Ad Hoc network is an autonomic system without fixed base station which is composed of a group of wireless transceivers. It has caught a great of attention recently due to its cheap nike shoes intelligence. Ad Hoc network is easier to be attacked and it is susptible to eavesdropping, forging and other secure attacks. In Ad Hoc networks, each mobile node assums the router for other node with responsibility for searching the path to other nodes in the north face jackets network. Thus, the security of routing protocol is a vital research issue of Ad Hoc networks.This paper introduces common attacks and secure requirements of Ad Hoc networks, and then it analyzes several representative secure protocols and their merits with defects. To satisfy diverse secure requirements, our research is subdivided to two northface jackets parts, the anonymous routing protocol and the cooperative secure protocol. An efficient bidirectional anonymous routing protocol based on Dynamic Source Routing protocol is presented in the third chapter to offer privacy protection in some application situations. It achieves complete anonymity without eroding security of the routing protocol, using the Bloom Filter. Detailed simulation shows that our protocol is more efficient than other anonymous routing protocols. A reputation mechanism based on cheap womens nike shoes Beta distribution is presented in the forth charpter to defend against uncooperative nodes that not be settled in previous secure routing protocols. It adopts modified cheap men's nike shoes bayesian approach to update and merge the reputation value so it computes simplely so easy to implement. The simulation shows the model is effcient and secure. In the fifth chapter we propose a cooperative secure routing protocol incorporating with the reputation mechanism in the forth chapter. It is based on ARAN (Authenticated Routing for Ad Hoc Networks) protocol to defend against common secure attacks. On the other hand, it adopts reputation mechanism to estimate node and detect uncooperative or malicious node. The simulation is given to show it encourage node to cooperate effectively and enhance the performance of routing protocol and security of networks.
http://www.rainbowfish.info/forum
http://gcworld.xooit.fr
http://forum.bratsk.org
http://www.forum.niebiescy.pl
http://www.hitfm.at/forum