期刊文献+

一种针对OLSR协议典型攻击的有效防御机制

Effective Defense System Based on the Classical Attack in the OLSR Routing Protocol
下载PDF
导出
摘要 分析了自组网中OLSR(Optimized Link State Routing Protocol)路由协议的脆弱性以及它可能遭受的各种攻击.针对这些潜在的攻击,将公钥机制和信任模型结合,提出了一种防御方案,该方案结合了以反应式PKI为基础进行的公钥签名和信任评价机制,并阐述了如何通过该防御机制有效地防御攻击,最后,用NS仿真工具对该防御机制进行了仿真,并论证了防御方案的可行性. This paper analyzes the weakness of the OLSR protocol in the Self Organized Network and introduces some attacks that the protocol may suffer.A corresponding defensive scheme in combination with the reactive PKI and a trust model is presented and the mechanism to resist attacks is introduced.Finally,we use the NS2 to simulate the procedure of the defensive mechanism and discuss the feasibility of the scheme.
出处 《南通大学学报(自然科学版)》 CAS 2010年第3期9-13,共5页 Journal of Nantong University(Natural Science Edition) 
基金 国家自然科学基金项目(60973139 60773041 60905040) 江苏省自然科学基金项目(BK2008451) 2006江苏省软件专项 江苏省现代服务业发展专项资金 国家和江苏省博士后基金(0801019C 20090451240 20090451241) 江苏高校科技创新计划项目(CX09B_153Z CX08B_086Z) 苏州大学计算机信息处理技术重点实验室基金(2010年) 江苏省六大高峰人才项目(2008118)
关键词 AD HOC OLSR 典型攻击 防御机制 ad hoc optimized link state routing protocol typical attack defensive mechanism
  • 相关文献

参考文献8

  • 1王金龙,等.Ad Hoc无线移动网络[M].北京:国防工业出版社,2004-5.
  • 2Yi P,Dai Z,Zhang S,et al.A new routing attack in mobile ad hoc networks[J].International Journal of Information Technology,2005,11 (2):83-94.
  • 3Nait-Abdesselem F,Yoo J K,Bensaou B.Detecting and avoiding wormhole attacks in optimized link state routing protocol[C] //IEEE Wireless Communications and Networking Conference(IEEE WCNC),Hongkong,2007:1-2.
  • 4Kannhavong B,Nakayama H,Kato N,et al.A collusion attack against OLSR-based mobile ad hoe networks[C] // IEEE GLOBECOM 2006 proceedings,San Francisco,CA,USA,2006:2-3.
  • 5Vilela A J P,Barros J.A cooperative security scheme for optimized link state muting in mobile ad-hoc networks[C] // Proc.of the 15th IST Mobile and Wireless Communications Summit,Mykonos,Greece,2006:1-3.
  • 6Zhan H W,Zhou Y.Comparison and analysis AODV and OLSR muting protocols in ad hoc network[C] //2008 International Conference on Wireless Communications,Dalian,China,2008:1-4.
  • 7Hafslund A,Tnnesen A,Andersson J,et al.Secure Extension to OLSR[C] //OLSR Interop Workshop,San Diego,USA,2004:3-4.
  • 8Adjih Cédric,Clausen Thomas,Laouiti Anis,et al.Securing the OLSR routing protocol with or without compromised nodes in the network[R].Technical Report INRIA RR-5494,HIPERCOM Project,INRIA Rocquencourt,February 2005:15-25.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部