期刊文献+

无线网状网路由攻击和路由安全研究进展 被引量:1

Research of Routing Attacks and Routing Security in Wireless Mesh Networks
下载PDF
导出
摘要 分析了无线网状网的外部攻击和内部攻击路由攻击技术,并针对上述攻击技术,对相应的路由安全技术进行了综述。分析了当前无线网状网路由安全技术的不足,包括安全路由机制、网络行为关联性建模以及基于行为模型的路由安全检测和应对技术。 The external and inside routing attack technologies in Wireless Mesh Networks are analyzed. The routing security technologies to deal with the above attacks are summarized. The weakness of current routing security technologies is analyzed, involving secure routing mechanism, the relationship modeling for network behaviors and the detecting and defending technologies based on behavior modeling.
出处 《湖北汽车工业学院学报》 2009年第4期23-27,共5页 Journal of Hubei University Of Automotive Technology
基金 国家863计划项目(2007AA01Z240) 湖北省高等学校优秀中青年科技创新团队计划项目(T200903)
关键词 无线网状网 路由攻击 路由安全 行为建模 wireless mesh network routing attacks routing security behavior modeling
  • 相关文献

参考文献2

二级参考文献17

  • 1E M Belding-Royer,C-K Toh.A review of current routing protocols for ad-hoc mobile wireless networks[J].IEEE Personal Communications Magazine,1999-04.46-55.
  • 2D Johnson,D Matltz,Hu Y-C,J Jetcheva.The dynamic suource routing protocol for mobile ad hoc networks[R].IEEE Internet Draft,draft-ietf-manet-dsr-05.txt (work in progress).2001-03.
  • 3S Murthy,J J Garcia-Lunca-Aceves.A efficient routing protocol for wireless networks[J].ACM Mobile Networks and Applications Journal,1996-10.183-197.
  • 4V Park,M Corson.A highly adaptive distributed routing algorithm for mobile wireless networks[A].In Proc.INFOCOMM[C].1997-04.
  • 5Chartles E Perkins,Pravin Bhagwat.Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers[A].In Proceedings of the SIGCOMM'94 Conference on Communications Architectures,Protocols and Applications[C].1994-08.234-244.
  • 6C E Perkins,E M Royer.Ad hoc on-demand distance vector routing[A].In IEEE Workshop on Mobile Computing Systems and Applicatons[C].1999-02.90-100.
  • 7Zygmunt J Haas.The Zone Routing Protocol (ZRP) for Ad Hoc Networks[R].Internet Draft,work in Progress,2000.Expired.
  • 8R Perlman.Network Layer Protocol with Byzantine Agreement[D].PhD thesis,The MIT Press,1988.LCS TR-429.
  • 9P Papadimitrator,Z J Haas.Secure Routing for Mobile Ad Hoc Networks[A].SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)[C].San Antonio,TX,2002-01.27-31.
  • 10B Dahill,B N Levine,C Shields,E Royer.A Secure Routing Protocol for Ad Hoc Networks[R].UMass Tech Report,2001-08.01-37.

共引文献1

同被引文献12

  • 1Ekram Hossain,Kin K.Leung.无线Mesh网络架构与协议[M].易燕等译.北京:机械工业出版社,2009.5.
  • 2Akyildiz I F,Wang X,Wang W.Wireless Mesh Networks:A Survey.Elsevier,Computer Networks.Volume 47,Issue 4,15 March 2005:445-487.
  • 3Gu X,Hunt R.Wireless LAN Attacks and Vulnerabilities.In the Proceeding of IASTED Networks and Communication System,April 2005.
  • 4Marc Mosko,J.J.Garcia-Luna-Aceves.Muhiipath Routing in Wireless Mesh Networks.In First IEEE Workshop on Wireless Mesh Networks.Santa Clara,CA.September 2005.
  • 5Salem N B,Hubaux J P.A Fair Scheduling for Wireless Mesh Networks.In Proceedings of WiMesh,Santa Clara,CA.September 2005.
  • 6Glass S,Portmann M,Muthukkumarasamy V.Securing Wireless Mesh Networks.IEEE lnternet Computing.July-August 2008:30-36.
  • 7Siddiqui MS,Hong CS.Security Issues in Wireless Mesh Networks.2007 International Conference on Multimedia and Ubiquitous Engineering,Proceedings (MUE'07),2007:717-722.
  • 8L.Zhou,Z.J.Haas.Securing Ad Hoe Networks.IEEE Network.1999:24-30.
  • 9Yi P,Wu Y,Zou FT,et al.A Survey on Security in Wireless Mesh Networks.IETE Technical Review.Jan-Feb 2010:6-14.
  • 10A Key Management Model for Wireless Mesh Networks.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部