期刊文献+

MANET主机安全自配置协议研究

A Secure Hosts Autoconfiguration Protocol for MANET
下载PDF
导出
摘要 提出一种基于IPv6的安全地址自配置方案SMAAC(Security MANET Address Auto-Configuration),新节点以口令方式通过节点验证服务器的验证后,由该服务器发放节点授权票据,由邻居节点进行授权票据检验并根据相关硬件信息产生IPv6地址,并完成地址冲突检测,保证网络内节点身份合法性.最后对该方案进行了安全及性能分析与仿真. A novel security address autoconfiguration SMAAC scheme is presented that based on IPv6, after a new node passed the identifying of the authorization server by the way of password and admitted to join the net, the server broadcasters a permitting ticket for the node, the neighbors of the node check the tickets and produce the IPv6 address according to the hardware information of the new node, and finish the duplicate address detection, the whole process ensures the validity of the new nodes. The security and performance of the protocol are analyzed and simulated at the end.
作者 薛咏 冯博琴
出处 《微电子学与计算机》 CSCD 北大核心 2010年第5期31-34,共4页 Microelectronics & Computer
关键词 移动自组网 地址自配置 授权票据 MANET address autoconfiguration ticket granting
  • 相关文献

参考文献8

  • 1解争龙.基于无线Ad Hoc网络的入侵检测系统体系结构研究[J].微电子学与计算机,2007,24(5):103-105. 被引量:3
  • 2谭运宝,钟诚,张尊国.一种基于邻居合作监测的移动Ad hoc网络信任模型[J].微电子学与计算机,2008,25(10):227-230. 被引量:3
  • 3Wang Chiungying, Li Chengying. Global connectivity for mobile IPv6- based Ad Hoc networks[J]. AINA, 2005: 807 - 812.
  • 4Ilkyun Park, Younghan Kim. Sangsan Lee. IPv6 address allocation in hybrid mobile Ad- Hoc networks[ C]//WSWFEUS. Vienna, 2004: 58 - 62.
  • 5WildmanJeffrey, Harnel David. Performance and scaling of wireless Ad hoe IPv6 stateless address[C]//MILCOM. Orlando, 2007:1 - 9.
  • 6Fabio Buiati, Ricardo Puttini. A secure autoconfiguration protocol for MANET nodes, lecture notes in computer science[ M]. Berlin/Heidelberg: Springer, 2004: 108 - 121.
  • 7Shenglan Hu, Chris J Mitchell. Improving IP address autoconfiguration security in MANETs using trust modeling [M]. Barlin: Springer, 2005:83 - 92.
  • 8Ana Cavalli, Jean- Marie Orset. Secure hosts autoconfiguration in mobile Ad hoe networks[C]//ICDCSW. Tokyo, 2004:809 - 814.

二级参考文献10

  • 1张行文,孙宝林.Ad Hoc网络移动模型研究[J].计算机工程与应用,2006,42(29):126-128. 被引量:7
  • 2Snort-Wireless[EB/OL].http://www.snort-wireless.org
  • 3Oleg Kachirski,Ratan Guha.Effective intrusion detection using multiple sensors in wireless Ad Hoc networks[A].Proceedings of the 36th Hawaii International Conference on System Sciences[C].2003
  • 4Krings A W,Harrison W S,Hanebutte N,et al.A two-layer approach to survivability of networked computing systems[EB/OL].http://www.cs.uidaho.edu/~krings/
  • 5Wayne Jansen,Peter Mell,Tom Karygiannis,et al.Applying mobile agents to intrusion detection and response[EB/OL].http://csrc.nist.gov/mobileagents/publication/maresponse.pdf
  • 6Marti S, Giuli T J, Lai K, et al. Mitigating muting misbehavior in mobile Ad Hoc networks[ C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM). New York: ACM Press, 2000: 255 - 265.
  • 7Buchegger S, Boudec Le J Y. Performance analysis of the confidant protocol: cooperation of nodes fairness in dynamic ad- hoc networks[C]//Proc, of the ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoe 2002). New York: ACM Press, 2002:226-236.
  • 8Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in Mobile Ad hoe Networks[ C]//Proceedings of the Sixth IFIP Conference On Security Communications, and Multimedia. Portoroz, Slovenia, 2002:107 - 121.
  • 9Anantvalee T, Jie Wu. Reputation- based system for encouraging the cooperation of nodes in mobile Ad Hoe networks[ C]//IEEE International Conference on Communications 2007. Glasgow, Scotland, 2007: 3383- 3388.
  • 10Johnson D, mALTZ D, Hu Y C. The dynamic source routing protocol (DSR) for mobile Ad Hoe networks for IPv4[EB/OL]. (2007 - 02 - 15) [2008 - 04 - 15]. http://www. ietf. org/rfc/rfc4728. txt.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部