期刊文献+

DSR协议下入侵检测的设计与仿真研究 被引量:2

Design and Simulation of Intrusion Detection Based on DSR Protocol
下载PDF
导出
摘要 移动Ad hoc网络具有无线传输的介质、动态改变的拓扑、合作式的路由算法、缺乏中心监督和管理节点等特点,使得安全防御问题日益重要。定义了三种Ad hoc网络中的入侵节点:为了节约能量试图避开网络路由的职责自私节点行为;试图把自己加进路由,引导数据报来到并丢弃的黑洞节点;不转发报文也不发起报文请求的错误节点。针对以上恶意节点的攻击,定义相应的检测功能,引入赏罚机制和有偿转发报文的功能。通过在NS2(Network S imu lator V2)的无线环境下,修改原有DSR协议,模拟加入三种恶意节点攻击的DSR协议,添加有规避机制和监督功能的DSR协议。对实验结果进行分析,新增的检测功能基本达到降低丢报率和控制路由平均跳数增加的效果。 Security of Mobile Ad hoc network is much more important due to its public transmission media, dynamic topology, cooperative route algorithm, lack of monitoring and managing and etc. Now three kinds of Intrusion nodes are defined: to minimize the spense of energe, Selfish node would skip the responsibility of a router; Black hole nodes which are eager to play the router role in order to discard the useful data packet; Faulty node does not forward or pop up packets due to software or hardware fault. The aim is to simulate the malicious nodes' behavior on NS2, and then add the function of monitoring to the DSR routing protocol, compare the results with and without the monitor system. The result shows that the monitor system turns down the packet loss ratio and gets the increase of average route hop under control.
出处 《计算机仿真》 CSCD 2008年第11期146-149,175,共5页 Computer Simulation
基金 国家自然科学基金资助项目(60672068) 国家自然科学基金资助项目(60702042) 国家863计划信息安全技术资助项目(2007AA01Z452)
关键词 移动自组织网络 黑洞节点 自私节点 错误节点 入侵检测 Mobile Ad hoc network Malicious Selfish Faulty IDS
  • 相关文献

参考文献6

  • 1S. Zhong, J. Chen, and Y. R. Yang, Sprite: A Simple, Cheat -Proof, Credit- Based System for Mobile Ad Hoc Networks[ C ] in Proc. Of IEEE Info com 2003, San Francisco, CA, USA, April 2003. 1987 - 1997.
  • 2Yongguang Zhang, Wenke Lee. "Intrusion Detection in Wireless Ad Hoc Networks[ C] " in Proc of The Sixth International Conference on Mobile Computing and Networking ( MobiCom "2000 ), Boston, MA, 2000. 275 -283.
  • 3S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoe Networks [ C ]," in Prec. of 6th Annual International Conference on Mobile Computing and networ- king (MobiCom2000), Boston, MA, USA, August 2000.255- 265
  • 4Ben - Othman, Xiaoyun Xue ; SERAN : a new protocol to hide an equipment in ad hoc networks [ J] Computers and Communication,ISCC ,2003 . 356-361.
  • 5F. Milan, J.J. Jaramillo, R. Srikant, " Achieving Cooperation in Multihop Wireless Networks of Selfish Nodes [ C ] ," in Proc. of Workshop on Game Theory for Networks ( GAMENETS 2006), Pisa, Italy, October 2006. 157 - 162.
  • 6David B Johnson, David A Mahz. Dynamic source routing in ad hoc wireless networks [ J ]. In Tomasz Imielinski, Hank Korth eds. Mobile Computing, Kluwer Academic Publishers, 1996. 153 - 181.

同被引文献8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部