期刊文献+

移动自组网中一种安全的最高节点度分簇算法 被引量:3

SHDCA:a Secure Highest Degree Clustering Algorithm in Mobile Ad hoc Networks
下载PDF
导出
摘要 移动自组网的固有特征导致它非常容易受到各种攻击,本文着重考虑在移动自组网中广为使用的分簇技术的安全问题.首先分析分簇算法可能面临的攻击,提出一种安全的最高节点度分簇算法(SHDCA),包括基于AOA的位置验证和局部信誉机制,前者验证节点的位置信息,后者则来检测并隔离攻击者.安全分析和仿真实验表明,SHDCA能够有效的实现预定的安全目标,并且在安全和性能开销上达到了合理的折中. Mobile Ad hoc Networks are particularly vulnerable for their features, and this paper focuses on the security problem of clustering technique which is widely used in MANET. We analyze the attacks that clustering algorithms will meet, and de- sign a Secure Highest Degree Clustering Algorithm (SHDCA), including AOA based location verification and local reputation system. Through the security and performance analysis, we demonstrate that SHI')CA is efficient with respect to the security capability it provides and SHDCA also allows a tradeoff between security and performance.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第8期1377-1383,共7页 Journal of Chinese Computer Systems
基金 国家"九七三"重点基础研究发展规划基金项目(2006CB303004)资助 国家自然科学基金项目(60573131 60673154)资助 江苏省自然科学基金项目(BK2005208)资助 教育部高校青年教师奖励基金基项目资助
关键词 移动自组网 分簇算法 安全性 位置验证 信誉机制 mobile ad hoc network clustering algorithm security location verification reputation system
  • 相关文献

参考文献25

  • 1Imrich Chlamtac, Marco Conti, Jennifer J-N Liu. Mobile ad hoc networking: imperatives and challenges[J]. Ad-Hoc Networks Journal (Inaugural Issue), 2003,1(1) :13-64.
  • 2Kawadia V, Kumar P R. Power control and clustering in ad hoe networks[C]. In: Proc. of Infocom,2003.
  • 3Stefano Basagni. Distributed clustering for ad hoc networks [C]. In: Proceedings of the IEEE International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), June 1999, 310-315.
  • 4Lidong Zhou, Zygmunt J Haas. Securing ad hoe networks[J]. IEEE Network Magazine, 1999,13 (6): 24 - 30.
  • 5Hu F, Sharma N K. Security considerations in ad hoe sensor networks[J]. Ad Hoe Networks, 2005,3(1) :69-89.
  • 6Gerla M, Tsai J T C. Muhicluster, mobile, multimedia radio network [J]. ACM-Bahzer Journal of Wireless Networks, 1995, 1(3): 255-265.
  • 7Chatterjee M, Das S, Turgut D. WCA: a weighted clustering algorithm for mobile ad hoc networks[J]. Journal of Cluster Computing (Special Issue on Mobile Ad hoc Networks), 2002, 5 (2) : 193-204.
  • 8Wang Yu, Wang Wei-zhao, Li Xiang-yang. Distributed low-cost backbone formation for wireless ad hoc networks[A]. In: Proc. of ACM MobiHoc05[C]. Urbana-Champaign, IL, ACM Press, 2005, 2-13.
  • 9McDonald A, Znati T. Design and performance of a distributed dynamic clustering algorithm for ad-hoc networks [C]. In:Proc. of the 34th Annual Simulation Symposium, Seattle W A, 2001, 27-35.
  • 10Jain A, Sengupta P R. Geographical routing using partial information for wireless ad hoc networks[J]. LEEE Personal Communication, 2001,8 (1) : 48-57.

二级参考文献8

  • 1Mainak Chatterjee,Sajal K. Das,Damla Turgut.WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks[J].Cluster Computing.2002(2)
  • 2Mario Gerla,Jack Tzu-Chieh Tsai.Multicluster, mobile, multimedia radio network[J].Wireless Networks.1995(3)
  • 3Capkun S,Buttyan L,Hubaux J P.Self-Organized Publickey Management for Mobile Ad Hoc Networks[].IEEE Transactions on Mobile Computing.2003
  • 4Zhou L,Haas Z J.Securing Ad Hoc Networks[].IEEE Network.1999
  • 5Gerla M,Tsai Tzu-chieh.Multicluster Mobile, Multimedia Radio Network[].Wireless Networks.1995
  • 6Shamir A.How to Share a Secret[].ACM Comm.1979
  • 7Perrig A,Canetti R,Tygar J D,et al.The Tesla Broadcast Authentication Protocol[].RSA CryptoBytes.2002
  • 8Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[].Ad Hoc Networks.2003

共引文献11

同被引文献13

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部