期刊文献+

移动自组网的安全风险分析 被引量:2

The analysis of Ad Hoc networks' security risks
原文传递
导出
摘要 移动自组网固有的大部分特性正成为其潜在的脆弱点,使其更易遭受各种安全威胁。文章通过实施一个高层的安全风险分析,指出了移动自组网面临的安全问题和挑战,并就移动自组网的安全研究方向提出了建议。
作者 沈颖
出处 《信息安全与通信保密》 2005年第8期90-93,共4页 Information Security and Communications Privacy
  • 相关文献

参考文献10

  • 1J. Macker and M. Corson. Mobile ad hoc networking and the IETF. Mobile Computing and Communications Review, 1998, 2(1).
  • 2RFC 2501,Mobile Ad hoc Networking(MANET):Routing Protocol Performance Issues and Evaluation Considerations[S].
  • 3W.Ford M.S.Baum 劳帼龄等译.安全电子商务-为数字签名和加密构造基础设施(第二版)[M].北京:人民邮电出版社,2002..
  • 4J.Hubaux,L.Burryan,S.Capkun.The Quest for Security in Mobile Ad hoc Networks.Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC 01),2001.
  • 5L.Buttyan,J.Hubaux.Report on a Working Session on Security in Wireless Ad Hoc Networks.Swiss Federal Institute of Technology,EPFL,2001.
  • 6L.Zhou,Z.Haas.Securing Ad Hoc Networks.IEEE Network Magazine,1999,13(6).
  • 7F.Stajano.Security for Ubiquitous Computing.Communications Networking & Distributed Systems,2002.
  • 8F.Stajano,R.Andersson.The Resurrecting Duckling:Security Issues in Ad—hoc Wireless Networks.Proceedings of the 7th International Workshop on Security Protocols,1999.
  • 9V.Karpi]oki.Security in Ad Hoc Networks.In Proceedings of the Helsinki University of Technology,Seminars on Network Security,2000.
  • 10A.Nash 张玉清等译.公钥基础设施(PKI):实现和管理电子安全[M].北京:清华大学出版社,2002..

同被引文献13

  • 1韩文报,李光松,杨宏志.自组网的密钥管理[J].信息安全与通信保密,2005,27(2):73-77. 被引量:3
  • 2Papadimitratos P, Haas Z. Secure routing for mobile ad hoe networks[C]. In Proc. of the SCS communication Networks and Distributed Systems Modeling and Simulation Conf. San Autonio, TX, Jan.2002.
  • 3Buchegger S, Boudec L J. Performance analysis of the CONFIDANT protocol: cooperation of nodesfairness In dynamic Ad hoc networks[C]. In Proceeding of IEEE /ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC).Lausanne, 2002: 226-236.
  • 4Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks[C]. The Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002) Portoroz, Slovenia, 2002: 107-121.
  • 5TOHCK. Maximum battery life routing to support ubiquitous mobile computing in wireless Ad Hoc networks[J]. IEEE Communications Magazine, 2001, 39(06) 138-147.
  • 6Sun Wei. Trust Modeling and Evaluation in Ad Hoc Network[J]. Global Telecommunications Conference, 2005. GLOBECOM'05.IEEE, 2005, 3: 1862-1867.
  • 7Johnson B D, Maltz A D. Dynamic source routing in Ad hoc wireless network, mobile computing[C]. In Mobile Computing, edited by Tomasz Imieliski and Hank Korth, Kluwer Academie Publishers, 1996 151-181.
  • 8池万红,孙鹏.一种基于分级路由的空地编队自组网方案[J].通信技术,2007,40(8):25-27. 被引量:1
  • 9PUGH J,BULTITUDE R,VIGNERON P. Propagation Measurements and Modelling for Multiband Communications on Tactical VHF Channels[A].2007.3-8.
  • 10STINE J A. Cross-Layer Design of MANETs:The Only Option[A].2006.1-7.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部