فهرست:
فهرست مطالب
فصل اول: شبکههای موردی و انواع حملات امنیتی در این شبکهها
1-1 شبکههای موردی 14
1-2 انواع حملات 15
1-3 مسیریابی در شبکههای موردی 17
1-4 حملههای تونلکرم و انواع آن 18
فصل دوم: پروتکلهای مسیریابی شبکههای موردی
2-1 دستهبندی پروتکلهای مسیریابی 25
2-1-1 پروتکلهای فعال 25
2-1-2 پروتکلهای واکنشی 25
2-2 پروتکل سیلآسا 25
2-3 پروتکل DSR 25
2-4 پروتکل AODV 26
2-5 پروتکل LAR 26
2-6 مقایسهی پروتکلهای LAR, DSR, AODV 27
2-7 بهبود امنیت مسیریابی در شبکههای موردی 28
2 -7-1 پروتکل ARAN 28
2-7-2 پروتکل ARIADNE 28
2-7-3 پروتکل SRP 29
2 -7-4 پروتکل SAODV 29
فصل سوم: مطالعات انجام شده برای تشخیص و مقابله با حملهی تونلکرم
3-1 پروتکل WARP31
3-1-1 مقایسهی پروتکل WARP با پروتکل AODV31
3-1-2 مزایای پروتکل WARP 33
3-2 پروتکل DELPHI33
3-2-1 مزایای پروتکل DELPHI 36
3-3 پروتکلهای ADCLI و ADCLU37
3-3-1 پروتکل ADCLI37
3-3-2 پروتکل ADCLU38
3-4 پروتکل WAP39
3-5 پروتکل ارائه شده توسط Mahajan 42
3-6 پروتکل ارائه شده توسط F.N. Abdosselam42
3-7 پروتکل ارائه شده توسط Khinsandarwin43
3-8 پروتکل ارائه شده توسط HVU43
3-9 پروتکل PACKET LEASHES44
3-9-1 تعریف LEASH44
3-9-2 انواع LEASH44
3-10 پروتکل ارائه شده توسط Marianne A.Azer46
3-10-1 مزایا48
3-11 پروتکل WHOP48
3-11-1 مقایسهی پروتکل WHOP و پروتکلDELPHI 51
3-12 پروتکل ارائه شده توسط Xia Wang51
3-12-1 طرح اصلی EDWA51
3-13 تجزیه و تحلیل آماری53
3-14 آنتنهای جهتدار54
3-15 پروتکل مسیریابی حالت پیوند یا OLSR54
3-15-1 پیامهای مسیریابی در OLSR55
3-15-2 انتخاب MPR56
فصل چهارم: شبیهسازی پروتکلهای مقابله با تونلکرم
4-1 نصب شبیهساز NS260
4-2 پروتکل حملهی تونلکرم 61
4-3 شبیهسازی پروتکل تونلکرم65
4-4 پروتکلWARP72
4-5 پردازش RREQ در پروتکل WARP75
4-6 پردازش RREP در پروتکل WARP76
4-7 پردازش RREP-DEC در پروتکل WARP77
4-8 ارسال PACKET در پروتکل WARP78
4-9 شبیهسازی پروتکل WARP برای مقابله با حملهی تونلکرم 79
4-10 شبیهسازی پروتکل OLSR84
4-11 سرباری پروتکل OLSR97
4-12 مزایای پروتکل OLSR97
فصل پنجم : ارزیابی
5-1 ارزیابی گذردهی و تاخیر97
فصل ششم : نتیجهگیری و پیشنهادات
6-1 نتیجهگیری 109
6- 2پیشنهادات 109
6-3 کارهای آتی109
منابع................................................................................................................................................110
پیوست............................................................................................................................................115
منبع:
[1] Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang. “Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing”, in computer communication 31, 2008 , pp 760-769
[2] A.A.A. Radwan, T.M. Mahmoud , E.H. Houssein. “Evaluation comparision of some ad hoc networks routing protocols”, 12th Egyption Informatics Journal, 2011, pp 95-106
[3] Hoang Lan Nguyen,uyon Trang Nguyen,"A study of different types of attacks on multicast in mobile ad hoc networks",in ad hoc networks volume 6, issue 1, January2008
[4] Mahdi Nouri, Somayeh Abazari Aghdam, Sajjad Abazari Aghdam. “Collaborative Techniques for Detecting Wormhole Attack in MANETs”
[5]Mahajan, V.Natu, M.sethi, A, “Analysis of wormhole intrusion attacks in MANETs”, in IEEE Military Communications conference,(MILCOM), pp 1-7, 2008
[6] W.wang, B.Bhargava, Y.Lu, and X.wu. “Defending against wormhole attacks in mobile ad hoc networks”,in wireless communication and mobile computing, vol 6, pp 483-502, 2006
[7] Luis Fernando Garcia and Jean-Marc Robert. “Preventing Layer-3 wormhole attacks in ad hoc networks with multiple DSR”, in the 8th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2009, pp 15-20
[8] Lang D. “evaluation and classification of routing protocols for mobile ad hoc networks”, phD thesis , Fakultat fur Informatik der Technischen, Universitat Munchen, Germany,2006.
