شماره مدرك :
6123
شماره راهنما :
5732
پديد آورنده :
شكل آبادي، الهه
عنوان :

گمنام سازي پروتكل هاي مسير يابي در شبكه هاي اقتضايي سيار به منظور مقابله با حملات تحليل ترافيك

مقطع تحصيلي :
كارشناسي ارشد
گرايش تحصيلي :
مخابرات
محل تحصيل :
اصفهان: دانشگاه صنعتي اصفهان، دانشكده برق و كامپيوتر
سال دفاع :
1390
صفحه شمار :
يازده،111ص.: مصور،جدول،نمودار
يادداشت :
ص.ع.به فارسي و انگليسي
استاد راهنما :
مهدي برنجكوب
استاد مشاور :
حسن سعيدي
توصيفگر ها :
حريم خصوصي , مسير يابي گمنام
تاريخ نمايه سازي :
8/5/90
استاد داور :
محمد دخيل عليان، پژمان خديوي
دانشكده :
مهندسي برق و كامپيوتر
كد ايرانداك :
ID5732
چكيده فارسي :
به فارسي و انگليسي: قابل رويت در نسخه ديجيتالي
چكيده انگليسي :
Defending against Traffic Analysis Attacks with the Use of Anonymous Routing Protocols Elahe Sheklabadi e sheklabadi@ec iut ac ir Date of Submission 2011 04 11 Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan 84156 83111 Iran Degree M Sc Language Persian Supervisor Mehdi Berenjkoub brnjkb@cc iut ac irAbstract In recent decade the topic of MANET privacy has been flourished Privacy is the main aim of thetraffic analysis attacks Indeed an adversary intercepts network traffic in order to infer sensitiveinformation about network traffic characteristics such as the identities of communicating parties location ofnodes data transmission rate and motion pattern of nodes in traffic analysis attacks This may lead to severethreats in security sensitive applications In the other hand privacy is considered as one of the mostimportant security features in the specific applications of MANET including military networks and searchand rescue operations Concealing the routing information from adversary and even legitimate nodes is aneffective method to resist against traffic analysis attack Although the secure routing for MANETs has beenextensively studied traffic analysis attacks are still not well addressed So providing anonymous routingprotocols i e routing protocols which include anonymity services is quite important Using these protocolsis necessary to resist against to traffic analysis attack in order to hiding some information such as the realidentity of network nodes and network topology The aim of this thesis is presenting an improved algorithmin order to defend against traffic analysis attacks To this end at the first traffic analysis attacks and theircountermeasures in MANET have been studied These have been classified base on the adversary model vulnerable security services and implementation layer The comparison of countermeasure techniquesshowed that hiding routing information is highly effective to resist against traffic analysis attacks inMANET In this thesis the main concentration has been devoted to anonymous routing in MANETs So anumber of anonymous routing protocols have been studied Moreover in this thesis ARAN protocol whichhas been known as one of the most secure routing in MANET and AODV protocol have been considered inorder to achieve an anonymous routing protocol AnonAODV protocol as an anonymous version of AODVprotocol has been proposed to improve a previous anonymous variant of it namely pseudoAODV protocol This protocol provides anonymity services in the presence of global passive adversary AnonAODVprotocol has simply confused on providing anonymity in AODV protocol while anonymous version ofARAN protocol results an anonymous secure routing protocol namely AARAN Both preserving securityfeatures of ARAN and achieving anonymity services have been considered as design policy of AARANprotocol So AARAN protocol is a secure routing protocol which also provides identity privacy stronglocation privacy and route anonymity services Keywords Mobile Ad Hoc Network Traffic Analysis Attack Anonymity Privacy AnonymousRouting
استاد راهنما :
مهدي برنجكوب
استاد مشاور :
حسن سعيدي
استاد داور :
محمد دخيل عليان، پژمان خديوي
لينک به اين مدرک :

بازگشت