期刊文献+

一种解决ad hoc网络中自私节点安全问题的方法

One Method for Selfish nodes Security Problem in Ad Hoc Networks
下载PDF
导出
摘要 移动ad hoc网络(MANET)路由和分组转发功能需要节点间的相互合作,自私节点为节约能量而不参与合作,将会影响网络的正常工作.因此本文将针对自私节点危害和解决方法展开分析,并提出一种改进解决方法——基于可信任中心服务器和邻居监测的合作增强机制,该方法不但能够激励节点间的相互合作,而且有效地解决了自私节点改变用户身份的欺骗攻击.最后,仿真结果表明这种合作增强机制对自私节点安全问题是有效的,并且易于实用化. Mobile ad hoc networks (MANET) works properly only if the participating nodes cooperate in routing and forwarding, However, for saving battery life for its own communications, the selfish node simply does not cooperate in network operation. So in this paper, we analyze the harm of selfish nodes and its solution, and provide an improved method, which is based on trusted center server and neighbor monitor cooperative enhancing. This method not only may encourage the nodes cooperating with each other, but also may solve the spoofing attacks caused by selfish nodes changing their identities. Finally, the simulation results conclude that this cooperation enhancing method is effective to solve the selfish nodes security problem, and it is easy to be implemented.
作者 吴昊 郑志彬
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第B12期2317-2321,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60372093) 北京交通大学校基金(No.2004SM003)
关键词 合作 声单 移动AD HOC网络 cooperation reputation mobile ad hoc networks
  • 相关文献

参考文献18

  • 1S Chakrabarti, A Mishra. QoS issues in ad hoc wireless networks [ J ]. IEEE Communications Magazine, 2001,39 ( 2 ) :142 - 148.
  • 2A Luiz DaSilva, F Scott Midkiff, et al. Network mobility and protocol interoperability in ad hoc networks [ J ]. IEEE Communications Magazine,2004,42 ( 11 ) :88 - 96.
  • 3Y C Hu, A Perrig,D B Johnson. Ariadne:a secure on-demand routing protocol for ad hoc networks [ A ]. Proceedings of the Annual International Conference on Mobile Computing and Networking[ C ]. Atlanta, USA: Association for Computing Machinery. 2002.12 -23.
  • 4Y C Hu, A Perrig. A survey of secure wireless ad hoc routing [ J ]. IEEE Security & Privacy Magazine, 2004,2 ( 3 ) :28 - 39.
  • 5F Kargl, S Schlott, et al. Securing ad hoc routing protocols[ A ]. Proceedings 30th Euromicro Conference [ C ].Rennes, France: IEEE Computer Society ,2004. 514 - 519.
  • 6B Dahill,B N Levine,E Royer,et al. ARAN:a Secure routing protocol for ad hoc networks [ R ]. Worcester, USA.Umass Tech Report 02-32,2002.
  • 7S P Alampalayam,A Kumar. Security model for routing attacks in mobile ad hoc networks [ A ]. IEEE 58th Vehicular Technology Conference ( VTC ) [ C ], Orlando, USA: Institute of Electrical and Electronics Engineers Inc. 2003, 2122-2126.
  • 8P Johansson,T Larsson, et al. Senario-based performance analysis of routing protocols for mobile ad hoc networks[ A]. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM [ C ].Seattle, USA: 1999. 195 - 206,
  • 9S Marti,T Giuli, K Lai, et al. Mitigating routing misbehavior in mobile ad hoc networks [ A ]. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM [ C ]. Boston, USA: 2000.255 - 265.
  • 10L Buttyan, J P Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks [J]. ACM Journal for Mobile Networks and Applications ( MONET ), 2003,8(5) :579-592.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部