Optimization and Simulation of Routing and Security for NEMO
|Course||Computer Software and Theory|
|Keywords||NEMO routing optimization security authentication secure transmission|
Nowadays, internet and mobile communication are the two focused directions, in the fast-developing information communication fields. With the deployment and application of CNGI and3G mobile network based on IPv6, stand-alone mobile IPv6technology could not satisfy people’s need about network. Today, mobile network has been the most popular and developable network connection mode, which could provide customer unbelievable convenient connection service. However, the complexity of mobile network does exist, and there is no optimized and secure scheme mature and stable enough to ensure the efficiency and security of mobile network transmission.This thesis summarizes the problems of NEMO network, based on the thorough examination on the basic NEMO protocol, and analysis is done about NEMO routing optimized scheme and security of basic NEMO protocol along with the existing problems, which finally arrives at the conclusion that there is no official standard which could properly resolve the secure problem of NEMO network. Moreover, routing optimized module is introduced based on the existing scheme, with the MR and CR realizing optimizing procedure of NEMO network, avoiding the problem of triangle routing. And then, based on IPsec, secure transmission of data in NEMO network is realized by introducing new proxy and sorter.This thesis contributes on the following aspects. To begin with, both un-nesting and nesting optimizing scheme of NEMO network are introduced. What’s more, IPsec security protection measure is designed, concluding access authentication scheme, swapping authentication scheme and transmission security scheme, to protect safer data transmission of NEMO network. Last but not least, relative functions are designed and realized on the improved NS-2simulation platform to prove the feasibility of this scheme, and also test results does finally validate feasibility of the designed scheme.