期刊文献+

移动自组网中基于路由信息的攻击对网络性能的影响分析

Analysis of Network Performance Under Attacks Based on Routing Information in MANET
下载PDF
导出
摘要 综述了移动自组网中针对路由信息的主要攻击方法和防御体系,并将基于路由信息的攻击方法分为主动性攻击和自私性攻击两大类.论文针对这两大类攻击的特点,建立仿真实验环境,并在DSR路由协议的基础上加入了自私性和主动性的路由信息攻击模式,分析和比较了这两类攻击模式对移动自组网络性能的影响.模拟结果表明在网络中不存在不良节点的情况下,随着网络稳定性不断增加,网络性能不断提高;若存在不良节点,网络的包传输率、吞吐量有明显下降.当不良节点达到10%时,网络包传输率、吞吐量急剧下降,严重时下降为正常情况的50%左右. In this paper, an overview of the major attacks against routing information and the defense approaches is given firstly, and all attacks based on routing information is classified into two types: active attacks and selfish attacks. According to the two types of attacks, simulation environment is established in which realize the two attack models based on DSR routing protocol. Then we analyze the effect of network performance under the two attack models. Simulation results show that if there is no misbehavior node in the network, the network performance is improving with the increasing of network stability. If there is misbehavior node, the packet delivery ratio and throughput of network descend apparently. When the percentage of misbehavior nodes becomes 10%, packet delivery ratio and throughput descend sharply. It can degrade by 50% in severe situation.
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第7期1134-1139,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金(90304010)资助 湖南省自然科学基金(03JJY5032)资助.
关键词 移动自组网 网络安全 主动性攻击 自私性攻击 mobile ad hoc network network security active attack selfish attack
  • 相关文献

参考文献23

  • 1Frank Stajano, Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks[C]. Proceedings of the 7th Security Protocols Workshop, 1999, 172-194.
  • 2Zhou L and Haas Z J. Securing ad hoc networks[J]. IEEE network, 1999,13(6):24-30.
  • 3Perlman R. Network layer protocols with byzantine robustness[D].Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1988.
  • 4Levente Buttyan, Jean-Pierre Hubaux. Stimulating cooperation in self-organizing mobile Ad Hoc networks[R]. Technical Report DSC/2001/046, EPFL-DI-ICA, August 2001.
  • 5Hubaux J, Buttyan L, Capkun S. The quest for security in mobile ad hoc networks[C]. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2001.
  • 6Zimmermann P. The official PGP user's guide[M]. MIT Press, 1995.
  • 7Jiejun Kong, Petros Zerfos, Hauyun Luo et al. Providing roubust and ubiquitous security support for mobile ad-hoc networks[C]. International Conference on Network Protocols (ICNP), 2001, 251-26.
  • 8Yih-Chun Hu, Adrian Perrig, David B Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks[R]. Technical Report TR01-383, Department of Computer Science, Rice University, December 2001.
  • 9Yih-Chun Hu, David B Johnson, Adrian Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks[C]. In:Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Application (WMCSA 2002), Calicoon, Ny, June 2002.
  • 10Panagiotis Papadimitratos, Zygmunt J Haas. Secure routing for mobile ad hoc networks[C]. In:SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Portoroz, Slovenia, 2002.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部