期刊文献+

移动自组网的匿名路由协议研究综述 被引量:1

Survey of Anonymous Routing Protocols for Mobile Ad Hoc Networks
下载PDF
导出
摘要 移动自组网中的恶意节点对路由协议的安全和隐匿具有严重威胁.现在针对安全路由协议的研究很多,但是很少有人涉及匿名性问题,匿名路由协议能够实现节点身份、位置和通信关系的隐匿,在军事和其它机密通信领域中具有重要意义.首先对匿名路由协议面临的攻击行为进行分析,介绍其定义、分类和匿名性评价方法,然后概括性的介绍已有的典型匿名路由协议,比较其匿名性和安全性,最后对以后研究的问题和方向作了总结和展望. Malicious nodes in mobile ad hoc networks ( MANETs) impose great threat on the security and anonymity of routing protocols. Although there is a huge amount of work in secure routing protocols, few focuses on anonymity problems recent years. Anonymous routing protocols are significantly important in military and other confidential areas because of their capability of hiding the node's identity, location and communication relations. In this paper, a detailed survey of existing literature on anonymous routing protocols is presented. Attack behaviors in anonymous routing protocols are first identified, and the strict definition, taxonomy and anonymity evaluation metrics are also introduced. Then several typical anonymous routing protocols are generally described and their performance on security and anonymity are analyzed and compared as well. At last, some main problems and possible directions for future research are summarized and discussed.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第11期2169-2175,共7页 Journal of Chinese Computer Systems
基金 山东省自然科学基金项目(Y2007G42)资助 教育部新世纪优秀人才支持计划(NECT-05-0582)资助
关键词 移动自组网 安全性 匿名性 安全路由协议 匿名路由协议 MANET security anonymity secure routing protocols anonymous routing protocols
  • 相关文献

参考文献35

  • 1Papadimitratos P, Haas J. Secure routing for mobile ad hoc networks [ C ]. In:Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
  • 2Hu Y C, Perrig A, Johnson D B. Ariadne: a secure on-demand routing protocol for ad hoc networks[ C]. In:ACM MobiCom, 2002, 12 -23.
  • 3Sanzgiri K, Dahill B, Levine B, et al. A secure routing protocol for ad hoc networks [ C ]. In : 10th International Conference on Network Protocols (ICNP'02), 2002.
  • 4Guan S, Fu S, Sun D,et al. NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications[J]. IEEE Transactions on Systems, Man and Cybernetics, 2001,31 (4) :253-265.
  • 5Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2) :84- 88.
  • 6Reed M, Syverson P, Goldschlag D. Anonymous connections and onion routing[ J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4) :482-494.
  • 7Reiter M K, Rubin A D. Crowds: anonymity for web transactions [ J]. ACM Transactions on Information and System Security, 1998, 1(1) :66-92.
  • 8Locasto M E, Chen C, Nambi A. WAR: wireless anonymous routing [ EB/OL]. http ://www. cs. columbia, edu/- locasto/projects/war/ war-paper, pdf, 2008 -06-15.
  • 9Basagni S, Herrin K, Rosti E, et al. Secure pebblenets [ C ]. In: MobiHoc , 2001, 156-163.
  • 10Kong K, Hong X. ANODR: an aonymous on demand routing with untraceable routes for mobile ad hoc networks[ C ]. In:Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03), 2003, 291-302.

二级参考文献28

  • 1Papadimitratos P,Haas Z J.Secure routing for mobile ad hoc networks.In:SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002),January 2002.2~21
  • 2Sanzgiri K,Dahill B,Levine B N,et al.A secure routing protocol for ad hoc networks.In:Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP),2002.78~87
  • 3Yang H,Meng X,Lu S.Self-organized network-layer security in mobile ad hoc network.In:Proceedings of the ACM Workshop on Wireless Security,2002.11~20
  • 4Hu Y C,Perrig A,Johnson D B.Ariadne:A secure ondemand routing protocol for ad hoc networks.In:Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002),2002.12~23
  • 5Hu Y C,Johnson D B,Perrig A.SEAD:Secure efficient distance vector routing for mobile wireless ad hoc networks.In:Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002),June 2002.3~13
  • 6El-Khatib K,Korba L,Song R,et al.Secure dynamic distributed routing algorithm for ad hoc wireless networks.In:International Conference on Parallel Processing Workshops (ICPPW'03),2003.359~366
  • 7Kong J,Hong X.ANODR:Anonymous on demand routing with untraceable routes for mobile ad-hoc networks.In:Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03),2003.291~302
  • 8Zhu Bo,Wan Zhiguo,Kankanhalli M S,et al.Anonymous secure routing in mobile ad-hoc networks.Local Computer Networks,2004.29th Annual IEEE International Conference,2004.102~108
  • 9Hopcroft J E,Ullman J D.Introduction to Automata Theory,Languages,and Computation.Addison-Wesley Publishing Company,1979
  • 10Reed M G,Syverson P F,Goldschlag D M.Anonymous connections and onion routing.IEEE Journal on Selected Areas in Communications,1998,(Special Issue):482~494

共引文献7

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部