Preview

Subject Evaluation

Powerful Essays
Open Document
Open Document
5249 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Subject Evaluation
Master Thesis Proposal

Evaluations of Secure MANET Routing Protocols in Malicious Environments

Tuan Anh Nguyen
School of Science and Computer Engineering
University of Houston – Clear Lake

08/2005

Committee members:

Dr. T. Andrew Yang, Chair Dr. Alfredo Perez-Davila Ms. Wei Ding

Table of Contents

Abstract 3 1. Introduction and background 4 2. Problem Statement 8 3. Details of the Proposed Investigation 9 4. Materials and Methods of Research 15 5. Summary 19 References 20

Abstract

The characteristics of self-organization, wireless medium, and the absence of fixed infrastructure make Mobile Ad hoc NETwork (MANET) easy to set up, and thus attractive to users. However, the open and dynamic operational environment of MANET makes it very vulnerable to attacks such as denial of service attacks, radio–jamming attacks, impersonation attacks and fabrication attacks. Another common type of attacks at MANET targets at the underlying routing protocols. Because every network node in a MANET can be a router for data transmission, malicious nodes have opportunities to modify or discard routing information or even to advertise fake routes in an attempt to attract user data to go through themselves.
Some new routing protocols have been proposed to address the issue of securing routing information. However, a secure routing protocol cannot single-handedly guarantee the secure operation of the network in every situation. The objectives of the thesis are two-fold: (a) To simulate various scenarios of attacks at MANET; (b) To study the performance and effectiveness of some secure routing protocols, including the Secure Ad-hoc On demand Distance Vector routing protocol (SAODV) [8] and ARIADNE [6], in these simulated malicious scenarios. If time permits, I would like to propose an optimal security solution to improve the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    Note that the fact that the on-demand approach of the AODV protocol minimizes routing table information. AODV uses traditional routing tables as it is a reactive routing protocol. To determine whether routing information is up-to-date and to prevent routing loops sequence numbers are used. The maintenance of time-based states is a crucial feature of AODV which suggests that a routing entry that isn't recently used is expired. In case of route breakage, the neighbours are notified. The discovery of the route from source to destination relies on query and reply cycles and intermediate nodes store the route information within the type of route table entries along the…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    assessment 1

    • 6182 Words
    • 25 Pages

    I am basing my answers on commercial organisation as that is the current organisation I work for.…

    • 6182 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    The challenge for an attacker is finding vulnerabilities in software or in web protocols in order to intercept communication between two devices. Common target protocols to exploit are the Address Resolution Protocol (ARP), and the Domain Name System (DNS). Steps have been taken to make these protocols more secure in order to prevent MitM attacks. Furthermore, the Transport Layer Security (TLS) (and its predecessor, Secure Sockets Layer (SSL)) mitigate the risk from MitM attacks over the internet.…

    • 1605 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Assessment

    • 6420 Words
    • 26 Pages

    The assessment cycle to ensure the learner has met the performance and knowledge criteria required to achieve the qualification achieved all aspects of the qualification successfully. The cycle will begin with the initial assessment which will establish any prior learning or experience of the subject to be taken and will identify individual learner’s needs. Furthermore, diagnostic tests can recognize if a learner has for instance, dyslexia. The second part of the cycle will be the assessment planning, where the assessor and…

    • 6420 Words
    • 26 Pages
    Good Essays
  • Satisfactory Essays

    Assessment Task 1

    • 835 Words
    • 3 Pages

    A formal organization consists with goals, policies and procedures with an intension to achieve a common objective. This structure creates formal relationships between the management and staff in delegating authority and responsibility. At Bella’s a good relationship exists with its staff and suppliers with a clear understanding of their duties and responsibilities.…

    • 835 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Assessment

    • 1138 Words
    • 5 Pages

    Once this has been done a feedback form must be used. Here the assessor can recommend ways of improvement and log, what agreements have been made with the learner and set deadline.…

    • 1138 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Assessment

    • 3006 Words
    • 13 Pages

    “Children join the school in Year 3. Assessment on entry suggests attainment broadly in line with national averages.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Overview on Ipsec

    • 2720 Words
    • 11 Pages

    * In this paper, i will introduce a overview about this security protocol: what is it? What are its core components? And how this protocol was implemented in the practical?…

    • 2720 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Assessment

    • 555 Words
    • 3 Pages

    Explain the roles and responsibilities of an assessor including the boundaries and limitations of your role…

    • 555 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Food safety

    • 3135 Words
    • 9 Pages

    Infrastructure-based wireless networks provide convenient access to the Internet, and are becoming increasingly popular in spite of their costly wired deployment. On the other hand, mobile ad hoc networks (MANETs) eliminate the need for infrastructure, decreasing deployment time and alleviating network construction costs. However, having routing functions on all nodes in a MANET complicates the design of networking devices. The fact that MANET usage is typically limited to military and specialized civilian applications also hinders its growth. By combining an infrastructure-based wireless network and a MANET, a wireless mesh network (WMN) presents a low-cost and fast deployment solution compared to an infrastructure.…

    • 3135 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Network Security

    • 637 Words
    • 3 Pages

    References: El-Moussa, F. A., Linge, N. N., & Hope, M. M. (2007). Active router approach to defeating denial-of-service attacks in networks. IET Communications, 1(1), 55-63. doi:10.1049/iet-com:20050441…

    • 637 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Assessment

    • 2379 Words
    • 10 Pages

    Pavis, J. (1988). Le carnet de bord (The ship 's log). "Le Francais dans le Monde," 218,…

    • 2379 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Introduction ...................................................................................................... 4 1.1 Concerns around the securit y of the Internet .......................................... 4 1.2. Short discussion about IP Routing ................................................................ 5 1.2 Research activities to improve IP routing security ......................................... 7 2. Short list of IP routing attack vectors .............................................................. 9 2.1. Malicious Route Injection .............................................................................. 9 2.2. Unallocated Route Injection .......................................................................... 9 2.3. TCP Resets ................................................................................................. 10 2.4. Resource Exhaustion .................................................................................. 10 3. Measures to further secure IP routing ........................................................... 11 3.1. Protecting Router Configurations ................................................................ 11 3.2. Generalized TTL Security Mechanism (GTSM) ........................................... 12 3.3. Filtering ....................................................................................................... 12 3.4. Access Control Lists (ACLs)........................................................................ 12 3.5. Digital Signatures ........................................................................................ 13 4. Conclusion ....................................................................................................... 13 5. References…

    • 5094 Words
    • 21 Pages
    Powerful Essays