Dissertation > Excellent graduate degree dissertation topics show

The Analysis and Improvement of AODV Routing Protocol Base on the Trust Mechanism

Author: ZhangYin
Tutor: LinSui
School: Guangdong University of Technology
Course: Applied Computer Technology
Keywords: Wireless Ad Hoc Networks trust mechanism AODV reputation
CLC: TN929.5
Type: Master's thesis
Year: 2012
Downloads: 75
Quote: 0
Read: Download Dissertation

Abstract


The Wireless Ad Hoc network, it does not rely on fixed infrastructure. It is a self-organizing wireless network. We can build network fast, and free from the restrictions of time and space. The characteristics of Wireless Ad Hoc Networks are with wireless transmission, highly dynamic topology, no center, multiple routes, the most widely used on-demand routing protocol is AODV routing protocol, The characteristics of this protocol are that it is based on the shortest route to choose the path, and attaches great importance to the network throughput and network quality of service.The AODV protocol based on the shortest route to choose the path is actually unsafe, there are many scholars in the research, the most trusted next hop routing to ensure the security of routing so as to bring the neighbors surveillance system or the reputation management system.In the neighbors monitoring system there are many advantages, it can monitor the behavior of the neighbors, directly provide the value of their neighbor’s reputation, to a certain extent, detect selfish nodes and malicious nodes. But it also has some limitations, it is only suitable for a small local range;The reputation management system, which applies to the entire wireless self-organizing network by updating the trust value of each node in the management network to detect malicious nodes and selfish nodes, effectively prevent the black hole attack.But the credibility of the source of the reputation management system, and how to calculate the update is a problem, if we can provide a trusted source and basis from the surveillance by neighbors to the credibility of the system, combine them,then to some extent the shortcomings could be compensated.Therefore, This article designs a solution which is combined with existing security solutions that is a routing solution based on the credibility of the value and mutual consultation the security of the trust mechanism. The trust model provides a mechanism to establish a trust relationship between the node and its neighbors, it is mainly divided into two functional modules:the neighbor monitoring system and the reputation management system.The Neighbor monitoring system is used to determine the credibility value of the trust and direct observation of neighbors; From using the reputation system to integrate the nodes’ value of directing observation and neighbor nodes’ recommended reputation value, then we can calculate the ultimate credibility of the neighbor nodes. Because the credibility of information is spreading between the neighbor in the route selection process, the credibility of the value and number of hops as a routing metric based on, resulting in improved network availability and security. From the the simulation of Chapter IV, we can see the design of secure routing in this article has some advantages compared with the traditional AODV routing protocol in the packet loss rate, throughput, packet data transfer success rate, but the routing overhead is more. This is because the route of the security is the expense of routing overhead to increase network security, and how to reduce the routing overhead remains to be did further research.

Related Dissertations

  1. Research of Multicast Protocol in Wireless Sensor Networks,TN929.5
  2. Research and Improvement of WSNs Routing Algorithm Based on Geographic Location,TN929.5
  3. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  4. Research for Ad Hoc Routing Protocol Energy Aware and Performance Analysis of Node Deployment Strategy,TN929.5
  5. Evaluation of the credibility of the C2C network shops,F203;F224
  6. Research on Supply Chain Partners Trust Mechanism Establishment and Security,F224
  7. Study on Routing Protocols in Mobile Ad Hoc,TN929.5
  8. Reaserch on the Trust Mechanism Based on P2P Network,TP393.08
  9. Design and Simulation of Dynamic Reputation Evaluation Model in Hierarchical Ad Hoc Networks,TN929.5
  10. Thinking of the Establishment of a Cross-strait Military Mutual Trust Mechanism,E289.58
  11. Research of Security Key Technology in Telecom’s Cloud Computing Platform,TP393.08
  12. Research and Implement of Trust Mechanism in P2P Networks Based on Reputation,TP393.08
  13. RSSI-based indoor positioning wireless self-organizing network algorithm research and implementation,TN929.5
  14. The Research of Trust Evaluation Algorithm in P2P,TP393.08
  15. Research on the Reputation Model Based on Double Trust Information in P2P Network,TP393.08
  16. The Research of the Indicators of Hospital Reputation,R197.3
  17. Legal Thinking of the independent directors ' incentives,D922.291.91
  18. Research on Results Verification and Improvement of Shandong Famous Product,F426.82
  19. Research on the Management of Construction Agent List,F283
  20. A Study on the Effect of Executive Reputation Incentive in Chinese Listed Companies,F272
  21. A Study on Trust Mechanism of Human Resource Outsourcing,F272.92

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications
© 2012 www.DissertationTopic.Net  Mobile