期刊文献+

移动Ad Hoc网络中一种匿名攻击及防御策略研究

Research on a Kind of Anonymous Attack and Defence Strategies in Mobile Ad Hoc Network
下载PDF
导出
摘要 应用概率模型检测工具PRISM证实统计暴露攻击能够破坏ANODR协议的匿名性。为此改进ANODR协议的节点输出方式,提出全局同步发送策略和组同步发送策略。概率模型检测表明,组同步发送策略适应移动Ad Hoc网络匿名通信需求,可防范统计暴露攻击,并能提供低延迟,受节点移动影响小的匿名服务。 By using probabilistic model checking,this paper proves that anonymous protocol ANODR cannot provide anonymity under statistical disclosure attack.In light of this,the strategy for node output in ANODR is improved and global and grouped synchronization strategies are proposed.Checked by probabilistic model,the grouped synchronization strategy can meet the requirements of mobile ad hoc networks,defend statistical disclosure attack,provide low-latency communication immune to mobility.
出处 《广西科学院学报》 2007年第4期270-274,共5页 Journal of Guangxi Academy of Sciences
基金 广西研究生教育创新计划项目(2007105950812M17)资助
关键词 统计暴露攻击 匿名通信 移动AD HOC 概率模型检测 statistical disclosure attack,anonymous communication,mobile Ad Hoc networks,probabilistic model checking
  • 相关文献

参考文献5

  • 1DANEZIS G.Statistical disclosure attacks:traffic confirmation in open environments:Security and Privacy in the Age of Uncertainty,the 18th International Conference on Information Security (SEC2003)[C].Athens,Greece,2003:421-426.
  • 2KONG J,HONG X.ANODR:anonymous on demand routing with untraceable routes for mobile Ad Hoc networks:the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03)[C].Annapolis,Md,USA ACM,2003:291-302.
  • 3Oxford University.PRISM.[2007-08-20].http://www.prismmodelchecker.org.
  • 4王伟平,皮润良,段桂华.匿名系统中统计暴露攻击及防御策略研究[J].计算机工程,2006,32(22):162-165. 被引量:4
  • 5陆天波,方滨兴,孙毓忠,郭丽.匿名协议WonGoo的概率模型验证分析[J].小型微型计算机系统,2006,27(4):646-650. 被引量:3

二级参考文献17

  • 1Lu T,Fang B,Sun Y,et al.WonGoo:a peer-to-peer protocol for anonymous communication[C].In:Proceedings of the 2004 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA04),June 2004:1102-1106.
  • 2Chaum D.Untraceable electronic mail,return addresses and digital pseudonyms[J].Communications of the ACM,February 1981,24(2):84-88.
  • 3Reiter M K,Rubin A D.Crowds:anonymity for web transactions[J].ACM Transactions on Information and System Security,November 1998,1(1):66-92.
  • 4Pfitzmann A,Kohntopp M.Anonymity,unobservability,and pseudonymity-a proposal for terminology[Z].Draft v0.14.http://www.freehaven.net/anonbib/papers/ Anon-Terminology-v0.14.pdf,May 2003.
  • 5Hansson H,Jonsson B.A logic for reasoning about time and reliability[Z].Formal Aspects of Computing,1994,6(5):512-535.
  • 6http://www.cs.bham.ac.uk/~dxp/prism,2004.
  • 7Clarke E M,Emerson E A,Sistla A P.Automatic verification of finite-state concurrent systems using temporal logic specification[J].ACM Trans.on Programming Languages and Systems,1986,8(2):244-263.
  • 8Parker D.Implementation of symbolic model checking for probabilistic systems[D].Ph.D.Thesis,University of Birmingham,August 2002.
  • 9Shmatikov V.Probabilistic analysis of anonymity[C].In:Proc.15th IEEE Computer Security Foundations Workshop (CSFW′02),June 2002:119-128.
  • 10Guan Y,Fu X,Bettati R.An optimal strategy for anonymous communication protocols[C].In:Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS 2002),July 2002:257-266.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部