文摘
英文文摘
论文说明:图表目录
CHAPTER 1:INTRODUCTION
1.1.Motivation
1.2.Thesis contribution
1.3.Organization of the thesis
CHAPTER 2:BACKGROUND AND PREVIOUS WORKS
2.1.Routing protocols for MANET and AODV
2.1.1.Routing protocols for MANET
2.1.2.AODV
2.2.Secure routing in MANET
2.2.1.Security services and challenges in MANET
2.2.2.Attacks on ad hoc routing
2.2.3.Secure ad hoc routing
2.2.4.Vulnerability of AODV
2.2.5.Securing AODV
2.3.Wormhole Attack
2.4.Previous works in detecting the wormhole attack
2.5.Summary
CHAPTER 3: THE WORMHOLE DEFENSE MECHANISM“WDM”
3.1. Route discovery in WDM
3.2. The route table and routing messages format in WDM
3.3. Wormhole detection
3.4. WDM algorithm
3.5. Summary
CHAPTER 4: EXPERIMENTS, RESULTS AND ANALYSIS
4.1. Simulation environment
4.2. Simulation results and analysis
4.2.1. Packet Delivery Fraction and Packet Loss Rate
4.2.2. Fraction of packets sent through the wormhole
4.3. Comparison of simulation results between WDM and other recent researches
4.4. Analysis of memory and bandwidth overhead for routing packets
4.4.1. Memory overhead
4.4.2. Bandwidth overhead
4.5. Summary
CHAPTER 5: CONCLUSION AND FUTURE WORK
REFERENCES
ACKNOWDGEMENTS
APPENDIX