شماره مدرك :
4289
شماره راهنما :
4060
پديد آورنده :
فنايي، محمد
عنوان :

امنيت مسير يابي در شبكه هاي بي سيم اقتضايي

مقطع تحصيلي :
كارشناسي ارشد
گرايش تحصيلي :
مخابرات
محل تحصيل :
اصفهان : دانشگاه صنعتي اصفهان ، دانشكده برق و كامپيوتر
سال دفاع :
1387
صفحه شمار :
سيزده، 153، [II] ص. : مصور
يادداشت :
ص. ع. به: فارسي و انگليسي
استاد راهنما :
مهدي برنجكوب
استاد مشاور :
مسعود رضا هاشمي
توصيفگر ها :
پروتكل DSR , پروتكل Ariadne , پروتكل ARAN , پروتكل sead
تاريخ نمايه سازي :
23/7/1387
استاد داور :
حسين سعيدي، پزمان خديوي
دانشكده :
مهندسي برق و كامپيوتر
كد ايرانداك :
ID4060
چكيده فارسي :
به فارسي و انگليسي: قابل رويت در نسخه ديجيتال
چكيده انگليسي :
AbstractMulti hop routing can be considered as one of the basic and fundamental protocols in theestablishment of wireless ad hoc networks Several routing protocols have been proposedin order to overcome the problems imposed by node mobility frequent topology changes distributed nature and also the lack of any centralized pre established infrastructure in adhoc networks In the design of these routing protocols it has been assumed that there is asecure wireless channel in the network Moreover the trustworthy nodes are assumed tocooperate with each other in the execution of the routing protocols However theseassumptions are not completely valid in practical ad hoc networks In other words thereare some insider and outsider adversarial nodes in such networks trying to disrupt thenormal functionality of the routing protocols or not to participate in the cooperationmandated by such protocols in order to maintain their limited energy or processingresources Therefore ad hoc routing protocols are vulnerable to several types of attacks On the other hand specific ad hoc network applications are mainly in the battlefields rescue and disaster relief operations and also in such environments in which there is nowell established infrastructure like that in other wireless networks These types ofapplications impose further security threats against the functionality of the routingprotocols in ad hoc networks Due to these unique characteristics and vulnerabilities thesecurity of the routing in such networks is quite important In this thesis the mainconcentration has been devoted to routing security in ad hoc networks Having beeninvestigated different approaches in securing ad hoc network routing protocols the mainsecure routing protocols proposed for such networks have been evaluated and analyzed Furthermore the performance of important and secure ones has been optimized Particularly it has been proved that endairA one of the most secure ad hoc source routingprotocols is vulnerable to the tunneling attack in contrast to the past claims about itsprovable security Moreover a novel security mechanism has been proposed in order toprevent this attack against ad hoc routing protocols and especially against endairA Atunneling resistant version of endairA namely TRendairA has been developed based onthe novel tunneling prevention paradigm Detailed security analyses of TRendairA haveshown that it has the ability to detect and defeat all effective tunneling attack scenariosagainst endairA One of the other major contributions of this thesis is the new efficientversion of ARAN one of the most secure ad hoc distance vector routing protocols In thisversion of ARAN namely TIKARAN it has been suggested to authenticate intermediatenodes between the source and the destination using TIK broadcast authentication protocolinstead of digital signatures Since TIK is based on the efficient symmetric cryptographicfunctions its deployment in ARAN will improve the processing overhead significantly With regards to the limited processing capabilities and limited energy resources of thenodes in ad hoc networks the processing optimization in ARAN can pave the way for thewidespread and computationally efficient implementations of one of the provable securerouting protocols in ad hoc networks
استاد راهنما :
مهدي برنجكوب
استاد مشاور :
مسعود رضا هاشمي
استاد داور :
حسين سعيدي، پزمان خديوي
لينک به اين مدرک :

بازگشت