Network securities against compromised nodes in disruption tolerant mobile ad hoc networks

In Singapore, the Singapore Armed Forces makes use of Mobile Ad Hoc Networks to communicate as it does not require an existing network infrastructure. Instead their mobile devices can communicate with each other using multi-hop wireless links. However, there are several disadvantages in MANETs; net...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Keith Zhi Wei.
Other Authors: Yow Kin Choong
Format: Final Year Project
Language:English
Published: 2009
Subjects:
Online Access:http://hdl.handle.net/10356/18902
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-18902
record_format dspace
spelling sg-ntu-dr.10356-189022023-03-03T20:25:39Z Network securities against compromised nodes in disruption tolerant mobile ad hoc networks Ng, Keith Zhi Wei. Yow Kin Choong School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks In Singapore, the Singapore Armed Forces makes use of Mobile Ad Hoc Networks to communicate as it does not require an existing network infrastructure. Instead their mobile devices can communicate with each other using multi-hop wireless links. However, there are several disadvantages in MANETs; network security being a main concern due to highly classified information exchanged in military operations. A compromised node will cause disruption to the network operations which could threaten the safety of the army. Therefore in this project we aim to propose schemes to effectively detect and prevent forwarding misbehaviors to the MANET by malicious nodes. Our research has shown that the Network Monitoring Scheme [30][3][6] is the most effective anomaly detection method to date. Using this network monitoring system, we suggest that whenever there is activity between two nodes, both will act as the ‘monitoring’ and ‘monitored’ node. Their activities will then be recorded in a monitoring table. In order to get a complete report on the monitored node, it will require the monitoring table records from all its 1-hop neighbors. The values derived from the table records are applied to intrusion detection algorithms for different attacks. A simulation test was run to detect nodes compromised by most packet dropping and flooding attacks. This report documents the studies on different attacks and solutions in MANET. We believe our analysis gained in this research can be useful in future work against multiple and more complex network attacks. Bachelor of Engineering (Computer Engineering) 2009-08-14T08:54:30Z 2009-08-14T08:54:30Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/18902 en Nanyang Technological University 55 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks
spellingShingle DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks
Ng, Keith Zhi Wei.
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
description In Singapore, the Singapore Armed Forces makes use of Mobile Ad Hoc Networks to communicate as it does not require an existing network infrastructure. Instead their mobile devices can communicate with each other using multi-hop wireless links. However, there are several disadvantages in MANETs; network security being a main concern due to highly classified information exchanged in military operations. A compromised node will cause disruption to the network operations which could threaten the safety of the army. Therefore in this project we aim to propose schemes to effectively detect and prevent forwarding misbehaviors to the MANET by malicious nodes. Our research has shown that the Network Monitoring Scheme [30][3][6] is the most effective anomaly detection method to date. Using this network monitoring system, we suggest that whenever there is activity between two nodes, both will act as the ‘monitoring’ and ‘monitored’ node. Their activities will then be recorded in a monitoring table. In order to get a complete report on the monitored node, it will require the monitoring table records from all its 1-hop neighbors. The values derived from the table records are applied to intrusion detection algorithms for different attacks. A simulation test was run to detect nodes compromised by most packet dropping and flooding attacks. This report documents the studies on different attacks and solutions in MANET. We believe our analysis gained in this research can be useful in future work against multiple and more complex network attacks.
author2 Yow Kin Choong
author_facet Yow Kin Choong
Ng, Keith Zhi Wei.
format Final Year Project
author Ng, Keith Zhi Wei.
author_sort Ng, Keith Zhi Wei.
title Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
title_short Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
title_full Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
title_fullStr Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
title_full_unstemmed Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
title_sort network securities against compromised nodes in disruption tolerant mobile ad hoc networks
publishDate 2009
url http://hdl.handle.net/10356/18902
_version_ 1759854169293848576