期刊文献+

一种改进的AODV安全路由协议 被引量:2

An improved AODV secure route protocol
下载PDF
导出
摘要 针对Ad Hoc网络的黑洞攻击问题,基于AODV协议提出一种采用"逆向逐节点验证"的解决方案.本方案使用控制报文和数据报文检查网络中是否存在黑洞节点,确定黑洞节点的位置并进行排除.中间节点也对可疑节点进行验证,将黑洞攻击危害降到最低.与现有其他方案的比较表明,改进的方案在有效抵御针对Ad Hoc网络黑洞攻击的同时,具有更低的网络开销和网络延迟. A new scheme for preventing the "black hole attack" is proposed.It tests the destination node and verifies the node in the reverse direction using control messages and data messages.Nodes check and locate the black hole and remove it from the net.The intermediate nodes also verify the dubious node to minimize the damage caused by the black hole attack.Our scheme can effectively prevent the "black hole attack" and has low network overhead and transmission delay compared to the existing schemes.
出处 《中国科学院研究生院学报》 CAS CSCD 北大核心 2011年第6期801-805,共5页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家高技术研究发展计划(2009AA01Z418) 中央高校基本科研业务费专项资金(YWF1002009) 中国博士后科学基金(20090460192)资助
关键词 AD HOC网络 安全路由 AODV协议 黑洞攻击 Ad Hoc network secure route AODV protocol black hole attack
  • 相关文献

参考文献2

二级参考文献16

  • 1Sin H A,IEEE INFOCOM'99,1999年,202页
  • 2Ko Y,The fourth Annual ACM/IEEE Int Conference on Mobile Computing and Networking,1998年,66页
  • 3Das S,The IEEE the Seventh Intemational Conference on Computer Communication and Networks(IC3N'98),1998年,153页
  • 4Chiang C,IEEE Singapore Internatioal Conference on Networks,1997年,197页
  • 5Due R,IEEE Personal Commun,1997年,4卷,1期,36页
  • 6Sanjay Ramaswamy,Fu Huirong,Manohar Sreekantaradhya,et al.Prevention of cooperative black hole attack in wireless Ad Hoc networks[C].Vegas,Nevada,USA:International Conference on Wireless Networks,2003.
  • 7Zdravko Karakehayov.Using reward to detect team black-hole attacks in wireless sensor networks[EB/OL].http://www.sics.se/realwsn05/proceedings.html,2005.
  • 8Yau Po-Wah,Chris J Mitchell.A secure routing protocol for mobile Ad Hoc networks[J].International Conference on Mobile Ad-hoc and Sensor Networks (MSN),2005(12):13-15.
  • 9Pankaj Goyal,Kumar Kapil.Prevention from gray hole attacks in MANETS[EB/OL].http://www.cse.iitk.ac.in/users/cs634/www/Html/projects_04.html.
  • 10Hu Yih-Chun,Adrian Perrig,David B Jojnson.Wormhole attacks in wireless networks[EB/OL].www.sparrow.ece.cmu.edu/~adrian/projects/wormhole-jsac.pdf.

共引文献107

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部