期刊文献+

移动Ad Hoc网的典型网络攻击与防范 被引量:9

Typical Network Attacks and Defenses in Mobile Ad Hoc Networks
下载PDF
导出
摘要 随着移动Ad Hoc网络(MANET)的应用越来越广泛,针对Ad Hoc网络的攻击也越来越多。探讨了移动Ad Hoc网中的典型网络层安全漏洞及可能的攻击,分析了各种解决方案的优缺点,为了移动Ad Hoc网络路由安全的进一步研究,提供了基础。 With the rapid and wide use of mobile Ad Hoe networks, more and more attacks can be launched towards it. Some typical network attacks of Ad Hoe networks are addressed and some countermeasures of different attacks are analyzed.
出处 《微计算机应用》 2007年第5期454-459,共6页 Microcomputer Applications
基金 湖北省自然科学基金(2005ABA243)
关键词 移动自组网 网络攻击 网络安全 Mobile Ad Hoc networks, network attacks, network security
  • 相关文献

参考文献7

  • 1周晶,蒋泽军,徐邦海.Ad Hoc网络安全[J].微计算机应用,2005,26(1):11-13. 被引量:7
  • 2Hu Y-C,Johnson D B,Perrig A.SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks.In:Proc.of the 4th IEEE Workshop on Mobile Computing Systems & Applieations,WMCSA,IEEE,Calicoon,NY,June 2002.3~13
  • 3S Yi.P Naldurg,R Kravets.Security-aware Ad-Hoc muting for wireless networks..Tech Rep:UIUCDCS-R-2001-2241,Departmem of Computer Science,University of Illinois at Urbana-Champaign,August 2001.
  • 4Chin-Yang Tseng.Poornima Balasubramanyam,Calvin Ko,Rattapon Limprasittiporn,Jeff Rowe,and Karl Levitt.A Speeification-Based Intrusion Detection System For AODV.In Proceedings of the 1st ACM workshop on.Security of Ad Hoc and sensor networks,ACM Press,2003,125~134
  • 5Buchegger S.Boudec J Y L.Performance analysis of the CONFIDANT protocol.In:Proc.of the 3rd ACM Intl.Symposium on Mobile Ad Hoc Networking and Computing,2002.226~236
  • 6Yih-Chun Hu,Adrian Perrig,and David B.Johnson.Packet Leashes:A Defense against Wormhole Attacks in Wireless Ad Hoc Networks.Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2003),April 2003,(3):1976-1986,IEEE,San Francisco,CA
  • 7S.Capkun.L.Buttyan,and J.Hubaux.Sector:Secure Tracking of Node Encounters in Multi-hop Wireless Networks.Proc.of the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN 2003),2003,21~32

二级参考文献9

  • 1Jarecki S. Proactive secret sharing and public key cryptosystems. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA USA, September 1995.
  • 2Smith B R, Murphy S, Garcia-Luna-aceves J J. Securing distance- vector routing protocols. In Proceedings of Symposium on Network and Distributed System Security,pages 85 92, Los Alamitos, CA, February 1997. The Internet Society, IEEE Computer Society Press.
  • 3Tardo J J, Algappan K. SPX: Global authentication using public key certificates. In Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 232 - 244,Oakland, CA USA, May 1991. IEEE Computer Society Press.
  • 4T. Pedersen. Non-interactiveand information-theoretic secure verifiable secret sharing. In J. Feigenbaum,editor,Advances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, Santa Barbara, CA USA, August 11 15, 1991, Proceedings, volume 576 of Lecture Notes in ComputerScience, pages 129 140,Springer, 1992.
  • 5M. K. Reiter. Distributing trust with the Rampart toolkit. Communications of the ACM, 1996, 39(4):71 74.
  • 6M. J. Fischer, N. A. Lynch, and M. S. Peterson. Impossibility of distributed consensus with one faulty processor. Journal of the ACM, 1985,32(2):374 - 382, April.
  • 7T Pedersen. Non-interactiveand information-theoretic secure verifiable secret sharing. In J Feigenbaum,editor,Advances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, Santa Barbara, CAUSA, August 11 15, 1991, Proceedings, volume 576 of Lecture Notes in Computer Science, pages 129 140.Springer, 1992.
  • 8M K Reiter. Distributing trust with the Rampart toolkit. Communications of the ACM, 1996, 39(4):71-74.
  • 9M J Fischer, N A Lynch, and M S Peterson. Impossibility of distributed consensus with one faulty processor. Journal of the ACM, 1985,32(2):374 - 382, April.

共引文献6

同被引文献106

引证文献9

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部