期刊文献+

基于OLSR路由协议的HIDA算法 被引量:1

HIDA Algorithm Based on OLSR Routing Protocol
下载PDF
导出
摘要 针对Ad Hoc网络中的虫洞攻击,根据最优链路状态路由(OLSR)协议的运行特点,提出检测伪邻居的HELLO间隔分布式算法(HIDA)。仿真结果表明,在网络平均节点数大于4、节点随机最大移动速率大于2 m/s时,HIDA算法能达到80%以上的虫洞攻击检测率。 Aiming at the wormhole attack in Ad Hoc network,according to Optimized Link State Routing(OLSR) protocol,this paper presents a HELLO Interval Distributed Algorithm(HIDA) to detect fake neighbor.Simulation results show that HIDA has wormhole attack detection rate above 80% when network average node number is greater than 4,node random maximal migration rate is greater than 2 m/s.
作者 姚胜 冷甦鹏
出处 《计算机工程》 CAS CSCD 北大核心 2010年第9期147-149,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60802024) 教育部博士点新教师基金资助项目(200806141014) 通信抗干扰技术国家级重点实验室基金资助项目
关键词 无线自组织网络 邻居探测 虫洞攻击 最优链路状态路由协议 HELLO间隔分布式算法 Wireless Ad Hoc Network(WANET) neighbor probing wormhole attack Optimized Link State Routing(OLSR) protocol HELLO Interval Distributed Algorithm(HIDA)
  • 相关文献

参考文献5

  • 1Hu Yih-Chun,Perrig A,Johnson D B.Wormhole Attacks in Wireless Networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):370-380.
  • 2Hu Yih-Chun,Perrig A,Johnson D B.Packet Leashes:A Defense Against Wormhole Attacks in Wireless Ad Hoc Net-works[C]//Proc.of the 22nd Annual Joint Conference of IEEE Computer and Communications Societies.Pittsburgh,USA:IEEE Press,2003.
  • 3Tran Phuong-Van,Hung Le-Xuan,Lee Young-Koo,et al.TTM:An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad Hoc Networks[C]//Proc.of CCNC'07.Las Vegas,USA:IEEE Press,2007.
  • 4Qian Lijun,Song Ning,Li Xiangfang.Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-path[C]//Proc.of 2005 IEEE Wireless Communications and Networking Conference.[S.l.]:IEEE Press,2005.
  • 5Maheshwari R,Gao Jie,Samir R D.Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information[C]//Proc.of INFOCOM'07.[S.l.]:IEEE Press,2007.

同被引文献6

  • 1洪亮,洪帆,彭冰,陈晶.一种基于邻居信任评估的虫洞防御机制[J].计算机科学,2006,33(8):130-133. 被引量:18
  • 2Wang X, Wong J. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoe Networks. 31st Annual Iatema- tional Computer Software and Applications Conference-Vol. 1- (COMPSAC 2007), 2007: 39-46.
  • 3Chiu HS, Lui KS. DelPHI: Wormhole Detection Mechanism for Ad Hoe Wireless Networks. International Symposium on Wireless Pervasive Computing ISWPC, 2006:6-11.
  • 4Qian L J, Song N, Li XF. Detecting and locating wormhole attacks in grLreless Ad Hoc Networks through statistical analysis of multi-path. IEEE grtreless Communications and Networking Conference, 2005:2106-2111.
  • 5Tran PV, Hun LX, Lee YK, et al. TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. Wireless Sensor Network Track at IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, 2007: 593-598.
  • 6Zhen J, Srinivas S. Preventing replay attacks for secure routing in ad hoc networks. Proc. of 2nd Ad Hoc Networks & Wireless (ADHOCNOW'03), 2003:140-150.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部