Search Results (1 - 4 of 4 Results)

Sort By  
Sort Dir
 
Results per page  

Alash, Hayder Majid AbdulhameedImpact of Mobility Models on Routing Protocols for Various Traffic Classes in Mobile Ad Hoc Networks
MS, Kent State University, 2016, College of Arts and Sciences / Department of Computer Science
A Mobile ad hoc network (MANET) is a set of wireless mobile devices which are connected together without using any infrastructure. The mobility of devices in MANET continuously changes the network topology and that makes routing between devices more complicated. Examples of such networks include networks for trucks on interstate highways, remote environmental and animal-movement outposts, wireless military battlefield networks that connect troops, aircraft, satellites, and sensors on land and in water, and Interplanetary networks. Three factors significantly influence the end-to-end performance in terms of Quality of Service (QoS); (i) mobility pattern/model, (ii) underlying routing algorithm and (iii) traffic patterns. While several theoretical models exist to describe mobility, traffic pattern, and routing algorithms, developing a model to collectively incorporate mobility, routing, and traffic is intractable. In this thesis, we intend to develop simulation models that bring these three factors together and measure applications performance in terms of end-to-end throughput (bit rate), latency, and jitter. Three classes of MANET routing algorithms (Proactive, Reactive, and Hybrid), two mobility models (Random Waypoint and Group), and three classes of traffic patterns (constant bit rate, variable bit rate, and random) have been investigated. Our result shows the relationship between these parameters and determines which routing algorithm is suitable for specific mobility model and specific traffic pattern.

Committee:

Hassan Peyravi (Advisor); Feodor Dragan (Committee Member); Gokarna Sharma (Committee Member)

Subjects:

Computer Science

Keywords:

MANET, AODV, FSR, OLSR, DYMO, ZRP, Random Waypoint Mobility Models, Group Mobility Models, CBR, VBR, Random

Venkatraman, LakshmiSECURED ROUTING PROTOCOL FOR AD HOC NETWORKS
MS, University of Cincinnati, 2001, Engineering : Computer Science
In this thesis, we have analyzed the threats to the routing protocols in ad hoc wireless networks and have put forth methods to enhance secure routing. Mobile ad hoc networking is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. Due to such characteristics, these networks have much harder security requirements than the traditional, wired and static Internet. Efficient and effective routing in such networks is an especially hard task to accomplish securely, robustly and efficiently at the same time. One of the most severe threats to routing in such networks is the possibility of compromised nodes, which inflict unpredictable and undetectable Byzantine failures. The contemporary routing protocols do seem to manage the dynamically changing conditions rather well. In contrary, they offer either no security mechanisms at all, or have only partial solutions for protecting the routing. We believe that security schemes should be integrated with the routing protocols because the kinds of attacks and their solutions would differ from one protocol to another. Moreover, the imple-mentation will be optimal if it is designed for a specific protocol. We have presented a scheme for reactive routing protocols, specifically AODV, that performs the dual functions of preventing external attacks and also detecting compromised nodes. External attacks are prevented by means of authentication techniques that rely on mutual trust between nodes. We have also minimized the overhead involved in authentication. We have identified various forms of misbehaviors and have proposed solutions for certain deterministic ones. When either form of attack is detected, the system responds suitably to negate the effect of these attacks and also prevent future threats from the same nodes. Besides routing security, we have studied the issue of data authentication for hierarchical ad hoc networks and have proposed a data authentication scheme. In our scheme each cluster head acts as the certification authority for its cluster members.

Committee:

Dharma Agrawal (Advisor)

Keywords:

AODV; Authentication; Routing-table consistency; Heirararchical; Replay

Prathapani, AnooshaIntelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks
MS, University of Cincinnati, 2010, Engineering and Applied Science: Electrical Engineering

A Wireless Mesh Network (WMN) is a promising means to provide low-cost broadband Internet access. The routing protocols naively assume all nodes in the network to be non-malicious. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way for malicious attackers. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to conduct a suction attack called a “blackhole attack”. The attacker can falsify routing metric such as hop count, shorten transmission time to reach any destination and thereby suck the network traffic.

We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. They are deployed as roaming software agents that tour the network and lure attackers by sending Route Request (RREQ) advertisements. We first examine the threat of an active Blackhole attack, and then, using our intelligent Honeypot mechanism, we try to control it. We collect valuable information on attacker’s strategy from the intrusion logs gathered at the honeypot. We finally evaluate the effectiveness of proposed architecture using simulation in ns-2 for random topology and grid topology. The performance of the proposed detection approach has shown the encouraging results. The performance of the proposed detection scheme is shown to be increased by 80% for grid topology and 77% for random topology.

Committee:

Dharma Agrawal, DSc (Committee Chair); Carla Purdy, PhD (Committee Member); Wen Ben Jone, PhD (Committee Member)

Subjects:

Electrical Engineering

Keywords:

AODV; BLACKHOLE; HONEYPOTS; MALICIOUS; SPOOFED; WIRELESS MESH NETWORKS

Bhargava, SonaliGeneric and Scalable Security Schemes for Ad Hoc Networks
MS, University of Cincinnati, 2002, Engineering : Computer Science

An Ad Hoc network is a collection of wireless, mobile nodes that dynamically form a network without the use of centralized, fixed network infrastructure. Inherent characteristics of an Ad Hoc network such as dynamic topology and limited physical security poses severe security challenges to the network. Hence, these networks demand much stronger security mechanisms than the traditional, wired and static networks. Well established contemporary routing protocols seem to adapt to the dynamic conditions as well. However, they provide either no security mechanisms at all, or have only partial solutions for protecting the dynamic routing framework.

It is hard to achieve security and robustness in the routing protocols at the same time in such networks. Several issues have to be understood and addressed before devising a security mechanism. Moreover, challenges involved in addressing attacks differ from one protocol to the other. This thesis targets at securing reactive routing protocol AODV. The routing protocol is vulnerable to two kinds of attack: External and Internal attack. We have discussed some existing external attacks and possible malicious behavior from compromised nodes. To mitigate the attacks, we propose a dual level security model. On the first level, we have External Attack Detection Model(EADM), that secures the network with authentication and confidentiality that rely on mutual trust between nodes. And on the second level, Intrusion Detection Model (IDM) identifies the misbehaving nodes using the knowledge base and Response Model (RM) isolates these nodes from the network.

Committee:

Dr. Dharma P. Agrawal (Advisor)

Subjects:

Computer Science

Keywords:

Ad Hoc Networks; security; AODV; IP sec; wireless networks