移动自组网的安全风险分析
被引量:2
The analysis of Ad Hoc networks' security risks
摘要
移动自组网固有的大部分特性正成为其潜在的脆弱点,使其更易遭受各种安全威胁。文章通过实施一个高层的安全风险分析,指出了移动自组网面临的安全问题和挑战,并就移动自组网的安全研究方向提出了建议。
出处
《信息安全与通信保密》
2005年第8期90-93,共4页
Information Security and Communications Privacy
参考文献10
-
1J. Macker and M. Corson. Mobile ad hoc networking and the IETF. Mobile Computing and Communications Review, 1998, 2(1).
-
2RFC 2501,Mobile Ad hoc Networking(MANET):Routing Protocol Performance Issues and Evaluation Considerations[S].
-
3W.Ford M.S.Baum 劳帼龄等译.安全电子商务-为数字签名和加密构造基础设施(第二版)[M].北京:人民邮电出版社,2002..
-
4J.Hubaux,L.Burryan,S.Capkun.The Quest for Security in Mobile Ad hoc Networks.Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC 01),2001.
-
5L.Buttyan,J.Hubaux.Report on a Working Session on Security in Wireless Ad Hoc Networks.Swiss Federal Institute of Technology,EPFL,2001.
-
6L.Zhou,Z.Haas.Securing Ad Hoc Networks.IEEE Network Magazine,1999,13(6).
-
7F.Stajano.Security for Ubiquitous Computing.Communications Networking & Distributed Systems,2002.
-
8F.Stajano,R.Andersson.The Resurrecting Duckling:Security Issues in Ad—hoc Wireless Networks.Proceedings of the 7th International Workshop on Security Protocols,1999.
-
9V.Karpi]oki.Security in Ad Hoc Networks.In Proceedings of the Helsinki University of Technology,Seminars on Network Security,2000.
-
10A.Nash 张玉清等译.公钥基础设施(PKI):实现和管理电子安全[M].北京:清华大学出版社,2002..
同被引文献13
-
1韩文报,李光松,杨宏志.自组网的密钥管理[J].信息安全与通信保密,2005,27(2):73-77. 被引量:3
-
2Papadimitratos P, Haas Z. Secure routing for mobile ad hoe networks[C]. In Proc. of the SCS communication Networks and Distributed Systems Modeling and Simulation Conf. San Autonio, TX, Jan.2002.
-
3Buchegger S, Boudec L J. Performance analysis of the CONFIDANT protocol: cooperation of nodesfairness In dynamic Ad hoc networks[C]. In Proceeding of IEEE /ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC).Lausanne, 2002: 226-236.
-
4Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks[C]. The Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002) Portoroz, Slovenia, 2002: 107-121.
-
5TOHCK. Maximum battery life routing to support ubiquitous mobile computing in wireless Ad Hoc networks[J]. IEEE Communications Magazine, 2001, 39(06) 138-147.
-
6Sun Wei. Trust Modeling and Evaluation in Ad Hoc Network[J]. Global Telecommunications Conference, 2005. GLOBECOM'05.IEEE, 2005, 3: 1862-1867.
-
7Johnson B D, Maltz A D. Dynamic source routing in Ad hoc wireless network, mobile computing[C]. In Mobile Computing, edited by Tomasz Imieliski and Hank Korth, Kluwer Academie Publishers, 1996 151-181.
-
8池万红,孙鹏.一种基于分级路由的空地编队自组网方案[J].通信技术,2007,40(8):25-27. 被引量:1
-
9PUGH J,BULTITUDE R,VIGNERON P. Propagation Measurements and Modelling for Multiband Communications on Tactical VHF Channels[A].2007.3-8.
-
10STINE J A. Cross-Layer Design of MANETs:The Only Option[A].2006.1-7.
引证文献2
-
1邢建军,杨巧合,李玉增,施惠昌.Ad hoc网络基于能量考虑的信誉机制研究[J].信息安全与通信保密,2009,31(9):132-134.
-
2曾梦岐,蒲文彬,穆阳,陈爱华.战术自组网分层安全框架研究[J].信息安全与通信保密,2012,10(4):51-55. 被引量:2
-
1赵鹏,隋爱芬.全IP环境下GPRS安全风险分析[J].通信世界,2009(37).
-
2范伟.基于NFC技术的移动支付TEMPEST安全风险分析[J].保密科学技术,2012(11):16-19.
-
3林秀.CM-IMS用户接入设备安全风险分析及部署建议[J].电信工程技术与标准化,2014,27(12):38-42.
-
4李双.阿尔卡特朗讯信息:阿尔卡特朗讯携手Jeskell推出户外企业安全解决方案[J].邮电设计技术,2008(12):56-56.
-
5刘佳.无线网络传输性能改进研究[J].中国新通信,2015,17(1):90-90.
-
6夏飞.智能电网智能终端工控安全风险分析及防护方案[J].无线互联科技,2016,13(22):117-119. 被引量:1
-
7陈锦洪.浅谈电力通信网络平台及其应用[J].企业技术开发,2011,30(5):42-43.
-
8刘方明.企业无线局域网安全风险分析[J].中国金融电脑,2013(7):55-58.
-
9许一帆.手机银行安全风险分析与防范措施[J].中国信用卡,2013(11):62-64.
-
10关靖远,张松.智能手机的金融应用安全风险分析[J].中国金融电脑,2013(10):52-55. 被引量:1