[9] Mike Burmester, TriVanle, Alec Yasinsac. “adaptive goosip protocols: Managing Security and redundancy in dense ad hoc networks”, in ad hoc networks2,2004, 291-307
[10] Perkins CE, Royer EM, Das SR. “ad hoc on Demand Distance Vector (AODV) routing”. Available from: http:// www.ietf.org/internetdrafts/draft-ietfmanet-aodv-06.txt,IETF Internet Draft, work in progress, 2000.
[11]Perkins C, Belding-Royer E, Das S. “Advanced on demand Distance vector (AODV) routing”. Network working group, IEFT RFC, RFC 3561, 2003.
[12] BBlazevic L, Le Boudec I, Giordano S. “A location based routing method for irregular mobile ad hoc networks”, EPFL-IC Report Number IC/2003/30/2003.
[13] Ashtiani H, Alirezaee S, Mohsen mir hosseini S, khosravi H. “NR:new position based routing algorithm for mobile ad hoc networks”, in: proceedings of the world congress on engineering ,UK, vol 1,2009
[14] k.sanzgiri , D.Laflamme, B.Dahill, B.N. Levine, C. shields and E.M.Belding-Royer. “Authenticated Routing for ad hoc networks”, IEEE Journal on selected Areas in Commnication, special issue on wireless Ad Hoc networks , vol 23, no 3, pp 598-610,2005.
[15] Y-C, Hu, A.Perrig, and D.B. Johnson. “Ariadne: A secure on-Demand Routing protocol for ad hoc networks”,in wireless networks, vol 11, no 1-2, pp 21-38,2005
[16] P.Papadimitratos and z.J. Haas , “Secure Routing for mobile ad hoc networks”, SCS Communication Networks and Distributed systems Modeling and Simulation Conference(CNDS2002), San Antonio, TX, Jan 2002.
[17] Song baiLu, LongXuanLi, kwok-Yan Lam, Ling yan jia, “SAODV: A manet routing protocol that can withstand Blackhole attack”, international conference of computational intelligence and security , December 2009,421-425
[18] Ming-Yang Su, “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks”, in computer&security 29, 2010, 208-224
[19] Chiu, HS ; wong Lui, ks, “DelPHI: wormhole Detection Mechanism for ad hoc wireless Networks”in the 1st International symposium on wireless pervasive computing, phuket, Thailand , 16-18 January 2006
[20] Sun choi, Doo-young kim, Do_hyeon Lee, Jae-il jung. “WAP: wormhole prevention Algorithm in Mobile ad hoc networks”, in IEEE International Conference on sensor Networks, Ubiquitous, and Trustworthy computing, 2008, pp 343-348
[21] F.N Abdesselam. “Detecting and Avoiding wormhole attacks in wireless ad hoc networks”, in IEEE communications Magazine, vol 64(4), pp 127-133, 2008
[22] Khinsandarwin. “Analysis of Detecting wormhole attack in wireless networks”, in the world academy of science , Engineering and Technology, vol 36,2008.
[23] H.VU. “WORMEROS: A New Framework for Defending against wormhole Attacks on wireless ad hoc networks”, proc.Of Int’1 conf. on wireless algo. Systems and App1.,LNCS Vol,5258,pp 491-502,2008
[24] Yi_chun Hu, Adrian perrig, David B.Johnson. “ packet leashes: A Defence against wormhole attacks in wireless networks”, in IEEE conference,2003, pp 1976-1986
[25] Marianne A.Azer, E1-kassas and Magdy s.E1-soudani . “An Innovative Approach for wormhole attack Detection and Prevention In wireless Ad Hoc Networks”, IEEE 2010, pp 366-371
[26] Saurabh Gupta, subrat kar, S Dharmaraja. “WHOP: wormhole Attack Detection protocol using Hound Packet”, in International Conference on Innovations in Information Technology”, 2011, pp 226-231
[27] Xu su, Rajendra V.Boppana , “on Mitigating In-band wormhole Attacks in mobile ad hoc networks”, in IEEE communication society, 2007,pp 1136-1141.
[28] L.Qian, N.song, and X.Li. “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach”, in the Journal of Network and computer applications, vol 30, pp 308-330.
[29] Xia wang, Johny wong. “An End-to-End Detection of wormhole Attack in wireless Ad-hoc Networks” 31st Annual International computer software and applications conference (COMPSAC), 2007
[30] Lingxuan Hu, David Evans. “using Directional Antennas to Prevent wormhole Attacks”,in Network and Distributed system security symposium(NDSS),2004
[31] Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato, “SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks” in IEEE Communications Society (ICC), 2008
[32] T. Clausen “Optimized Link State Routing Protocol,” IETF Internet Draft, draft-ietf-manet-olsr-11.txt, July 2003.