new $val(chan)] set chan_2_ [new $val(chan)] set god_ [God instance] # configure node, please note the change below $ns_ node-config -adhocRouting $val(rp) \ -llType $val(ll) \ -macType $val(mac) \ -ifqType $val(ifq) \ -ifqLen $val(ifqlen) \ -antType $val(ant) \ -propType $val(prop) \ -phyType $val(netif) \ -topoInstance $topo \ -agentTrace ON \ -routerTrace ON \ -macTrace ON \ -movementTrace ON \ -channel $chan_1_ # Creating mobile AODV nodes for simulation puts "Creating nodes " for {set i 0} {$i < $val(nnaodv)} {incr i} {   82 set node_($i) [$ns_ node] $node_($i) random-motion ;#disable random motion } # Creating Black Hole nodes for simulation $ns_ node-config -adhocRouting blackholeAODV for {set i $val(nnaodv)} {$i < $val(nn)} {incr i} { set node_($i) [$ns_ node] $node_($i) random-motion ;#disable random motion $ns_ at 0.01 "$node_($i) label \"blackhole node\"" } puts "Loading random connection pattern " source $val(cp) # CBR Connections generated by cbrgen source $val(cc) # Define initial node position for {set i 0} {$i < $val(nn) } {incr i} { $ns_ initial_node_pos $node_($i) 30 } # CBR connections stops for {set i 0} {$i < } {incr i} { $ns_ at $val(cstop) "$cbr_($i) stop" } # Tell all nodes when the simulation ends for {set i 0} {$i < $val(nn) } {incr i} { $ns_ at $val(stop).000000001 "$node_($i) reset"; } # Ending nam and simulation $ns_ at $val(stop) "finish" $ns_ at $val(stop).0 "$ns_ trace-annotate \"Simulation has ended\"" $ns_ at $val(stop).00000001 "puts \"NS EXITING \" ; $ns_ halt" proc finish {} { global ns_ tracefd namtrace $ns_ flush-trace close $tracefd close $namtrace # exec nam aodv1.nam & exit } puts "Starting Simulation " $ns_ run   83 Phụ Lục – Tính tốn tham số hiệu # ============ ============================ ================= = ketqua.awk ================ ======================== ======== BEGIN { sends=0; recvs=0; droppedPackets=0; highest_packet_id=0; sum=0; recvnum=0; routing_packets=0; } { time = $3; packet_id = $41; #============= TINH TY LE PHAN PHOI GOI TIN THANH CONG ================ if (( $1 == "s") && ( $35 == "cbr" ) && ( $19=="AGT" )) { sends++; } if (( $1 == "r") && ( $35 == "cbr" ) && ( $19=="AGT" )) { recvs++; } #============= TINH DO TRE TRUNG BINH ================================= if ( start_time[pack start_time[packet_id] et_id] == ) start_time[pa start_time[packet_id] cket_id] = time; if (( $1 == "r") && ( $35 == "cbr" ) & && & ( $19=="AGT" )) { end_time[packet_ end_time[packet_id] id] = time; } else { end_time[packet end_time[packet_id] _id] = -1; } #============= TINH TONG PHI ========================================== if (($1 == "s" || $1 == "f") && $19 == "RTR" && $35 =="AODV") routing_packets++; #============= SO GOI TIN BI MAT ====================================== if (( $1 == "d" ) && ( $35 == "cbr" ) && ( $3 > )) { droppedPackets=droppedPackets+1; } #find the number of packets in the simulation if (packet_id > highest_packet_id) highest_packet_id = packet_id; } END { for ( i in end_time ) { start = start_time[i]; end = end_time[i]; packet_duration = end - start; if ( packet_duration > ) { sum += packet_duration; recvnum++; } } delay = sum/recvnum; PDR = (recvs/sends)*100; printf("So goi tin phat = %.2f\n",sends); printf("So goi tin nhan = %.2f\n",recvs); printf("Ti le phan phat cong = %.2f\n",PDR); printf("Do tre trung binh (ms)= %.2f\n",delay*1000); printf("So goi tin bi mat (packets) = %d\n",droppedPackets); printf("Tong phi = %d\n",routing_packets); } ... # Create channel #1 and #2 set chan_1_ [new $val(chan)] set chan_2_ [new $val(chan)] set god_ [God instance] # configure node, please note the change below $ns_ node-config -adhocRouting $val(rp)... essentials: Application and Standards”,, Pearson Education , Inc 2003, ISBN 0130351288 Standards” 22. Preeti Sachan, Pabitra Mohan Khilar (2011), “Securing AODV routing  protocol in MANET based cryptographic... Conference on Network Protocols (ICNP’02), Paris, France, November 2002, pp 78-90 18. Yi -an Huang and Wenke Lee, “Attack analysis and Detection for Ad-hoc  Routing protocols” protocols” Proceedings of

Ngày đăng: 08/08/2020, 10:21

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w