期刊文献+

无线Ad hoc分层攻击仿真模型 被引量:1

Wireless Ad hoc layered attack simulation mode
下载PDF
导出
摘要 无线Ad hoc网络的安全性已经引起广泛关注,但目前还没有专门针对Ad hoc网络攻击的仿真平台。通过对网络仿真软件NS2移动节点进行分析,着重研究分裂对象模型的实现,在此基础上扩展移动节点功能,提出一种攻击仿真软件模型,并给出详细设计,最后提出一个跨层联合攻击场景通过攻击仿真软件进行了模拟。 The security of wireless Ad hoc Networks has aroused attention.But there doesn't exist special simulation software for Ad hoc attack.NS2 mobility node is analyzed firstly,then the ability of mobility node is expanded based on stressly studying on splitting object mode,an attack simulation software mode is introduced,meanwhile particular design is narrated,a cross-layer join attack is simulated through the software at last.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第24期81-84,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60573141 No.60773041) 国家高技术研究发展计划(863)(No.2007AA01Z404 No.2007AA01Z478) 江苏省自然科学基金(No.BK2008451) 江苏省高技术研究计划(No.BG2006001) 现代通信国家重点实验室基金(No.9140C1105040805) 江苏省高校科技创新计划项目(No.CX08B-085Z No.CX08B-086Z)~~
关键词 AD HOC NS2 安全 攻击仿真 Ad hoc Network Simulator Version 2(NS2) security attack simulation
  • 相关文献

参考文献8

  • 1Welch D,Lathrop S.Wireless security threat taxonomy[C]//Proceedings of the 2003 IEEE Workshop on Information Assurance, West Point, NY, USA Jun 18-20,2003.Los Alamitos, CA, USA: IEEE Computer Society,2003:76-83.
  • 2Hu Yih-Chun.A survey of secure wireless ad hoc routing[J]. IEEE Security&Privacy,2004,2(3) :28-39.
  • 3Gupta V.Denial of service attacks at the MAC layer in wireless ad hoc networks[C]//Proc of the IEEE MILCOM 2002.Los Alamitos,CA:IEEE Computers Society Press,2002:1118-1123.
  • 4Fall K,Varadhan K.The NS manual[Z].2007.
  • 5Welch B.Practical programming in Tcl and Tk[M].[S.l.]:Prentice Hall, 1995.
  • 6蒋廷耀,杨景华,李庆华.移动Adhoc网络安全技术研究进展[J].计算机应用研究,2005,22(2):1-4. 被引量:9
  • 7Ren Wei,Yeung Dit-Yan,Jin Hai, et al.Pulsing RoQ DDoS attack and defense scheme in mobile Ad Hoc networks[J].International Journal of Network Security,2007,4(2):227-234.
  • 8石硕,顾学迈,张文彬,沙学军.移动Ad hoc网络的NS2仿真机制及代码分析[J].计算机工程与设计,2008,29(18):4639-4643. 被引量:6

二级参考文献34

  • 1马健丽.移动Ad hoc网络的NS仿真[J].计算机工程,2005,31(B07):176-177. 被引量:4
  • 2l Chlamtac, M Conti, et al. Mobile Ad hoc Networking: Imperatives and Challenges[J]. Ad hoc Net works, 2003,1(1) :13-64.
  • 3Luis F G Sarmenta. Sabotage-tolerance Mechanism for Volunteer Computing Systems [ J ]. Future Generation Computer Systems, 2002,18(4) :561-572.
  • 4C Perkins. Highly Dynamic Destination-Sequenced Distance-Vector routing ( DSDV ) for Mobile Computers [ C ]. Proceedings of SIGCOMM, 1994.
  • 5S Murthy, et al. An Efficient Routing Protocol for Wireless Networks[ J ]. Mobile Networks and Applications, 1996,1 ( 2 ) : 183-197.
  • 6C E Perkins, E M Royer. Ad hoc On-demand Distance Vector Routing[J]. IEEE Workshop on Mobile Computing Systems and Applications, 1999,(2) :90-100.
  • 7D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[ C]. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1994, ( 12 ) : 158-163.
  • 8K Sanzgiri, B Dahill, et al. A Secure Routing Protocol for Ad hoc Networks [ C ]. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002. 1-10.
  • 9Hongmei Deng,et al. Routing Security in Wireless Ad hoc Networks[J]. IEEE Communications Magazine,2002, (10) :70-75.
  • 10C1 Karlof, D Wager. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [ J ]. Ad hoe Networks, 2003, ( 1 ) :293-315.

共引文献13

同被引文献6

  • 1NICHOLSON A J, CHAWATHE Y, CHEN M Y, et al. Improved Access Point Selection [ C ] ff Proceedings of the 4th International Conference on Mobile Systems, Applications and Services. ACM, Uppsala, Sweden: MobiSys, 2006: 233-245.
  • 2JUDD G, STEENKISTE P. Fixing 802.11 Access Point Selection [ J ]. ACM SIGCOMM Computer Communication Review, 2002, 32(3) : 31-31.
  • 3KUROSEJF,ROSSKW.计算机网络自顶向下方法[M].北京:机械工业出版社,2008.
  • 4CASSELL B A, ALPEROVICH T, WELLMAN M P, et al. Access Point Selection under Emerging Wireless ;Fechnologies [ C] //Sixth Workshop on the Economics of Networks, Systems, and Computation. San Jose: CA, 2011 : 125-131.
  • 5KOZISEK S E, COPPAGE C M, MORRILL R J. System and Method for Selecting an Access Point: US, Patent 7,940,735 [P] 2011-05-10.
  • 6王胜灵,崔勇,徐恪,吴建平.WLAN中基于“小区呼吸”的多约束负载均衡[J].计算机学报,2009,32(10):1947-1956. 被引量:4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部