研究生: |
許鈴君 Ling-Chun Hsu |
---|---|
論文名稱: |
於無線隨意網路上抵擋封包丟棄行為之可靠資料傳輸 Reliable Data Transmission against Packet Dropping Misbehavior in Wireless Ad Hoc Networks |
指導教授: |
孫宏民
Hung-Min Sun |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 英文 |
論文頁數: | 59 |
中文關鍵詞: | 隨意網路 、封包丟棄 、丟棄攻擊 |
外文關鍵詞: | ad hoc networks, packet dropping, dropping attack |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
行動隨意網路是一群無線行動節點的集合,其中無線節點利用點對點的溝通模式以達成自我組織,不需要固定的網路基礎建設或任何集中式管理機制。因為每個節點的無線訊號傳輸範圍是有限的,每個節點必需執行繞徑以達成資料傳遞,並且必須為其他節點轉送控制與資料封包。由於動態拓撲、分散式合作及受限的能力,一個隨意網路只有在參與的節點都以正確的方式合作時,才可以很有效率的運作。換言之所有節點間的合作及正常的資料傳輸變得很重要。
在無線隨意網路中,大部份的繞徑協定假設網路上的節點都是值得信賴且樂意合作的,所以這些繞徑協定並沒有考慮路徑上的中繼節點,可能答應轉送封包,但事實上卻沒有這麼做。我們稱這種情形為資料丟棄行為。因此,整個網路上的產能都將被影響。只有等到繞徑路線因為節點的移動而重建後,此種問題才有機會改善。
因此,我們提出一個新的機制,在適度密集的隨意網路上,減輕資料丟棄攻擊的影響。每一個節點會持續的以監聽模式,監督它的鄰居節點的資料活動,而位在同一條繞徑路線的上、下游節點訊號範圍內的節點,將成為監督者。一但發現鄰居節點沒有協助其上游節點轉送資料封包,則監督者會幫忙傳送此資料封包。當幫鄰居節點重送超過一定次數後,會動態的調整繞徑路線以繞過惡意節點。因此,即使當網路有多個個別或者共謀的攻擊者存在,封包到達率一樣可以維持在一定的比例。
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that communicate peer-to-peer in a self-organized manner without fixed network infrastructure or any centralized administration. Because the transmission range of each node is limited, each node needs to perform routing in order to delivery and help the neighbor nodes to forward control packets and data packets. With dynamic topology, the distributed cooperation and the constrained capability, MANET can work effectively only if the participating nodes cooperate in a proper way. Therefore, the collaboration among all nodes and normal data transmission become very important.
Most of the routing protocols in MANET assume nodes are trustworthy and cooperative and thus do not consider that the intermediate nodes along a routing path can promise to forward packets but in fact fails to do so. We call this situation packet dropping behaviors. Therefore, the throughput of the whole network will be affected. In original no protected routing protocols, the influence may be mitigated only when the routing path is changed due to the mobility.
In view of this, we propose a novel scheme to mitigate the influence of the packet dropping in the reasonable dense MANET. Each node constantly monitors the traffic activity of its neighbor nodes in the promiscuous mode. A node which located in the signal of the upstream node and the downstream node along a routing path will be a monitor. When any neighbor drops any data packet comes from the upstream node of it, the monitor will help to retransmit the dropped data packet. After the monitor has already helped to retransmit over certain times, it dynamically adjusts the routing path to bypass a misbehavior node Therefore, even when there are many individual or colluded attackers in MANET, the data delivery rate can be hold above certain probabilities.
[1] I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, vol. 47, pp. 445-487, 2005.
[2] S. Kapp, "802.11: leaving the wire behind," Internet Computing, IEEE, vol. 6, pp. 82-85, Feb. 2002.
[3] J. C. Haartsen, "The Bluetooth radio system," Personal Communications, IEEE [see also IEEE Wireless Communications], vol. 7, pp. 28-36, Feb. 2000.
[4] S. Corson and J. Macker, "Mobile Ad hoc Networking (MANET):Routing Protocol Performance Issues and Evaluation Considerations," Available from http://www.ietf.org/rfc/rfc2501.txt, Jan. 1999.
[5] C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of the IEEE workshop on Mobile Computing Systems and Applications (WMCSA '99), Feb. 1999, pp. 90-100.
