期刊文献+

DSR协议下数据包攻击及防御机制 被引量:11

Packet Attack and Defense in Mobile Ad Hoc Network
下载PDF
导出
摘要 移动Ad-hoc网络又称移动自组网、多跳网络,是一种特殊的、在不借助中心管理的情况下,在有限的范围内实现多个移动终端临时互联的网络。由于Adhoc网络自身的特殊性,其路由协议的设计与传统固定网络有很大不同,而且种类繁多,DSR协议便是其中一种。DSR协议也被称做动态源路由协议,它作为Ad-hoc网络的路由协议之一,最大特点是在发送的每个数据包中放入一个完整的、按序排列的路由信息,并且在传递数据包的过程中依赖着这些路由信息去完成工作。文章主要介绍了Ad-hoc网络中的DSR协议的工作方式,针对其安全性提出一种新的攻击模型——数据包攻击,并通过模拟实验,给出了数据包攻击的检测方法和防御策略,能够成功地发现并有效地阻碍数据包攻击。 A mobile ad-hoc network is a self-configuring infrastructureless network of mobile devices connected by wireless. DSR protocol, also known as dynamic source routing protocol, it is one of the Ad-hoc network routing protocols. The largest features of the DSR protocol is the packets will carry a complete and orderly routing information, and rely on routing information to complete the work. Although this approach has brought many advantages, such as more efficient use of bandwidth resources and save a lot of the cost of maintaining routing information, etc. It still have a lot of security risks. The paper introduces the work of the DSR protocol, and presents a new attack model for their safety - packet attack. Through simulation experiments, given a packet attack detection methods and defense strategies, able to successfully and effectively impede the packet attacks.
作者 黄心砚 易平
机构地区 上海交通大学
出处 《信息网络安全》 2012年第7期35-39,共5页 Netinfo Security
关键词 Ad—hoc网络 DSR协议 数据包攻击 NS-2 Ad-hoc network DSR protocol packet attack NS-2
  • 相关文献

参考文献6

  • 1通信百科.Adhoc网络[EB/OL].http://baikec114.net/viewasp?AdHoc%CD%F8%C2%E7#13,2012-05-15.
  • 2David B. Johnson David A. Maltz Josh Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks [R]. Computer Science Department Carnegie Mellon University, 1999.
  • 3蔡继文,易平,周雍恺,田野,柳宁.DSR协议下3种攻击的影响比较与仿真研究[J].计算机工程,2009,35(21):155-158. 被引量:3
  • 4百度百科.聚类算法[EB/OL].http://baikebaidu.com/view/69222.htm,2012-05-15.
  • 5The VINT Project, The Network Simulator-ns-2[EB/OL]. http: //www.isi.edu/nsnarrgns/,2002-05 -07/2012-05-15.
  • 6K P Soman Shyam Diwakar V Ajay.Insight into Data Mining Theoryand Practice[M].北京:机械工业出版社,2009.1.

二级参考文献8

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 3Akyildiz I F, Wang Xudong. A Survey on Wireless Mesh Networks[J]. IEEE Communications Magazine, 2005, 43(9): 23-30.
  • 4Hu Y C, Perrig A, Johnson D B. Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks[C]//Proc. of the 8th ACM Int't Conf. on Mobile Computing and Networking. Atlanta, GA, USA: [s. n.], 2002: 23-28.
  • 5Hu Y C, Perrig A, Johnson D B. Wormhole Attacks in Wireless Networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 370-380.
  • 6Molsa J V. Increasing the DOS Attack Resiliency in Military Ad Hoc Networks[C]//Proc. of Military Communications Conference. Atlantic City, New Jersey, USA: [s. n.], 2005: 2282-2288.
  • 7Deng Hongmei, Li Wei, Agrawal D. Routing Security in Wireless Ad Hoc Networks[J]. Communications Magazine, 2002. 40(2): 70-75.
  • 8Broch J, Maltz D A, Johnson D B, et al. A Performance Comparison of Multi-hop Wireless Ad Hoc Network Routing Protocols[C]//Proc. of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. [S. l.]: ACM Press, 1998: 85-97.

共引文献2

同被引文献72

  • 1刘阳,朱方金,史清华.一个CHAP认证协议的改进方案[J].计算机工程,2005,31(5):168-169. 被引量:6
  • 2刘家芬,周明天.对安全协议重放攻击的分类研究[J].计算机应用研究,2007,24(3):135-139. 被引量:16
  • 3章毓晋.图像工程(上册)图像处理[M].北京:清华大学出版社,2006.
  • 4Snort官方网站TheSnortBlog[EB/OL]http://wwwsnort.org.
  • 5王景.新基于神经网络技术的网络入侵检测系统研究与实现[D].长沙:国防科技大学,2002.
  • 6DouglasC.Schmidt,StephenD.Huston.C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks (C++ln- DepthSeries)[M]. Addison-Wesley Professional, 2002.
  • 7王映民,孙韶辉等.TD-LTE技术原理和系统设计[M].北京,人民邮电出版社.2010.6.
  • 8CNNIC.第33次中国互联网络发展状况统计报告[R].北京:中国互联网信息中心,2013.
  • 9CNCERT. 2013年计算机病毒疫情调查报告[R].北京:CNCERT, 2013.
  • 10CVERC.病毒监测周报[R].第五百五十六期,2013.

引证文献11

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部