Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
In Singapore, the Singapore Armed Forces makes use of Mobile Ad Hoc Networks to communicate as it does not require an existing network infrastructure. Instead their mobile devices can communicate with each other using multi-hop wireless links. However, there are several disadvantages in MANETs; net...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/18902 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-18902 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-189022023-03-03T20:25:39Z Network securities against compromised nodes in disruption tolerant mobile ad hoc networks Ng, Keith Zhi Wei. Yow Kin Choong School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks In Singapore, the Singapore Armed Forces makes use of Mobile Ad Hoc Networks to communicate as it does not require an existing network infrastructure. Instead their mobile devices can communicate with each other using multi-hop wireless links. However, there are several disadvantages in MANETs; network security being a main concern due to highly classified information exchanged in military operations. A compromised node will cause disruption to the network operations which could threaten the safety of the army. Therefore in this project we aim to propose schemes to effectively detect and prevent forwarding misbehaviors to the MANET by malicious nodes. Our research has shown that the Network Monitoring Scheme [30][3][6] is the most effective anomaly detection method to date. Using this network monitoring system, we suggest that whenever there is activity between two nodes, both will act as the ‘monitoring’ and ‘monitored’ node. Their activities will then be recorded in a monitoring table. In order to get a complete report on the monitored node, it will require the monitoring table records from all its 1-hop neighbors. The values derived from the table records are applied to intrusion detection algorithms for different attacks. A simulation test was run to detect nodes compromised by most packet dropping and flooding attacks. This report documents the studies on different attacks and solutions in MANET. We believe our analysis gained in this research can be useful in future work against multiple and more complex network attacks. Bachelor of Engineering (Computer Engineering) 2009-08-14T08:54:30Z 2009-08-14T08:54:30Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/18902 en Nanyang Technological University 55 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Ng, Keith Zhi Wei. Network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
description |
In Singapore, the Singapore Armed Forces makes use of Mobile Ad Hoc Networks to communicate as it does not require an existing network infrastructure. Instead their mobile devices can communicate with each other using multi-hop wireless links. However, there are several disadvantages in MANETs; network security being a main concern due to highly classified information exchanged in military operations. A compromised node will cause disruption to the network operations which could threaten the safety of the army. Therefore in this project we aim to propose schemes to effectively detect and prevent forwarding misbehaviors to the MANET by malicious nodes. Our research has shown that the Network Monitoring Scheme [30][3][6] is the most effective anomaly detection method to date. Using this network monitoring system, we suggest that whenever there is activity between two nodes, both will act as the ‘monitoring’ and ‘monitored’ node. Their activities will then be recorded in a monitoring table. In order to get a complete report on the monitored node, it will require the monitoring table records from all its 1-hop neighbors. The values derived from the table records are applied to intrusion detection algorithms for different attacks. A simulation test was run to detect nodes compromised by most packet dropping and flooding attacks. This report documents the studies on different attacks and solutions in MANET. We believe our analysis gained in this research can be useful in future work against multiple and more complex network attacks. |
author2 |
Yow Kin Choong |
author_facet |
Yow Kin Choong Ng, Keith Zhi Wei. |
format |
Final Year Project |
author |
Ng, Keith Zhi Wei. |
author_sort |
Ng, Keith Zhi Wei. |
title |
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
title_short |
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
title_full |
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
title_fullStr |
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
title_full_unstemmed |
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
title_sort |
network securities against compromised nodes in disruption tolerant mobile ad hoc networks |
publishDate |
2009 |
url |
http://hdl.handle.net/10356/18902 |
_version_ |
1759854169293848576 |