[6] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," in Mobile Computing. vol. 353, T. Imielinski and H. Korth, Eds.: Kluwer Academic Publishers, 1996.
[7] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, "Optimized link state routing protocol for ad hoc networks," in Proceedings. of IEEE International Multi Topic Conference (INMIC,2001) Technology for the 21st Century, 2001, pp. 62-68.
[8] S. R. Das, R. Castaneda, Y. Jiangtao, and R. Sengupta, "Comparative performance evaluation of routing protocols for mobile, ad hoc networks," in IEEE Proceedings. of the 7th International Conference on Computer Communications and Networks (ICCCN), Lafayette, LA, USA, Oct. 1998, pp. 153-161.
[9] B. Josh, A. M. David, B. J. David, H. Yih-Chun, and J. Jorjeta, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking Dallas, Texas, United States: ACM Press, Oct.1998, pp. 85-97.
[10] S. R. Chaudhry, A. N. Al-Khwildi, Y. K. Casey, H. Aldelou, and H. S. Al-Raweshidy, "WiMob Proactive and Reactive Routing Protocol Simulation Comparison," in IEEE Information and Communication Technologies( ICTTA '06. 2nd), April 2006, pp. 2730-2735.
[11] S. J. Lee, M. Gerla, and C. K. Toh, "A simulation study of table-driven and on-demand routing protocols for mobile ad hoc networks," Network, IEEE, vol. 13, pp. 48-54, Jul/Aug 1999.
[12] E. P. Charles and B. Pravin, "Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers," SIGCOMM Comput. Commun. Rev., vol. 24, pp. 234-244, 1994.
[13] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, "Optimized link state routing protocol for ad hoc networks," in IEEE International Proceedings of Multi Topic Conference. IEEE INMIC 2001. Technology for the 21st Century, 2001, pp. 62-68.
[14] Y. H. Wang, C. M. Chuang, and C. C. Chuang, "On-demand ad hoc routing protocol with backup node," in IEEE TENCON '02. Proceedings. Region 10 Conference on Computers, Communications, Control and Power Engineering, Oct. 2002, pp. 1069-1072.
[15] D. O. Jorg, "Performance Comparison Of MANET Routing Protocols In Different Network Sizes," Computer Networks and Distributed Systems (RVS), 2003.
[16] C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance comparison of two on-demand routing protocols for ad hoc networks," Personal Communications, IEEE [see also IEEE Wireless Communications], vol. 8, pp. 16-28, Feb. 2001.
[17] V. D. Park and M. S. Corson, "A highly adaptive distributed routing algorithm for mobile wireless networks," in IEEE Proceedings, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '97), 1997, pp. 1405-1413 vol.3.
[18] Z. J. Haas, M. R. Pearlman, and P. Samar, "The Zone Routing Protocol (ZRP) for Ad Hoc Networks," Internet Draft, <draft-ietf-manet-zone-zrp-04.txt>, Available from: http://tools.ietf.org/id/draft-ietf-manet-zone-zrp-04.txt, July 2002.
[19] Y. B. Ko and N. H. Vaidya, "Location‐Aided Routing (LAR) in mobile ad hoc networks " in Wireless Networks. vol. 6: Springer Netherlands, Sep. 2000.
[20] B. Stefano, C. Imrich, R. S. Violet, and A. W. Barry, "A distance routing effect algorithm for mobility (DREAM)," in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking Dallas, Texas, United States: ACM Press, 1998.
[21] S. Suresh, W. Mike, and C. S. Raghavendra, "Power-aware routing in mobile ad hoc networks," in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking Dallas, Texas, United States: ACM Press, 1998.
[22] Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," Security & Privacy Magazine, IEEE, vol. 2, pp. 28-39, May-June 2004.
[23] P. Ning and K. Sun, "How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols," in IEEE Proceedings, Information Assurance Workshop on Systems, Man and Cybernetics Society, June 2003, pp. 60-67.
[24] D. Djenouri, L. Khelladi, and A. N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," Communications Surveys & Tutorials, IEEE, vol. 7, pp. 2-28, Fourth Quarter 2005.
