Title page for 92522067

[Back to Results | New Search]

Student Number 92522067
Author Jin-Hwa Shiu(\)
Author's Email Address alva@wmlab.csie.ncu.edu.tw
Statistics This thesis had been viewed 2699 times. Download 1135 times.
Department Computer Science and Information Engineering
Year 2005
Semester 1
Degree Master
Type of Document Master's Thesis
Language English
Title Secure Agent Guided Routing Protocol (SAGRP) for Heterogeneous Wireless Network (MANET & WMANs)
Date of Defense 2005-11-23
Page Count 59
  • agent guided
  • heterogeneous network
  • routing protocol
  • security
  • Abstract A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with 802.16 networks, via a well established 802.16 security architecture for ad hoc network security managements, can improve communication and security in ad hoc networks. This research proposes WMANs Guided Mobile Ad Hoc Network (WGMA) architecture, in which a WGMA agent in the WMANs provides key management, distribution and route decision. A Secure Agent Guided Routing Protocol (SAGRP) is proposed. The routing and security information is exchanged between the nodes and the agent through SS. Using the AK for each node and the TEK for each service flow, can do node to node authentication and can prevent attacks using modification, impersonation and fabrication. Simulation results show that the ad hoc network performance can be greatly improved with the higher throughput and lesser delay and routing load than AODV.
    1-1.  BackgroundKKKKKKKKKKKKKKKKKKK 1
    1-2.  Motivation and challengeKKKKKKKKKKKK 3
    1-4.  Organization of thesisKKKKKKKKKKKKK 8
    Chapter2. Related WorksKKKKKKKKKKKKKKKK 9
    2-1.  Security in WMANs(802.16)KKKKKKKKKKK 9
    2-1-1. Security sublayerKKKKKKKKKKKKKKK 9
    2-1-2. ArchitectureKKKKKKKKKKKKKKKKK 10
    2-1-2-1. Packet Data Encryption KKKKKKKKKKK10
    2-1-2-2. Key Management Protocol KKKKKKKKKK 10
    2-2.  Security in Ad Hoc NetworksKKKKKKKKKK 12
    2-2-1. Characteristics of Ad Hoc Networks KKKKKK12
    2-2-2. Security attributesK KKKKKKKKKKKK 14
    2-2-3. Attacks on Ad Hoc NetworksKKKKKKKKKK 15
    2-2-4. Secure Routing Protocols KKKKKKKKKKK17
    2-2-4-5. Secure Routing Protocols for
         integrated internet and MANETKKKKKKKK 23
    Chapter3. Secure Agent Guided Routing Protocol (SAGRP) 26
    3-1.  WGMA DescriptionKKKKKKKKKKKKKKKK27
    3-2.  Security Requirements of SAGRPKKKKKKKKK27
    3-3.  Overview of SAGRPKKKKKKKKKKKKKKK 28
    3-3-1. RegistrationKKKKKKKKKKKKKKKKK 28
    3-3-2. Routing Algorithm DescriptionKKKKKKKKK33
    3-3-3. Data TransmissionKKKKKKKKKKKKKKK35
    3-3-4. Neighbor Set UpdateKKKKKKKKKKKKKK35
    Chapter4. Performance EvaluationKKKKKKKKKKK 36
    4-1.  Simulation ModelKKKKKKKKKKKKKKKK36
    4-2.  Performance EvaluationKKKKKKKKKKKKK36
    4-3.  Security AnalysisKKKKKKKKKKKKKKK 50
    Chapter5. Concolusions and Future WorksKKKKKKKK52
    Reference [1] Hongmei Deng, Wei Li, and Dharma P. Agrawal, Routing Security in Wireless Ad Hoc Networks Proceedings of IEEE Communications Magazine. October 2002.
    [2] Xinjun Du Ying Wang Jianhua Ge Yumin Wang, A Method for Security Enhancements in AODV Protocol, Proceedings of International Conference on Advanced Information Networking and Applications (AINA03).
    [3] Animesh Patcha and Amitabh Mishra, Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, Proceedings of RAWCON 03, pp.75-78, 2003.
    [4] Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko Milutinovic, Routing and Security in Mobile Ad Hoc Networks, Proceedings of IEEE journal Volume 37, Issue 2, Feb 2004 Page(s):61 V 65, 2004.
    [5] Tzu-Chiang Chiang and Yueh-Min Huang, Group Keys and the Multicast Security in Ad Hoc Networks, Proceedings of 2003 International Conference on 6-9, Page(s):385 V 390, Oct. 2003.
    [6] Themistoklis Haniotakis Spyros Tragoudas Constantinos Kalapodas, Security Enhancement through Multiple Path Transmission in Ad Hoc Networks, Proceedings of Communications, 2004 IEEE International Conference on Volume 7, Page(s):4187 - 4191 Vol.7, 20-24 June 2004.
    [7] Wenjing Lou, Wei Liu, Yuguang Fang, SPREAD: Improving Network Security by Multipath Routing, Proceedings of Military Communications Conference, 2003. MILCOM 2003. IEEE Volume 2, 13-16, Page(s):808 - 813 Vol.2, Oct. 2003.
    [8] Weichao Wang, Yi Lu, Bharat Bhargava, On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks, Proceedings of Pervasive Computing and Communications, 2003. (PerCom 2003). Proceedings of the First IEEE International Conference on 23-26, Page(s):179 V 186, March 2003.
    [9] Bechler, M.; Hof, H.-J.; Kraft, D.; Pahlke, F.; Wolf, L; A Cluster-Based Security Architecture for Ad Hoc Networks, Proceedings of INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies Volume 4, 7-11, Page(s):2393 - 2403 vol.4, March 2004.
    [10] Hao Yang; Haiyun Luo; Fan Ye; Songwu Lu; Lixia Zhang; Security in Mobile Ad Hoc Networks: Challenges and Solutions, Proceedings of Wireless Communications, IEEE [see also IEEE Personal Communications] Volume 11, Issue 1, Page(s):38 V 47, Feb 2004.
    [11] Kimaya Sanzgiri, Daniel LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer, Authenticated Routing for Ad Hoc Networks, Proceedings of IEEE journal on selected areas in communications, Volume 23, No. 3, March 2005.
    [12] Manel Guerrero Zapata, Secure Ad hoc On-Demand Distance Vector Routing, Proceedings of Mobile Computing and Communications Review, Volume 6, Number 3, July 2002.
    [13] Bharat Bhargava, Xiaoxin Wu, Yi Lu, and Weichao Wang, Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA), Proceeds of ACM Mobile Network and Applications, 2004.
    [14] Bin Xie and Anup Kumar,University of Louisvillem KY, A Framework for Integrated Internet and Ad hoc Network Security, Proceedings of Computers and Communications, 2004. Proceedings of ISCC 2004. Ninth International Symposium on Volume 1, 28, Page(s):318 - 324 Vol.1, June-1 July 2004.
    [15] Samba Sesay, Zongkai Yang, Biao Qi and Jianhua He, Simulation Comparison of Four Wireless Ad hoc Routing Protocols, Proceedings of
    Information Technology Journal 3 (3): 219-226, 2004.
    [16]Performance evaluation of ad hoc routing protocols using ns2 simulations, URL: http://www.cs.utk.edu/~gupta/Adhoc.doc.
    [17] YihChun Hu , Adrian Perrig , David B. Johnson, Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks, Proceedings of
    MobiCom02, WMCSA '02.
    [18] Johnston, D.; Walker, J.; Overview of IEEE 802.16 security, Proceedings of Security & Privacy Magazine, IEEE Volume 02, Issue 3, Page(s):40 V 48, May-June 2004.
    [19] IEEE 802.16-2001, IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Fixed Broadband Wireless Access Systems, Apr. 8, 2002.

