期刊文献+

MANET中隧道攻击的研究与实现 被引量:1

Study and Implementation of Tunnel Attack in MANET
下载PDF
导出
摘要 目前MANET中安全方面的研究大多是对单个节点实施的恶意行为的分析和防范。该文研究了一种多节点配合的攻击模式——隧道攻击。结合DSR路由协议和NDM安全模型验证了隧道攻击的有效性和对网络的危害性,提出了设计相应安全措施的方向。 Most recent security-related research on Ad Hoc network focuses on malicious nodes which do the misbehavior alone. This paper details a collaborated attack method tunnel. Through simulation based on the DSR routing protocol and NDM security method, it shows that the tunnel attack is feasible to take considerable intrusion effect even the NDM is enabled. The corresponding security advice is given in the conclusion based on the evaluation results.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期140-141,144,共3页 Computer Engineering
关键词 移动自组织网络 安全 隧道攻击 入侵侦测 Mobile ad hoc network(MANET) Security Tunnel attack Intrusion detection
  • 相关文献

参考文献5

  • 1Fasbender A,Kesdogan D,Kubitz O.Variable and Scalable Security Protection of Location Information in Mobile IP[C]//Proc.of the 46th Vehicular Technology Conference.1996:741-750.
  • 2Sanzgiri K,Dahill B.A Secure Routing Protocol for Ad Hoc Networks[C]//Proc.of the 10th IEEE International Conference on Network Protocols.2002:78-84.
  • 3Deng H M,Li W,Agrawal D A P.Routing Security in Wireless Ad Hoc Networks[J].IEEE Communication Magazine,2002,40(10).
  • 4Marti S,Giuli t,Lai K,et al.Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]//Proc.of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking.2000:255-265.
  • 5Barr R.An Efficient,Unifying Approach to Simulation Using Virtual Machines[D].New York:Cornell University,2004.

同被引文献29

  • 1毛健,周玉洁.可信平台芯片的一种硬件攻击防范设计[J].信息技术,2006,30(6):27-29. 被引量:2
  • 2赵渡,荆一楠,王雪平,于建华.MANET中分布式拒绝服务攻击研究综述[J].计算机工程与应用,2007,43(5):116-119. 被引量:1
  • 3樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 4Qusay H Mahmoud. Cognitive Networks:Towards Self- Aware Networks [ M ]. New York : Wiley, 2007 : 279 - 288.
  • 5Maxim Raya, Jean - Pierre Hubaux. Securing vehicular ad hoc networks [ J ]. Journal of Computer Security, 2007 (15) :39 -68.
  • 6Jeremy Blum, Azim Eskandarian. The threat of intelligent collisions [J]. IT Professional, 2004, 6( 1 ) : 24 -29.
  • 7Matthias Gerlach. VaneSe- An approach to VANET security[ C]//Proceedings of V2VCOM. San Diego, California, USA, 2005.
  • 8Jean -Pierre Hubaux, Srdjan Capkun,Jun Luo. The security and privacy of smart vehicles [ J ]. IEEE Security and Privacy Magazine, 2004, 2( 3 ) : 49 - 55.
  • 9Bryan Parno, Adrian Perrig. Challenges in securing vehicular networks[ C ]///Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, USA, 2005.
  • 10Olivier Dousse, Baccelli F, Patrick Thiran. Impact of Interferences on Connectivity in Ad Hoc Networks [ J ]. IEEE/ACM TRANSACTIONS ON NETWORKING, 2005, 13(2) :425 -436.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部