期刊文献+

移动Ad hoc网络按需路由协议中的虫洞问题研究

Research on the Wormhole of On-demand Routing in Mobile Ad hoc Netwoks
下载PDF
导出
摘要 由于移动Ad hoc网络具有动态变化的特性以及自组织和多跳性的特点,更容易遭受多种恶意攻击。其中虫洞攻击就是最严重的一种攻击。本文详细剖析了虫洞问题,在总结已有解决方案的基础上提出了一种简洁的解决方案。此方案利用路由发现过程中中间结点计算的MAC值以及邻居维护机制提供的认证信息一起能够很好的抵抗虫洞攻击,提高了路由协议的安全性。 Mobile Ad hoc networks which has the dynamic and self-organization and multi-jumping feature is more vulnerable to a variety of malicious attacks.Wormhole is the most serious attack.In this paper,it analyzed in detail the wormhole problem,and proposed a strategy to solve it.The chained k-MAC values computed by all intermediate nodes during the route discovery,together with the authenticated neighbor information provided by the neighbor maintenance scheme,enable it to detect wormhole and varied attacks derived from it,which can enhance the safety of routing protocol
出处 《中国新通信》 2010年第7期11-14,共4页 China New Telecommunications
关键词 移动AD HOC网络 恶意攻击 虫洞 mobile ad hoc networks malicious attacks wormhole
  • 相关文献

参考文献1

二级参考文献14

  • 1Corson S, Macker J. Mobile Ad hoc networking (MANET) : routing protocol performance issues and evaluation considerations. RFC 2501, 1999.
  • 2David Johnson B, David Maltz A, Yih-Chun Hu. The dynamic source routing Protocol for mobile Ad hoc networks (DSR). http://www. ietf.org/internet-drafts/draft-ietf-manet-dsr-09.tact,2003.
  • 3Charles Perkins E, Elizabeth M. Belding-royer, Samir Das R. Ad hoc on-demand distance vector (AODV)routing, RFC 3561, http:/www.ietf.org/rfc/rfc3561.txt, 2003.
  • 4Schuba C, Krsul I, Kuhn M, et al.Analysis of a denial of service attack on TCP. Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland,USA, 1997:208-223.
  • 5Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267, 1998.
  • 6CIAC, H-02: SUN's TCP SYN Flooding Solutions,Information Bulletin, 1996.
  • 7Aura T, Nikander P. Stateless connections. Proc. of 1st International Conference of Information and Communication Security ( ICICS97 ), Lecture Notes in Computer Science 1334, 1997: 87-97.
  • 8Papadimitratos P, Haas Z. Secure routing for mobile ad hoc networks. Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX,2002: 27-31.
  • 9Hu Yichun, Adrian Perrig, David Johnson B. Ariadne:A secure on-demand routing protocol for ad hoc networks. Proceedings of the MobiCom, Atlanta, Georgia, USA, 2002: 12-23.
  • 10Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, et al.Belding-Royer. A secure routing protocol for ad hoc networks. Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP),Paris, France, 2002: 78-86.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部