    [20] IEEE P802.16a/D3-2001: Draft Amendment to IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Fixed Wireless Access Systems - Medium Access Control Modifications and Additional Physical Layers Specifications for 2V11 GHz, Mar. 25, 2002.
    [21] Mattias Halvardsson, Patrik Lindberg, Reliable group communication in a military Mobile Ad Hoc Network, URL: http://www.vxu.se/msi/forskn/exarb/2004/04006.pdf, Feb, 2004.
    [22]Claes Gahlin, Secure Ad Hoc Networking, URL: http://citeseer.ist.psu.edu/gahlin04secure.html, March, 2004.
    [23] Derrick D. Boom, Denial of Service Vulnerabilities IEEE 802.16 Wireless Networks, URL: http://www.stormingmedia.us/23/2390/A239034.html, Oct, 2004.
    [24]Panagiotis Papadimitratos and Zygmunt J. Haas, "Secure Routing for Mobile Ad hoc Networks", Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002
    [25] Frank Kargl, Alfred Geiß, Stefan Schlott, Michael Weber, "Secure Dynamic Source Routing", Proceedings of the 38th Hawaii International Conference on System Sciences - 2005
    [26] The Institute of Electrical and Electronics Engineers. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std 802.16-2004. IEEE, 2004.
    [27] The Institute of Electrical and Electronics Engineers. IEEE Standard for Local and Metropolitan Area Networks Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1999.
    [28]M. Hietalahti., Key establishment in ad-hoc networks., Web site at www.camars.kaist.ac.kr/hyoon/courses/cs710 2002-fall/2002cas/security/
    [29] N. Asokan and P. Ginzboorg, Key agreement in ad-hoc network., Web site at www.cs.umd.edu/ sengcy/classes/ 818y.
    [30] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks, Proceedings of IEEE International Conference on Network Protocols, 2001.
    [31] J.-P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in
    mobile ad hoc networks, Proceedings of MOBIHOC 2001, pages
    146VV155, 2001.
  • Eric Hsiao-Kuang Wu(d)
  • Files
  • 92522067.pdf
  • approve immediately
    Date of Submission 2005-12-10

    [Back to Results | New Search]

    Browse | Search All Available ETDs

    If you have dissertation-related questions, please contact with the NCU library extension service section.
    Our service phone is (03)422-7151 Ext. 57407,E-mail is also welcomed.