期刊文献+

无线自组织网络的MAC协议攻击分析

Attacks Analysis of MAC Protocol in Wireless Self-Organizing Networks
原文传递
导出
摘要 利用有限状态机模型,将无线自组织网络IEEE 802.11 MAC协议的实现过程描述成不同的状态转移过程,从而建立了无线自组织网络MAC协议执行过程的有限状态机模型.在此模型下,研究了攻击者如何成功地逃避检测及对MAC协议的攻击行为.NS-2.33仿真实验表明,随着攻击者在不同状态下对网络节点的攻击程度的加强,路由消耗逐渐增大,网络的平均吞吐量呈逐渐下降趋势. By using the model of Finite State Machine,operation processes of the IEEE 802.11 MAC protocol in wireless self-organizing networks are described as different state transitions.Based on this description,a Finite State Machine model of MAC protocol in wireless self-organizing networks is established.Under this model,how attackers successfully avoid being detected and make efficient attacks to a MAC protocol is studied.A simulation with NS-2.33 shows that the average throughput of the network decreases while the consumption of the route increases gradually as attacks are strengthened.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2010年第2期179-183,共5页 Journal of Wuhan University:Natural Science Edition
基金 国防科技重点实验室预研基金资助项目(9140C1302010802)
关键词 无线自组织网络 MAC协议 有限状态机 wireless self-organizing networks MAC protocol finite state machine
  • 相关文献

参考文献11

  • 1Borgonovo F, Capone A, Cesana M, et al. ADHOC MAC: New MAC architecture /'or Ad Hoc networks providing efficient and reliable point-to point and broadcast services[J]. Wireless NelworJes, 2004,10 (4):359- 366.
  • 2Varvargos E A, Vasileios G, Nikolaos K. The slow start power controlled MAC protocol for mobile ad hoc networks and its performance analysis [J]. Ad Hoc Networks, 2009,7(6) : 1136-1149.
  • 3Anantvalee T, Wu J. A survey on intrusion detection in mobile Ad Hoc networks [C]//Wireless Network Security, Boston: Springer Science + Business Media, LLC, 2007 : 159-180.
  • 4Dill D L. The Murphi verification system[C]//Pro ceedings of the 8th International Conference on Computer Aided Verification. London: Springer-Verlag, 1996:390 -393.
  • 5Mitchell J C,Mitchell M,Stern U. Automated analysis of cryptographic protocols using Murphi[C]//1997 IEEE Symposium on Security and Privacy. Oakland.. IEEE Computer Society, 1997 : 141-151.
  • 6Yi P,Jiang Y C,Zhong Y P,et al. Distributed intrusion detection for mobile Ad Hoc networks[C]//Symposium on Applications and the Internet Workshops, Washington D C:IEEE Computer Society, 2005:94-97.
  • 7Ferng H W,Liu C L. Design of a Joint Defense System for Mobile Ad Hoc Networks[DB/OL]. [2009-11-10]. http=//ieeeocplore, ieee. org/stamp/stamp, jsp? tp = &arnumber= 1682923&userType= &tag= 1.
  • 8杨清,李方敏.移动Ad Hoc网络联合路由入侵检测模型研究[J].计算机工程与应用,2009,45(13):114-118. 被引量:2
  • 9Vasan A,Miller R E. Specification and analysis of the DCF Protocol in the 802.11 Standard using Systems of Communicating Maehines[EB/OL]. [2009-08-10]. http ://hdl. handle, net/1903/1196.
  • 10Bicakci K,Tavli B. Denial-of-service attacks and countermeasures in IEEES02. 11 wireless networks[J]. Computer Standards & Interfaces ,2009,31 : 931-941.

二级参考文献21

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Yi Ping Zhong Yiping Zhang Shiyong.AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS[J].Journal of Electronics(China),2006,23(3):417-422. 被引量:2
  • 3Li Yi,Wei June.Guidelines on selecting intrusion detection methods in MANET[C]//Proc of ISECON,2004,21:1022-1039.
  • 4http://www.ietf.org/rfc.htm.
  • 5Sun B,Wu K,Pooch U.Routing anomaly detection in mobile ad hoc networks[C]//Proceedings of the 12th International Conference on Computer Communications and Networks,2003:20-23.
  • 6Kachirski,Oleg,Ratan Guha.Effective intrusion detection using multiple sensors in wireless Ad hec networks[C]//Proccedings of the 36th Hawaii International Conference on System Sciences,2002.
  • 7Zhang Yongguan,Lee Wenke.lntrusion detection techniques for mobile MANET[J].Wireless Networks Journal,2003,9(5):545-556.
  • 8Huang Yi-an,Wenke lee.A coopèrative intrusion detection system for ad hac networks[C]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks,2003.
  • 9Tseng Chin-Yang.A specification-based intrusion detection system for AODV[C]//Proc of the ACM Workshop on Security of Ad Hoc and Sensor Networks,2003.
  • 10Deng Hongmei,Zeng Qing-An,Agrawal D P.SVM-based intrusion detection system for wireless Ad ho cnetworks[C]//Proceedings of the 58th IEEE Vehicular Technology Conference,2003.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部