[25] F. M. Anjum, "TCP Algorithms and Multiple Paths: Considerations for the Future of the Internet " in Information Systems Frontiers, Springer Netherlands ed. vol. 6, March 2004, pp. 91-104.
[26] R. Rao and G. Kesidis, "Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited," in IEEE Global Telecommunications Conference (GLOBECOM), Dec. 2003, pp. 2957-2961 vol.5.
[27] F. Anjum and R. Talpade, "LiPaD: lightweight packet drop detection for ad hoc networks," in IEEE 60th Vehicular Technology Conference(VTC2004-Fall), Sept. 2004, pp. 1233-1237 Vol. 2.
[28] D. Djenouri and N. Badache, "New approach for selfish nodes detection in mobile ad hoc networks," in Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks Sept. 2005, pp. 288-294.
[29] M. Sergio, T. J. Giuli, L. Kevin, and B. Mary, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th annual international conference on Mobile computing and networking Boston, Massachusetts, United States: ACM Press, August 2000, pp. 255-265.
[30] A. Baruch, H. David, N.-R. Cristina, and R. Herbert, "An on-demand secure routing protocol resilient to byzantine failures," in Proceedings of the 3rd ACM workshop on Wireless security, Atlanta, GA, USA, 2002, pp. 21 - 30.
[31] Z. Lidong and Z. J. Haas, "Securing ad hoc networks," Network, IEEE, vol. 13, pp. 24-30, Nov/Dec 1999.
[32] V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, "Cooperation in wireless ad hoc networks," in IEEE INFORCOM '03 San Francisco, California, USA, April 2003.
[33] L. Buttyan and J.-P. Hubaux, "Nuglets: a Virtual Currency to Stimulate Cooperationin Self-Organized Mobile Ad Hoc Networks," Swiss Federal Institute of Technology, Lausanne,Switzerland Jan. 2001.
[34] L. Butty and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," ACM Mobile Networks and Applications (MONET), vol. 8, pp. 579-592, Oct. 2003.
[35] M. Pietro and M. Refik, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security: Kluwer, B.V., 2002.
[36] B. Sonja and B. Jean-Yves Le, "Performance analysis of the CONFIDANT protocol," in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking \& computing Lausanne, Switzerland: ACM Press, 2002.
[37] S. Buchegger and J.-Y. L. Boudec, "A Robust Reputation System for P2P and Mobile Ad-hoc Networks," in 2nd Workshop on the Economics of Peer-to-Peer Systems, June 2004.
[38] Y. Hao, X. Meng, and S. Lu, "Self-organized network-layer security in mobile ad hoc networks," in Proceedings of the 3rd ACM workshop on Wireless security Atlanta, GA, USA, Sept. 2002, pp. 11-20.
[39] P. Panagiotis and J. H. Zygmunt, "Secure data transmission in mobile ad hoc networks," in Proceedings of the 2003 ACM workshop on Wireless security San Diego, CA, USA: ACM Press, 2003, pp. 41-50.
[40] Z. Li and J. G. Delgado-Frias, "Multipath Routing Based Secure Data Transmission in Ad Hoc Networks," in IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2006), June 2006, pp. 17-23.
[41] M. S. Gast, 802.11 Wireless Networks: The Definitive Guide, First ed.: O'REILLY, April 2002.
[42] K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC. Available from http://www-mash.cs.berkeley.edu/ns/, July 1999.
[43] C. Kelley and T. Williams, "Gnuplot homepage," Available from http://www.gnuplot.info/, 1986.
[44] Z. Wu, "Network Simulator 2 for Wireless : My Experience," Available from http://www.winlab.rutgers.edu/~zhibinwu/html/network_simulator_2.html, April 2007.
[45] Doxygen(文件產生器), "NS2.26SourcesOriginal-An ns-2 Documentation generated by Doxygen.," Avaiable from http://rp.lip6.fr/ns-doc/ns226-doc/html/classes.htm April 2004.
[46] 柯志亨, "NS2教學手冊 ( NS2 Learning Guide)," Available from http://hpds.ee.ncku.edu.tw/~smallko/ns2/ns2.htm, June 2004.
[47] 中央研究院計算中心-ASPAC計劃, "GNUPLOT User Guide," Available from http://phi.sinica.edu.tw/aspac/reports/94/94002/, May 1994.