Search In this Thesis
   Search In this Thesis  
العنوان
Enhanced Security Technique for Reactive Routing in Mobile Ad Hoc Networks (MANETS) /
المؤلف
William, Ebram Kamal.
هيئة الاعداد
باحث / إبرام كمال وليم عزيز
مشرف / حسني محمد إبراهيم
مناقش / فتحي أحمد السيد عامر
مناقش / سامية عبد الفتاح علي حسان
الموضوع
Security Technique .
تاريخ النشر
2012.
عدد الصفحات
106 P. ;
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Information Systems
الناشر
تاريخ الإجازة
28/6/2015
مكان الإجازة
جامعة أسيوط - كلية الحاسبات والمعلومات - Information Technology)
الفهرس
Only 14 pages are availabe for public view

from 32

from 32

Abstract

Mobile Ad hoc Network (MANET) is an autonomous selfconfiguring
infrastructure-less wireless network. MANET is vulnerable to
a lot of routing security threats due to unreliability of its nodes that are
highly involved in the routing process.
In this thesis, a new technique is proposed to enhance the security
of one of the most popular MANET routing protocols that is called Ad
hoc on Demand Distance Vector (AODV). The proposed technique
intends to detect and remove blackhole, grayhole, cooperative blackhole,
wormhole, selective forwarding, and selfish node attacks in AODV based
on mobile backbone network.
The backbone network is constructed of randomly moving regular
MANET nodes based on their trust value, location, and power. The
backbone network monitors regular nodes as well as each other to
periodically estimate monitoring trust values which represent the
reliability of each node in the network.
The DROP in the monitoring trust value of any node is used as a clue
to its malicious behavior. Also, the backbone network tries to bait the
malicious nodes to reply to a request for a route to fake destination
address. When a malicious node is detected, the high level backbone
network nodes use the control packets of AODV to broadcast malicious
node address in order to isolate it. The proposed technique uses the
control packets of the AODV technique to exchange its control
information which highly reduces the overhead.
The simulation results show that the performance of the proposed
technique is better than AODV and the other techniques that are
iv
introduced recently to solve the security issues in AODV. The total