期刊文献+

基于可生存性的Ad Hoc网络容侵策略

Survivability-supported Intrusion-tolerance Policy for Ad Hoc
下载PDF
导出
摘要 针对AdHoc网络可生存性的威胁因素,采用基于本地群的安全复原策略,在邻节点管理机制和本地协同投票机制的基础上提出双层安全实施架构,建立群内移动节点之间安全基础上的群间的安全联动;并以AdHoc网络路由协议AODV的内部误用为例,说明安全策略的实施。 In order to enhance survivability of ad hoc networks, this paper uses local collaborative groups-based recovery poIicy .The key modules of the policy are neighborhood watching mechanism and local collaborative w)ting mechanism. And this paper provides the two-level-enforced implementation architecture. As a result of the limitation of network resource, the architecture is based on mobile agent structure. This security policy and implementation architecture effectively assure the survivability ,security and availability of ad hoc network.
作者 钱钢 龚春亚
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第18期135-137,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2003AA413022) 南京师大"十五""211"工程资助项目"信息安全保密技术研究"
关键词 AD hoc网络可生存性 安全复原策略 双层安全实施架构 Ad hoc network survivability Secure recovery policy Two-level-enforced security implementation architecture
  • 相关文献

参考文献8

  • 1Wang Weichao, Lu Yi, Bhargava B. On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
  • 2Manikopouios C, Li Ling. Architecture of the Mobile Ad-hoc Network Security System. In: IEEE International Conference on Systems, Man and Cybernetics, 2003-10:3122-3127
  • 3Kachirski O, Guha R. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. In: Proceedings of the IEEE Workshop on Knowledge Media Networking (KMN'02), 2002
  • 4Mishra A, Patcha A. Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications, 2004,2:48-60
  • 5Nadkarni K, Mishra A. Intrusion Detection in MANETS - the Second Wall of Defense. In: praeeding of the 29^th Annual Conference of the IEEE Industrial Electronics Society, 2003-11:1235-1238
  • 6Sterbenz J P G, Krishnan R. Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions .In: Proceedings of the ACM Workshop on Wireless Security (WiSe 2002),Atlanta, G A, USA, 2002-09-28:31-40
  • 7Minsky N H, Ungureanu V. Law-governed Interaction: a Coordination and Control Mechanism for Heterogeneous Distributed Systems. ACM Transactions on Software Engineering and Methodology, 2000,9(3):273-305
  • 8Ning Peng , Sun Kun. How to Misuse AODV:A Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols. In: Proceedings of the 2003 IEEE Workshop on Information Assurance., United States Military Academy, West Point, NY ,2003-06

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部