期刊文献+

移动Ad hoc网络中节点合作性研究综述 被引量:8

A Survey of Cooperation of Nodes in Mobile Ad Hoc Networks
下载PDF
导出
摘要 移动Ad hoc网络的动态性和暂时性导致节点间的信任关系不断变化,这给密钥管理带来困难;对于网络内部恶意节点和自私性节点的攻击,传统的安全方案不再有效。在缺少预先约定的信任关系时,合作性安全机制是解决网络内部恶意节点和自私性节点不合作行为的有效方法。本文首先分析了移动Ad hoc网络中所面临的各种安全弱点,指出节点相互合作的重要性,然后综述了现有典型的合作性方案,指出了各种方案的优缺点,提出了进一步的研究方向。 It is difficult to manage the secret key in mobile Ad hoc network, because the trust relationship between nodes is change incessantly due to the dynamic and temporarily of network. To the attack which launched by the malicious and selfish nodes in the inner mobile Ad hoc networks, the traditional security mechanism isn't efficacious anymore. With lack of a prior trust relationship, the cooperative security schemes offer the reasonable effective solution to resolve the uncooprative behavior which launched by the malicious and selfish nodes in the inner mobile Ad hoc networks. This paper analyses the vulnerability of mobile Ad hoc network at first, points out the importance of cooperation between nodes, and then surveys the typical cooperation schemes, makes a comparison and discussion of their respective merits and faults. Finally, we outline future research directions.
出处 《计算机科学》 CSCD 北大核心 2007年第4期24-27,62,共5页 Computer Science
基金 国家自然科学基金(90304010 60403032)
关键词 移动AD HOC网络 网络安全 虚拟货币的合作性方案 声誉值系统 Mobile Ad hoc network, Network security, Virtual currency-based schemes, Reputation-based schemes
  • 相关文献

参考文献13

  • 1Macker J P,Corson M S.Mobile Ad Hoc Networking and the IETF.Mobile Computing and Communications Review,1999,3(1):11~13
  • 2Michiardi P,Molva R.Simulation-based analysis of security exposures in mobile Ad hoc networks[A].In:Proc.of European Wireless Conference[C].Firenze,Italy,2002
  • 3Buttyan L,Hubaux J-P.Enforcing service availability in mobile Ad-Hoc WANs[A].In:Proc.of the IEEE/ ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87~96
  • 4Hubaux J P,Buttyan L.Toward Mobile Ad-Hoc Wans:Terminodes:[Technical Report].No.DSC/2000/006.Swiss Federal Institute of Technology,Lausanne,July 2000
  • 5Buttyán L,Hubaux J P.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8 (5):579~592
  • 6Zhong Sheng,Chen Jiang,Yang Y R.Sprite:A simple,cheat-proof,credit-based system for mobile ad-hoc networks.In:The 22nd Annual Joint Conf.IEEE Computer and Communications Societies (INFOCOM 2003),San Francisco,CA,2003
  • 7Wang Yongwei,Giruka V C,Singhal M.A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks.In:Ad-Hoc Mobile,and Wireless Networks:Third International Conference,ADHOCNOW 2004,Vancouver,Canada,July 22-24,2004.211~224
  • 8Marti S,Giuli T J,Lai Kevin,et al.Mitigating routing misbehavior in mobile Ad hoc networks[A].In:Proc of the Sixth International Conference on Mobile Computing and Networking (Mobicom2000)[C].Boston,August,2000.255~265
  • 9Buchegger S,Le Boudec J Y.Performance analysis of the CONFIDANT protocol:Cooperation of nodes2fairness in distributed Ad-hoc networks[A].In:Proc of IEEE/ ACM Workshop on Mobile Ad hoc Networking and Computing (MobiHOC2002)[C].EPFL Lausanne,Switzerland,2002.226~236
  • 10Buchegger S,Le Boudec J Y.Nodes Bearing Grudges:Towards Routing Security,Fairness,and Robustness in Mobile Ad Hoc Networks.In:10th Euromicro Workshop on Parallel,Distributed and Network-based Processing.Canary Islands,Spain,January 2002.403~410

同被引文献53

引证文献8

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部