Dissertation > Excellent graduate degree dissertation topics show

Research and Simulation on Risk-evaluation Based Intrusion Response Mechanism in Hierarchical Ad Hoc Networks

Author: LiPingPing
Tutor: ZhangZhenChuan
School: Northeastern University
Course: Communication and Information System
Keywords: Ad Hoc networks Hierarchical architecture Security Risk-evaluation Intrusion response
CLC: TN929.5
Type: Master's thesis
Year: 2009
Downloads: 11
Quote: 0
Read: Download Dissertation


As a kind of centreless, self-organized networks, Ad Hoc networks become a hotspot since they don’t need the support of basic establishment in information networks, and they are suitable for battlefield, disaster, temporary session and so on. Meanwhile, Ad Hoc networks’ unique characteristics make the security problems in Ad Hoc networks very serious. In order to improve the networks’scalability, Ad Hoc networks are showing a hierarchical trend. In the Ad Hoc networks with hierarchical architecture, the status of nodes are different, there are bottleneck nodes in the networks, these features make hierarchical Ad Hoc networks’security problems become more prominent.A risk-evaluation based intrusion response mechanism is proposed for the highlighted security problems in hierarchical Ad Hoc networks. The whole mechanism contains three parts, including risk-evaluation, decision-making support and decision-making and response. When the intrusion detection system finds attacks, risk-evaluation module evaluates the risk degree of routing attacks according to the network performance information obtained from intrusion detection system. Decision-making support module provides decision support for decision-making and response module by distinguishing nodes’type. Decision-making and response module contains two sub-modules:decision-making and response. Decision-making sub-module makes corresponding strategies for routing attacks based mainly on the result of risk evaluation module, as well as on the supplementary information from decision-making support module. Response sub-module limits the harm of routing attacks by a series of actions on grounds of the corresponding strategies, as soon as possible.To verify the validity of the security mechanism, NS-2 networks simulation tool is adopted to simulate the performance of risk-evaluation based intrusion response mechanism. Simulation results show that the mechanism proposed can select the appropriate response strategies according to the risk degree of routing attacks, which effectively maintains the networks’performance when faced with the threat of network attacks, it is fit for hierarchical Ad Hoc networks’characteristics and security needs.

Related Dissertations

  1. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  2. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  3. Study on Development Risk Analysis and Management of Urban Commercial Residence,F293.35
  4. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  5. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  6. The Study on Risk Evaluation of BOT Projects in China University,G647
  7. Study on the Social Security of Migrant Workers in Suzhou City,D412.6
  8. Shanghai Public Security Authorities of the Police Job Classification,D631.1
  9. Region-based wireless sensor network key management scheme for research,TP212.9
  10. EU countries to resolve social conflicts Enlightenment,D75
  11. Mine team safety research and application of self-management,X936
  12. Enterprise Security Benefit Evaluation and Development Strategies,F272;F224.5
  13. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  14. Research on the Connection between Security Case and Criminal Case,D925.2
  15. On the Status and Improvement of Our Country’s Public Sector and Procuratorial Organ,D925.2
  16. Research for Ad Hoc Routing Protocol Energy Aware and Performance Analysis of Node Deployment Strategy,TN929.5
  17. Countermeasures of China 's urban housing system reform,F293.3
  18. Huaiyin Institute of Technology campus card system design and security policy,TP393.18
  19. Study of the Structure of Wall-Inspecting Robot on Chemical Container in Service,TP242
  20. Developmental Social Security System: Construction of Targeting Social Security System,D922.182.3
  21. Research on Ad Hoc Network Routing Protocol Base on Quantum Search Algorithm,TN929.5

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications
© 2012 www.DissertationTopic.Net  Mobile