期刊文献+

Ad hoc网络路由问题的研究 被引量:1

Research on Ad hoc Routing
下载PDF
导出
摘要 随着无线网络的广泛应用,设计一种有效安全的路由协议是目前亟待研究的重要课题。Ad hoc的应用产生了传统网络所未遇到过的安全问题。研究了目前常见的标准路由算法,分析了发生在路由层的攻击手段,阐述了几种路由安全机制。 With the widely use of wireless network,it is an important research field how to design a secure routing protocol which is effective for Ad hoc network.Compared with wireless networks,Ad hoc networks face some specific security problems.This paper discusses some routing protocols proposed as standards for the Ad hoc networks,describes the security issues occuring at the routing layer,and presents some security solutions for the Ad hoc network routing.
出处 《南京邮电学院学报(自然科学版)》 2005年第3期67-72,78,共7页 Journal of Nanjing University of Posts and Telecommunications
基金 国家自然科学基金(70271050) 江苏省自然科学基金(BK2004218 BK2005146) 江苏省高技术研究计划(BG2004004) 国家高科技"八六三"计划(2005AA775050) 江苏省计算机信息处理技术重点实验室基金(kjs05001)资助项目
关键词 无线网络 路由安全 路由算法 路由攻击 Wireless network Routing security Routing algorithm Routing attack
  • 相关文献

参考文献8

  • 1ZHOU Li-dong,HAAS Z J. Securing Ad hoc networks[J]. IEEE Net-hare work, 1999,13(6):24-30.
  • 2ROYER E M,TOH C-K. A review of current routing protocols for Ad hoc mobile wireless networks[J]. IEEE Personal Communications, 1999,6(2):46~55.
  • 3DAS S R,PERKINS C E,BELDING-ROYER E M.Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks[J].IEEE Info-com,2000,1:3~12.
  • 4JACQUET P.Optimized Link State Routing Protocol for Ad Hoc Networks[A]. Proc IEEE Int'l Multi Topic Conf[C].62~68.
  • 5DENG H, LI W,AGRAWAL D.Routing Security in Wireless Ad Hoc Networks[J]. IEEE Communications Magazine,2002,40(10):142~148.
  • 6PAPADIMITRATOS P,HASS Z J.Secure routing for mobile Ad hoc networks[EB/OL]. http://www.citeseer.nj.nec.com/559572.html.
  • 7SAMZGIR K,DAHILL B,LEVINE B N.A Secure Routing Protocol for Ad Hoc Networks[A].In:Preceeding of 10th IEEE International Conference on Network Protocol[C].2002.78~87.
  • 8SMITH B R,MURTHY S,GARCIA-LUNA-ACEVES J J.Securing distance vector routing protocols[A]. In:Symposium on Network and Distributed Systems Security (NDSS '7)[C].1997.85~92.

同被引文献7

  • 1IETF. Mobile Ad hoc: Network Chapter[EB/OL]. 2003. http://www, ietf. org.
  • 2Charles E, Perkins, Elizabeth M, et al. Ad hoe on Demand Distance Vector Routing [ C]// Proceedings WMCSA' 99. Second IEEE Workshop on Mobile Computing Systems and Applications. Los Alamitos, CA, USA: [s. n. ], 1999:90 - 100.
  • 3Ehsan H, Uzmi Z A. Performance Comparison of Ad hoe Wireless Network Routing Protools [ J ]. INMIC IEEE,2004,9(4):450- 465.
  • 4Corson S, Macker J. Mobile Ad hoc networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations[S]. RFC 2501, 1999.
  • 5Caro G D, Dorigo M. An adaptive multi - agent routing algorithm inspired by ants behavior[C]//In: Fifth Annual Australasian Conference on Parallel and Real - Time Systems. Adelaide, Australia: [ s. n. ], 1998:28 - 29.
  • 6Foundation for Intelligent Physical Agents (FIPA) [ EB/OL]. 2005. http://www, fipa. org.
  • 7Wooldridge M. An Introduction to Multiagent Systems [M]. Chichester, England:John Wiley & Sons,2002: 10- 31.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部