期刊文献+

Ad Hoc网络中一种基于信任域值的IDS模型的设计 被引量:1

Design of an IDS Model Based on the Trust Spectrum in Ad Hoc Networks
下载PDF
导出
摘要 移动AdHoc网络由于具有开放媒质、动态拓扑和分布合作及能量受限等特点,特别容易受到攻击。在AdHoc网络中,每个节点充当路由器,寻找和保持到其他节点的路由。路由安全是保证AdHoc网络安全最重要的一环。本文采用决策支持系统中的信任机制将一种基于信任域值的IDS模型(IDS_trust)引入到AdHoc网络中,并提出了一种新的安全解决方案。 The mobile Ad Hoe network(MANETS) are vulnerable to attacks for the unique characteristics of MANETs, such as open network architecture, shared wireless medium, highly dynamic network topology, and stringent resource constraints. In MANETs, each node acting as a rooter to scarch and maintain the rool to the other nodes. Rool security is an especially important part in MANETs security, in this paper, we design an IDS model (called IDS_trust) based on the trusl spectrum by the trust mechanism in decision-and-support systems,and present a new security solution.
出处 《计算机工程与科学》 CSCD 2006年第6期41-43,49,共4页 Computer Engineering & Science
关键词 AD HOC网络 路由安全 信任域值 IDS_trust ad hoc network root security trust spectrum IDS_trust
  • 相关文献

参考文献4

  • 1Peng Ning,Kun Sun.How to Misuse Aodv:A Case Study of Insider Attacks Against Mobile Ad-Hoc Routing Protocols[A].Proc of the 2003 IEEE Workshop on Information Assurance United States Academy[C].2003.
  • 2SeungYi,Praesd Naldurg,Robin Kravet.A Security-Aware Routing Protocol for Wireless Ad Hoc Networks[EB/OL].http://www.cs.uinc.edu/repository/2.0/body/ncstrl.uiuc_cs/uiucdcs-r-200102241/pdf,2001-02.
  • 3R Ramanujan,A Ahamad,J Bonney,et al.Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms(TIARA)[A].Proc of IEEE Miltary Communications Conf.Vol 2[C].2000.
  • 4朱晓妍,王育民.一种增强Ad hoc网络路由协议安全性的方案[J].华中科技大学学报(自然科学版),2003,31(S1):153-155. 被引量:3

共引文献2

同被引文献9

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2张庆生.基于Agent技术的入侵检测系统设计与实现[J].计算机工程与设计,2004,25(11):2067-2069. 被引量:3
  • 3吴国凤,吴其林.一种基于移动Agent的移动Ad Hoc网络入侵检测系统[J].合肥工业大学学报(自然科学版),2006,29(4):406-410. 被引量:2
  • 4Brent R, Waters E W, Felten A S. Receiver anonymity via incomparable public keys. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, ACM, 2003. 112-121.
  • 5Papadimitratos P, Haas Z. Secure routing for mobile Ad Hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Medeling and Simulation Conference, San Antonio, TX, 2002. 27-31.
  • 6Hu Y C, Perrig A, Johnson D B. Ariadne: a secure on-demand routing protocol for Ad Hoc networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking(MobiCbm 2002), Atlanta, ACM, 2002. 12-23.
  • 7Hu Y C, Johnson D B, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA 2002), NY, IEEE Computer Society, 2002. 3-13.
  • 8Zhang Y G, Lee W, Huang Y A. Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Wireless Networks Journal, 2003,9(5) :545-556.
  • 9Venkatraman L, Aagrawal D P. Strategies for enhancing routing security in protocols for mobile Ad Hoc networks. Journal of parallel and Distributed Computing,2003,63(2) :214-227.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部