Dissertation > Excellent graduate degree dissertation topics show

Protocol Analysis and Modeling of the Wireless Self-organizing Networks

Author: HeFei
Tutor: ZhaoZeMao
School: Hangzhou University of Electronic Science and Technology
Course: Communication and Information System
Keywords: Wireless self-organizing networks Clustering algorithm Routing protocol Flaw attack MAC protocol Finite State Machine
CLC: TN929.5
Type: Master's thesis
Year: 2011
Downloads: 80
Quote: 0
Read: Download Dissertation


Wireless self-organizing networks technology is one of networks developed from the 1970s. Due to its fast automatic self-configuring and without the infrastructure, it has obvious advantages in earthquake disaster prevention, weather monitoring, military intelligence fields, and will be widely applied in the future. As wireless self-organizing networks application be promoted, the problems of information security is becoming more and more prominent, such as network security architecture, security routing, safe access and key management and so on. How to carry on the wireless network protocols analysis and the model establishment are mainly researched in this thesis.In wireless self-organizing networks, the nodes with different scale require different real-time and reliability. In order to optimize the performance of the network, it is necessary to choose appropriate network topology and hierarchical management mode. Well, the realization of the hierarchical management relies on the clustering algorithm. Firstly, this thesis analyzes the advantages and disadvantages of several classical clustering algorithms. In which the weight-based clustering algorithms are welcome because of its better adaptability and flexibility. But they do not take into account the problem of non-uniform units when processing the weight factors. So, an improved adaptive on-demand weighted clustering algorithm(ImAOW) is proposed. In the algorithm, the performance of nodes are unitary changed into value without unit to totally evaluate the performance of nodes. Then, an example of clustering is presented, and the communication overhead of ImAOW clustering algorithm is analyzed. The result shows that, comparing with the similar typical algorithms, the ImAOW clustering algorithm has lower time complexity and message complexity.Secondly, the routing protocols in the wireless self-organizing networks and their security threats are introduced. And the AODV routing protocol and the blackhole attack are analyzed in detail. Then, an attack method based on malicious mobile is presented by the freedom movement characteristic of network nodes. We make some simulations with NS2, the result shows that this method has simple acts, considerable threats.Thirdly, a blocking attack method is proposed based on the security flaw of RTS/CTS handshake mechanism. The pair attackers conspire to forge malicious information, and make the communication among the nodes in the same cluster are blocked utilizing the fact that Custer-type structure is easily to lead to the false blocking problem. The blocking attack is a kind of Denial of Service attack. Moreover, a defense strategy against the proposed attack is presented. The simulations with NS2 show that the throughput falls down much when the attack happen. On the contrary, it goes up greatly when the defense strategy is implemented.Finally, the operation processes of IEEE 802.11 MAC protocol in wireless self-organizing networks are described as different state transitions by using Finite State Machine. Based on this description, a Finite State Machine model of MAC protocol in wireless self-organizing networks is established. Under this model, how attackers avoid successfully being detected and make efficiently attacks to MAC protocol is studied. Simulations with NS2 show that the average throughput of the network is decreased as attacks are strengthened, while the consumption of the route is increased gradually.

Related Dissertations

  1. Research on MAC Protocols for Underwater Acoustic Networks,TN929.3
  2. Formalization-based Methed to Generate Test Sequence of UML,TP311.53
  3. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  4. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  5. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  6. SAR interferometric method for optimal selection,P225.2
  7. Research and Implementation on Mac Protocol and Routing Protocol in Wireless Mesh Networks,TN929.5
  8. Research on Spectrum Sensing and Spectrum Access Strategy in Cognitive Radio Network,TN925
  9. Research of MAC Protocol Based on DAG,TP212.9
  10. The Application of Web Data Mining Technology on Network Education BBS,G434
  11. Wireless sensor networks research channel MAC protocol,TP212.9
  12. Heterogeneous data -oriented low-power sensor networks TDMA protocol design and implementation,TP212.9
  13. Vehicle self-organizing network QoS Routing Protocols,TN929.5
  14. Channel MAC protocol in wireless networks Research and Implementation,TN929.5
  15. Chance mechanism based wireless sensor network communication protocol research,TP212.9
  16. Ad hoc network monitoring software development,TN929.5
  17. Channel wireless Adhoc network protocol design and research,TN929.5
  18. Protocol Conformance Test Research of Communication Based Train Control System,U284.48
  19. The MMU the coprocessor simulation model research and software simulation to achieve,TP391.9
  20. Design and Implementation of the Software of Winding Equipment’S Control System,TM571.61
  21. Research on Test Method of SSL Protocol,TP393.08

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications
© 2012 www.DissertationTopic.Net  Mobile