• 藍色版面
  • 綠色版面
  • 橘色版面
  • 粉紅色版面
  • 棕色版面
帳號:guest(120.119.126.29)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

研究生: 陳君豪
研究生(外文): Jyun-Hao Chen
論文名稱: 在 MANET 網路中自私節點偵測之研究
論文名稱(外文): Study of Selfish Nodes Detection in MANET
指導教授: 吳連文
指導教授(外文): Lien-Wen Wu
學位類別: 碩士
校院名稱: 樹德科技大學
系所名稱: 資訊工程學系
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 50
中文關鍵詞: 行動隨意無線網路AODV自私節點
外文關鍵詞: MANETAODVselfish node
相關次數:
  • 被引用:0
  • 點閱:14
  • 評分:*****
  • 下載:8
  • 書目收藏:0
行動隨意無線網路 ( Mobile Ad Hoc Network : MANET ) 是由許多有具備有
無線通訊能力的行動裝置,為了某些目的而組成的一種無基地台式網路,這種網
路不需透過無線通訊的基礎設施即可運作。在 MANET 網路裡,我們把每一個行
動裝置都視為一個節點,而在網路裡的每個節點,都能透過網路裡面的其他節點,
靠著彼此的互助合作,即可彼此互相傳遞訊息或資料。另一方面,節點的硬體資
源、頻寬與節約電源在 MANET 網路裡是相當重要的,因此有些節點為了保存自
己本身的硬體資源、頻寬與電源,而會發生將其他節點傳送過來的封包丟棄的自
私行為發生,來藉此保存自己的硬體資源、頻寬與電源,使得自己能從其他的節
點得到更多的資源,我們把這種有自私行為的節點,稱之為自私節點。自私節點
其自私的行為,則會影響到整個 MANET 網路上的可靠性與公平性,並且使得
MANET 網路無法發揮最大的優點。
在本論文中,我們提出幾種偵測自私節點行為的方法,透過彼此的封包傳遞,
讓正常節點能更容易偵測出自私節點的行為,來提高正常節點對自私節點的偵測
率。而在偵測出自私節點後,正常節點會適時的調整繞徑表來保持資料傳送的最
佳路徑,並且讓自私節點無法參與 MANET 網路的運作,避免自私節點的行為影
響到整個網路,以提高在 MANET 網路上的可靠性與公平性,並且讓 MANET 網
路發揮最大的效用。最後亦經由NS2 模擬器,針對偵測率與誤判率做一模擬。
MANET is an infrastructureless wireless network and is composed of many mobile
devices with wireless interfaces. In MANET, each mobile device can be treated as a
node. The node can relay packets to the destination node by other nodes in MANET. On
the other hand, the memory, bandwidth and power saving are very important in MANET.
Hence some nodes want to save their memory, bandwidth and power by dropping
packets from other nodes. These nodes with misbehaviors are called the selfish nodes.
These selfish nodes will impact efficiency, reliability and fairness in a whole MANET.
In this thesis, we propose the feedback-based methods to detect the selfish nodes.
Once the selfish nodes are detected by one or more normal nodes, these normal nodes
will modify their routing table in order to maintain the best route and prevent the impact
of the selfish nodes in MANET. Finally, the detection rate and the false detection rate of
the proposed methods are validated through ns-2 simulator.
摘要................................................................................................................................ iii
Abstract .......................................................................................................................... iv
誌謝................................................................................................................................. v
目錄................................................................................................................................ vi
圖目錄........................................................................................................................... viii
表目錄............................................................................................................................. ix
一、緒論.......................................................................................................................... 1
1.1 研究動機與目的............................................................................................... 1
1.2 研究方向........................................................................................................... 2
1.3 論文架構........................................................................................................... 2
二、相關研究.................................................................................................................. 3
2.1 MANET 網路中之繞徑協定 ( Routing Protocol ) 介紹................................. 3
2.1.1 DSR ( Dynamic Source Routing Procotol ) 繞徑協定.......................... 6
2.1.2 AODV ( Ad Hoc On-Demand Distance Vector ) 繞徑協定................... 8
2.2 MANET 網路之自私節點 ( Selfish Node ) 的定義..................................... 10
2.2.1 不週期性發送 Hello 訊息..................................................................11
2.2.2 延遲轉送 RREQ 封包........................................................................11
2.2.3 不轉送 RREQ 封包............................................................................11
2.2.4 不轉送 RREP 封包............................................................................ 12
2.2.5 不轉送 DATA 封包............................................................................ 12
三、偵測方法及應對方法............................................................................................ 14
3.1 針對不轉送RREQ 封包的偵測法................................................................ 14
3.2 針對不轉送RREP 封包的偵測法................................................................. 17
3.3 針對不轉送DATA 封包的偵測法................................................................. 20
3.4 偵測到自私節點後之應對方法..................................................................... 24
四、模擬結果與分析.................................................................................................... 25
4.1 不同移動速度對自私節點偵測的影響......................................................... 26
4.1.1 不同移動速度下針對不轉送RREQ 封包之自私節點的偵測......... 26
4.1.2 不同移動速度下針對不轉送RREP 封包之自私節點的偵測.......... 30
4.1.3 不同移動速度下針對不轉送DATA 封包之自私節點的偵測.......... 32
4.2 在同樣移動速度、不同暫停時間對自私節點偵測的影響......................... 34
4.2.1 不同暫停時間下針對不轉送RREQ 封包之自私節點的偵測......... 35
vii
4.2.2 不同暫停時間下針對不轉送RREP 封包之自私節點的偵測.......... 36
4.2.3 不同暫停時間下針對不轉送DATA 封包之自私節點的偵測.......... 38
4.3 節點移動性造成高誤判率之改善策略......................................................... 39
4.3.1 移動速度 5 m/s 針對不轉送RREQ 封包之自私節點的偵測......... 41
4.3.2 移動速度 10 m/s 針對不轉送RREQ 封包之自私節點的偵測....... 42
4.3.3 移動速度 20 m/s 針對不轉送RREQ 封包之自私節點的偵測....... 44
五、結論與未來研究方向............................................................................................ 46
參考文獻........................................................................................................................ 48
[1] S. Corson and J. Macker, 1999, Mobile Ad Hoc Networking (MANET): Routing
Protocol Performance Issues and Evaluation Considerations, RFC 2501.
