期刊文献+

基于门限的移动自组网动态地址配置方案

Dynamic address configuration based on threshold in mobile Ad hoc network
下载PDF
导出
摘要 在对抗性的MANETs中,由于存在恶意节点,节点的地址自配置无法有效执行,为了对抗恶意节点的相关安全攻击,提出了基于门限的动态地址配置方案(Threshconf)。该方案主要通过门限签名为地址配置协议提供了访问控制安全机制,保证地址自配置协议在对抗性的MANETs中有效执行;同时与其他几种地址配置方案进行了比较分析。 Due to the vicious actions of malicious nodes in an adversarial network,address auto-configuration couldn’t be carried out with effect. To thwart corresponding security attacks about address auto-configuration in MANETs,this paper presented a dynamic address configuration based on threshold in an adversarial MANETs,referred to Threshconf. Threshconf with access control constructed by using threshold signature could prevent against correlative networks and guarantee the protocol could be executed effectively in hostile networks. Finally,also discussed the performance and security of Threshconf.
出处 《计算机应用研究》 CSCD 北大核心 2010年第8期3090-3095,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(60703004) 国家教育部博士点基金资助项目(20070269005)
关键词 移动自组网 动态地址配置 恶意节点 门限签名 访问控制 Threshconf mobile Ad hoc network dynamic address configuration malicious node threshold signature access control Threshconf
  • 相关文献

参考文献11

  • 1BERNARDOS C,CALDERON M,MOUSTAFA H.Survey of IP address autoconfiguration mechanisms for MANETs,draft-bernardos-manet-autoconf-survey-03[R].2008.
  • 2BACCELLI E.address autoconfiguration for MANET:terminology and problem statement,Draft-bernardos-manet-autoconf-survey-04[R].2008.
  • 3NESARGI S,PRAKASH R.MANETconf:configuration of hosts in a mobile Ad hoc network[C] // Proc of the 21st Annual Joint Confe-rence of IEEE Computer and Communications Societies.New York:IEEE,2002:1059-1068.
  • 4SUN Yuan,BELDING-ROYER E M.Dynamic address configuration in mobile Ad hoc network[R].Santa Barbara,USA:Computer Scien-ce Department,UCSB,2003.
  • 5MOSHIN M,PRAKASH R.IP address assignment in a mobile Ad hoc network[C] // Proc of Military Communication Conference.New York:IEEE,2002:856-861.
  • 6WANG Pan,REEVES D S,NING Peng.Secure address auto-confi-guration for mobile Ad hoc networks[C] // Proc of the 2nd Annual International Conference on Mobile and Ubiquitous Systems:Networks and Services.2005:519-522.
  • 7CAVALLI A,ORSET J M.Secure hosts auto-configuration in mobile Ad hoc networks[C] // Proc of the 24th International Conference on Distributed Computing Systems.2004:809-814.
  • 8LANGER A,K(U)HNERT.Security issues in address autoconfiguration protocols an improved version of the optimized dynamic address configuration protocol[EB/OL].(2007).http://archiv.tu-chemnitz.de/pub/2007/0049/data/paper_odacp.pdf.
  • 9TAGHILOO M,TAJAMOLIAN M,DEHGHAN M,et al.Virtual address space mapping for IP auto-configuration in MANET with security capability[C] //Proc of International Conference on Advanced Infocomm Technology.New York:ACM Press,2008.
  • 10HU Sheng-lan,MITCHELL C J.Improving IP address autoconfiguration security in MANETs using trust modeling[C] // Proc of the 1st International Conference on Mobile Ad hoc and Sensor Networks.2005:83-92.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部