期刊文献+

基于序列号和可靠应答机制DSR安全路由的实现 被引量:2

Exploring an Effective Design of Secure Dynamic Source Routing(DSR) Protocol Using Request Sequence Number and End-to-End Acknowledgement Principle
下载PDF
导出
摘要 文章分析了动态源路由(DSR)协议面临的路由请求(route request,RREQ)报文的黑洞攻击,针对该攻击,设计一种利用可靠的端到端应答机制和根据RREQ报文序列号连续递增原则来建立路由信息表。该设计在不消耗过多资源的基础上保证路由信息。通过仿真验证该设计能够很好地抵御RREQ报文的黑洞攻击,且与经典的DSR路由协议相比,分组投递率维持在较高水平上,且平均时延很小,具有更好的性能。 Aim. The introduction of the full paper analyzes a type of black-hole attack on a route request (RREQ) packet. To avoid such attack, it proposes the exploration of a secure DSR protocol design, which is explained in sections 1 and 2. Section 1 explains that the sequence number of the RREQ packet is monotonically increasing. The core of section 2 consists of: ( 1 ) we perform the secure DSR routing protocol design with the sequence number increment principle and the end-to-end acknowledgement principle so that the route can effectively resist the black- hole attack; (2) to establish the credible routing information list, we design the procedural steps for processing the nodes in the RREQ packet and the end-to-end acknowledgement packet, which are illustrated by the block diagram shown in Fig. 2. To validate the effectiveness for resisting the black-hole attack, section 3 simulates the DSR proto-col design obtained with our method; the simulation results, given in Figs. 6 and 7, and their analysis show preliminarily that: (1) the secure DSR protocol design obtained with our method can effectively resist the black-hole attack on the RREQ packet, guarantee secure routing information without expending much resource; (2) compared with the conventional DSR protocol design, our DSR protocol design has higher packet delivery ratio and smaller average delay.
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2011年第3期361-366,共6页 Journal of Northwestern Polytechnical University
关键词 动态源路由协议(DSR) RREQ报文 端到端应答机制 分组投递率 时延 routers, design, simulation, dynamic source routing end-to-end acknowledgement, packet delivery ratio, (DSR) average protocol, route request (RREQ) packet, delay
  • 相关文献

参考文献5

  • 1Johnson D B, Mahz D A, Hu Yihchun. The Dynamic Source Routing for Mobile Ad Hoc Networks. ftp ://tip. rfceditor, org/in- notes/rfc4728, txt ,2007.2/2008.1.
  • 2Culpepper B J, Tseng H C. Sinkhole Intrusion Indicators in DSR MANETS. Proceedings of the First International Conterence on Broadband Networks ( BROADNETS'04 ), 2004.
  • 3Djenouri D, Badache N. New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks. The First International Confer- ence on Security and Privacy for Emerging Areas in Communication Networks, 2005.
  • 4Vassilaras S, Vogiatzia D, Yovanof G S. Misbehavior Detection in Clustered Ad-Hoc Networks with Central Control. Proceed- ings of the International Conference on Information Technology: Coding and Computing ( ITCC'05 ).
  • 5Asokan N, Ginzboorg P. Key Agreement in Ad Hoc Networks. Computer Communications, 2000, 23 ( 1 ) : 1627 - 1637.

同被引文献22

  • 1张红斌,杨超,马建峰.基于邻接信任的路由安全评估[J].吉林大学学报(工学版),2009,39(2):440-445. 被引量:3
  • 2Jhaveri R H,Patel S J,Jinwala D C.A novel approach for grayhole and blackhole attacks in mobile ad hoc networks.Advanced Computing & Communication Technologies (ACCT),2012 Second International Conference on.IEEE,2012:556-560.
  • 3Wang S S,Yan K Q,Wang S C.An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network.Computers & electrical Engineering,2010; 36 (1):100-113.
  • 4Bohara B,Sharma V.Analysis and prevention of effects of gray hole attacks on routing protocol in mobile ad-hoc networks.Analysis,2013; 2(6):2468-2472.
  • 5钱聪.移动自组织网络中基于信任和能量综合评价的路由机制研究.武汉:华中科技大学,2012.
  • 6Su M Y.Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems.Computer Communications,2011; 34(1):107-117.
  • 7Su M Y.A study of deploying intrusion detection systems in mobile ad hoc networks.Proceedings of the World Congress on Engineering,2012; 2(7):978-988.
  • 8Wang W,Zeng G,Yao J,et al.Towards reliable self-clustering mobile ad hoc networks.Computers & Electrical Engineering,2012; 38(3):551-562.
  • 9Yu Y,Guo L,Wang X,et al.Routing security scheme based on reputation evaluation in hierarchical ad hoc networks.Computer Networks,2010; 54(9):1460-1469.
  • 10彭志楠,叶丹霞,范明钰.移动Ad hoc网络的黑洞攻击研究[J].计算机应用研究,2009,26(11):4006-4009. 被引量:8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部