期刊文献+

链路守卫节点合作监测检测恶意合谋攻击

Detecting Malicious Colluding Attack Using Cooperation Monitoring of Guard Nodes
下载PDF
导出
摘要 针对移动Ad Hoc网络环境中合谋节点的恶意丢包行为,将源节点及其传输链路上各守卫节点所检测的结果结合起来,设计一种通过守卫节点合作监测来检测发现恶意合谋攻击的方法.NS2上仿真实验结果表明,该方法能够有效应对合谋节点的恶意丢包行为,降低恶意路由出现的概率,提高网络的分组投递率. For the packet loss behavior of the malicious node collusion in the mobile Ad hoc network environment,this paper presents a detection method against colluding nodes.This detection method focuses on cooperation monitoring of guard nodes and computes the trust values of transmission link with the monitoring results between source node and related guard nodes,and then applies the link trust values to avoid colluding nodes.The NS2 based simulation results show that the proposed method can effectively reduce the probability of misbehaving routes caused by colluding nodes and improve the packet delivery rate.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第9期179-182,共4页 Microelectronics & Computer
基金 广西自然科学基金项目(2011GXNSFA018152) 广西科学基金项目(桂科基0575014) 广西大学拔尖创新团队建设计划(211-3-1-45)
关键词 移动AD HOC网络 合谋节点 恶意丢包 守卫节点 mobile ad hoc network colluding node malicious packet dropping guard node
  • 相关文献

参考文献6

  • 1Buchegger S, Boudec J Y L. Performance analysis of the CONFIDANT protocol[C]// Proceedings of ACM Mobile hoe, Lausanne, Switzerland: ACM, 2002: 226-236.
  • 2Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in Mobile Ad hoe Networks[C]// Proceedings of the Sixth IFIP Conference OI3 Security Communications, and Multimedia. Portoroz, Slovenia.IEEE, 2002.107-121.
  • 3Buttyan L, Hubaux J P. Stimulating cooperation in self --organizing Mobile Ad Hoc Networks[J]. Mobile Networks and Applications. 2003, 8(5): 579 --592.
  • 4Liu K, Deng J, Varshney P K, et al. An acknowledgment-based approach for the detection of Routing Misbehavior in MANETs[J]. IEEE Transactions on Mobile Computing, 2007, 6(5):488--501.
  • 5Graffi K, Mogre P S, Hollick M, et ak Detection of collu- ding misbehaving nodes in mobile ad hoc and wireless mesh networks[C]//Proceedings of 22007 Global Telecommuni- cations Conference Washington, DC; IEEE, 2007:5097 --5101.
  • 6谭运宝,钟诚,张尊国.一种基于邻居合作监测的移动Ad hoc网络信任模型[J].微电子学与计算机,2008,25(10):227-230. 被引量:3

二级参考文献6

  • 1张行文,孙宝林.Ad Hoc网络移动模型研究[J].计算机工程与应用,2006,42(29):126-128. 被引量:7
  • 2Marti S, Giuli T J, Lai K, et al. Mitigating muting misbehavior in mobile Ad Hoc networks[ C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM). New York: ACM Press, 2000: 255 - 265.
  • 3Buchegger S, Boudec Le J Y. Performance analysis of the confidant protocol: cooperation of nodes fairness in dynamic ad- hoc networks[C]//Proc, of the ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoe 2002). New York: ACM Press, 2002:226-236.
  • 4Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in Mobile Ad hoe Networks[ C]//Proceedings of the Sixth IFIP Conference On Security Communications, and Multimedia. Portoroz, Slovenia, 2002:107 - 121.
  • 5Anantvalee T, Jie Wu. Reputation- based system for encouraging the cooperation of nodes in mobile Ad Hoe networks[ C]//IEEE International Conference on Communications 2007. Glasgow, Scotland, 2007: 3383- 3388.
  • 6Johnson D, mALTZ D, Hu Y C. The dynamic source routing protocol (DSR) for mobile Ad Hoe networks for IPv4[EB/OL]. (2007 - 02 - 15) [2008 - 04 - 15]. http://www. ietf. org/rfc/rfc4728. txt.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部