教育論文網

Localization and Isolation of Corrupted Nodes Using Trust-Based Routing Mechanism

碩士博士畢業論文站內搜索    
分類:教育論文網→工業技術論文→無線電電子學、電信技術論文通信論文通信網論文一般性問題論文網絡安全論文
Localization and Isolation of Corrupted Nodes Using Trust-Based Routing Mechanism
論文目錄
 
DEDICATION第1-6頁
ABSTRACT第6-7頁
摘要第7-8頁
TABLE OF CONTENTS第8-11頁
LIST OF FIGURES第11-13頁
LIST OF TABLES第13-14頁
CHAPTER 1 INTRODUCTION第14-16頁
  1.1 Background of the study第14-15頁
  1.2 Motivation第15頁
  1.3 Thesis Contribution第15頁
  1.4 Thesis Organization第15-16頁
CHAPTER 2 BACKGROUND AND LITERATURE REVIEW第16-50頁
  2.1 Presentation of Ad hoc Networks第16-17頁
  2.2 Routing Protocols in MANETs第17頁
  2.3 Security Challenges and Purpose in MANETs第17-19頁
    2.3.1 Security Challenges in Ad Hoc Networks第17-18頁
    2.3.2 Security Purpose for Ad hoc Network第18-19頁
  2.4 Routing Attacks and Security in MANET第19-26頁
    2.4.1 Routing Attacks in MANET第19-25頁
    2.4.2 Routing Security in MANET第25-26頁
  2.5 Routing Security Mechanisms第26-33頁
    2.5.1 Secure AODV第26頁
    2.5.2 Secure Routing Protocol for Ad Hoc Networks(Aran)第26-28頁
    2.5.3 Secure Efficient Ad hoc Distance Vector(Sead)第28頁
    2.5.4 Ariadne第28-29頁
    2.5.5 SORP第29-30頁
    2.5.6 Security Aware Routing(Sar)第30-31頁
    2.5.7 Secure Routing Protocol(Srp)第31-32頁
    2.5.8 TIARA第32-33頁
  2.6 Description of Concept of Trust第33-43頁
    2.6.1 The Concept of Trust第33頁
    2.6.2 The Properties of Trust第33-35頁
    2.6.3 Presentation of the Current System第35-42頁
    2.6.4 Blacklists Exchange using SSL第42-43頁
  2.7 Intrusion Detection System第43-44頁
  2.8 Literature Review第44-49頁
  2.9 Summary第49-50頁
CHAPTER 3 THE LOCALISATION AND ISOLATION SCHEME USING TRUST-BASED ROUTING MECHANISM第50-63頁
  3.1 Problem Statement第50頁
    3.1.1 The route management第50頁
    3.1.2 The trust management第50頁
    3.1.3 The resource management第50頁
  3.2 Example of Problematic Scenarios第50-56頁
    3.2.1 Problem of Packet Dropping attacks or Black hole Attack第50-52頁
    3.2.2 Problem of Security without Tolerance: example of Routing Loop第52-56頁
  3.3 Proposed Schemes第56-60頁
    3.3.1 Trust Modeling Based on Routing Mechanism第56-58頁
    3.3.2 The Algorithm for Detecting a Packet Dropping Attack and Managing the Security第58-59頁
    3.3.3 The Algorithm for Detecting a Routing Loop Attack and Managing the Security第59-60頁
  3.4 Blacklists exchange using SSH第60-63頁
CHAPTER 4 EXPERIMENTAL RESULTS AND ANALYSIS第63-66頁
  4.1 Simulation and Parameters第63頁
  4.2 Simulation results第63-66頁
    4.2.1 Number of sources vs.packets dropped第63-64頁
    4.2.2 Number of source nodes Vs number of malicious nodes detected第64-65頁
    4.2.3 Number of sources vs. packets delivery fraction(PDF)第65-66頁
CHAPTER 5 CONCLUSION AND FUTURE WORK第66-67頁
  5.1 Conclusion第66頁
    5.1.1 Achievements第66頁
    5.1.2 Limitations第66頁
  5.2 Future Work第66-67頁
REFERENCES第67-71頁
ACKNOWLEDGEMENTS第71-72頁
APPENDIX A TCL CODE第72-76頁
APPENDIX B SOME PRINT SCREENS第76-78頁

本篇論文共78頁,點擊這進入下載頁面
 
更多相關論文
Localization and Isolation of Co
The Distance-Aware Power Control
Peak-to-Average Power Ratio Redu
Implicit Authentication on Mobil
Automated Risk Management Framew
Realization of Image Encryption
Evaluating the Human Factor in I
Optimized Healthcare Decision Su
Context and Role Based Dynamic A
Graph Based Algorithms for Topol
An Assessment on the Performance
Lustering Technigues for Data Ma
Research on Ant Intelligence Rou
Ddo-ofmd with Ct Coding to Impro
Research and Design on Web Servi
Digital Media Strategies:Online
Design and Implementation of Int
Image Stitching Using Modified S
Research on Vehicle Detection An
Vehicle License Plate Recognitio
Resilient Hypervisor Based Proac
Feature Extraction Based Image R
The Naked Truth-Perspectives on
Urban Place and Media Space
Several Distributed Consensus Pr
欄 目 導 航
 
 
無線Ad hoc網絡 路由機制 網絡安全 容錯 信任模型
版權申明:目錄由用戶ananjing36**提供,www.yhqmct.live僅收錄目錄,作者需要刪除這篇論文目錄請點擊這里
| 設為首頁||加入收藏||站內搜索引擎||站點地圖||在線購卡|
版權所有 教育論文網 Copyright(C) All Rights Reserved
吉林快3走势图下载安装