The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together with a literature survey. Basic ideas of both security issues in mobile ad-hoc networks as well as intrusion detection systems are presented. Additionally some new ideas for improvements – like the AGM mobility model – are proposed, and tested during the simulation proces. As an addition a set of applications designer for automating the simulation processes we
Contents
IINTRODUCTION
BACKGROUND
RESEARCH AIMS AND OBJECTIVES ‘GUIDELINES’
RESEARCH QUESTIONS
THESIS OUTLINE
1 MOBILE AD-HOC NETWORKS
1.1 HISTORY
1.2 OVERVIEW
2 MODELING AD-HOC NETWORKS
2.1 MOBILITY MODELS
2.1.1 Introduction
2.1.2 Basic random models
2.1.3 Group mobility models
2.1.4 AGM mobility model
2.1.5 Vehicular ad- hoc networks
2.2 ROUTING PROTOCOLS
2.2.1 Introduction
2.2.2 Proactive routing
2.2.3 Reactive routing
2.2.4 Hybrid routing
3 SECURITY ISSUES IN AD-HOC NETWORKS
3.1 INTRODUCTION
3.2 CLASSIFICATIONS
3.3 ATTACKS ON THE NETWORK LAYER
3.3.1 Wormhole Attack
3.3.2 Blackhole Attack
3.3.3 Flooding Attack
4 INTRUSION DETECTION SYSTEMS
4.1 HISTORY
4.2 OVERVIEW
4.2.1 Signature based detection systems
4.2.2 Anomaly based detection system
4.2.3 Specification based detection system
4.3 INTRUSION DETECTION SYSTEMS FOR MANET
4.3.1 New vulnerabilities
4.3.2 Intrusion Detection System Architecture
4.3.3 Watchdog
4.3.4 Anomaly detection
5SIMULATIONS
5.1 INTRODUCTION
5.2 SIMULATOR
5.3 MOBILITY
5.3.1 Mobility scenarios
5.4 CALC FILE ANALYSIS
5.4.1 Detailed analysis
5.5 SCENARIO FILES
5.6 SIMULATIONS WITH SCENARIO FILE
5.6.1 Exp packets
5.6.2 AODV packets
5.6.3 ACK packets
5.7 SUMMARY
6 CONCLUSIONS
6.1 RESEARCH QUESTION 1:WHAT ARE THE IMPORTANT ELEMENTS WHEN MODELING MOBILE AD-HOCNETWORKS
6.2 RESEARCH QUESTION 2:WHAT IMPROVEMENTS CAN BE PROPOSED FOR THE PROCESS OF MODELING MOBILE AD- HOCNETWORKS
6.3 RESEARCH QUESTION 3:WHAT ARE THE MOSTCOMMON SECURITY ISSUES (ATTACKS) IN MOBILE AD-HOC NETWORKS
6.4 RESEARCH QUESTION 4:DO THE EXISTING INTRUSION DETECTION SYSTEMS WORK IN MANET AND IS IT POSSIBLE TO IMPROVE THEIR PERFORMANCE
6.5 FUTURE WORK
SOURCE CODE AND EXECUTABLE FILES
APPLICATIONS MANUAL
BIBLIOGRAPHY
Author: Piotr Jarmal
Source: Blekinge Institute of Technology
Reference URL 1: Visit Now