[2] Elizabeth, Royer, Chai-Keong, Toh, 1999, A Review of Current Routing Protocols
for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications.
[3] Charles E. Perkins and Pravin Bhagwat, 1994, Highly Dynamic Destination-
Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, Computer
Communications, October 1994, pp. 234-244
[4] S. Murthy and J. J. Garcia-Luna-Aceves, 1996, An Efficient Routing Protocol for
Wireless Networks, ACM Mobile Networks and App. J., Special Issue on Routing
in Mobile Communication Networks, October 1996, pp.183-197.
[5] Ching-Chuan Chiang, Eric Hsiao-Kuang Wu and Mario Gerla, 1997, Routing in
Clustered Multihop, Mobile Wireless Networks with Fading Channel, Proc. IEEE
SICON ’97, April 1997, pp.197-211.
[6] D.B. Johnson and D.A. Maltz, 1996, Dynamic Source Routing in Ad Hoc Wireless
Networks, Mobile Computing, vol. 353. Kluwer Academic.
[7] Charles E. Perkins, 1998, Ad hoc On-Demand Distance Vector (AODV) Routing,
RFC 3561 , IETF NetworkWorking Group.
[8] Sung-Ju Lee, Elizabeth M. Royer, and Charles E. Perkins, 2003, Scalability Study
of the Ad Hoc On-Demand Distance Vector Routing Protocol, In ACM/Wiley
International Journal of Network Management, vol. 13, no. 2, March 2003, pp.
97-114.
[9] C.M. Chung, Ying-Hong Wang, and Chih-Chieh Chuang, 2001, Ad-hoc
on-demand backup node setup routing protocol, Proceeding of The 15th
International Conference on Information Networking, (ICOIN-15), pp. 933-937.
[10] V. Park and M.S. Corson, 1998, A Performance Comparison of the
49
Temporally-Ordered Routing Algorithm and Ideal Link-State Routing, Proc. of
IEEE Symposium on Computers and Communications ’98, Athens, Greece, June
1998.
[11] Z. J. Haas and M. R. Pearlman, 2002, The zone routing protocol (ZRP) for ad hoc
networks, Mobile ad hoc Networks(manet), http://www.ietf.org/html.charters/
manet-charter.html.
[12] Wen-Hwa Liao, Yu-Chee Tseng, Jang-Ping Sheu, 2001, GRID: A Fully
Location-Aware Routing Protocol for Mobile Ad Hoc Networks, Kluwer
Academic Publishers. Manufactured in The Netherlands.
[13] C. Y. Chang and C. T. Chang, 2001, Hierarchical Cellular-Based Management for
Mobile Hosts in Wireless Ad Hoc Networks, Computer Communications Journal ,
vol. 24, pp. 1554-1567.
[14] C. Y. Chang, C. T. Chang, and T. S. Chen, H. R. Chang, 2007, Hierarchical
Management Protocol for Constructing a QoS Communication Path in Wireless
Ad Hoc Networks, Information Sciences : An International Journal, no.177,
pp.2621-2641, March 2007.
[15] S. R. Das, C. E. Perkins and E. M. Royer, 2000, Performance comparison of two
on-demand routing protocols for ad hoc networks, IEEE INFOCOM, pp. 3-12.
[16] Kui Wu and J. Harms, 2001, Performance study of a multipath routing method for
wireless mobile ad hoc networks, Proceedings of Symposium on Modeling,
Analysis and Simulation on Computer and Telecommunication Systems,
MASCOTS, pp. 99-107.
[17] J. Broth, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, 1998, A
Performance Comparison of Multi-Hop Wireless ad hoc Network Routing
Protocols, Proceedings of the Fourth Annual ACM/IEEE International Conference
on Mobile Computing and Networking, pp. 85-97.
[18] Shin Yokoyama, Yoshikazu Nakane, Osamu Takahashi, and Eiichi Miyamoto, 2006,
50
Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and
Countermeasure Methods, Proceedings of the 7th International Conference on
Mobile Data Management (MDM 2006).
[19] Frank Kargl, Andreas Klenk, Stefan Schlott, and Michael Weber, 2005, Advanced
Detection of Selfish or Malicious Nodes in Ad hoc Networks, Springer Berlin /
Heidelberg.
[20] T. Fahad, R. J. Askwith, 2006, A Node Misbehaviour Detection Mechanism for
Mobile Ad-Hoc Networks, The 7th Annual PostGraduate Symposium on The
Convergence of Telecommunications, Networking and Broadcasting.
[21] Information Sciences Institute ISI, 2005, The Network Simulator NS-2,
http://www.isi.edu/nsnam/ns
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
* *