期刊文献+

移动自组织网络中内部丢包的检测模型

A New Detection Model for Insider Packet Dropping Attacks in Mobile ad hoc Network
下载PDF
导出
摘要 无线移动自组织网络中数据的传输是基于中间节点的合作转发的,但由于内部自私节点为了节省带宽和电量或者网络受到恶意节点的攻击,导致丢包行为发生,网络性能严重降低。基于无线自组织网络常用的路由协议AODV,提出了一种新的针对内部丢包攻击的检测模型。该检测模型引入旁信道概念,旁信道节点和看门狗共同检测并记录节点转发报文行为,采用邻居信息表存放检测结果,当相应节点的记录值达到一定下限时就被隔离出网络。由于旁信道可以发送警报报文,该模型能够同时检测到自私节点或合作攻击节点引起的内部丢包攻击。 In mobile ad hoc network, data transmission needs the cooperation of the intermediate nodes. But sometimes internal selfish nodes just want to save their bandwidth and power or the network is under attack from malicious nodes, which lead to packets dropping and dramatically degrades network performance. A new detection model against the insider packets dropping attacks is proposed based on the analysis of the common routing protocol AODV in the ad hoc network. The proposed model uses the concept of side channel. In this detection model, the watchdog and side channel nodes monitor the behavior of intermediate nodes, and each node maintains a new neighbor information table which contains neighbor nodes' trust value. When the node' s trust value reaches the negative threshold, it is determined as a malicious node and isolated from the network. Because the side channel can send alarm message, packets dropping attacks by selfish nodes or cooperation attack nodes could be detected.
出处 《信息安全与技术》 2012年第12期10-14,共5页
关键词 无线自组织网络 内部丢包攻击 检测模型 信誉模型 旁信道 mobile Ad Hoc network insider packets dropping detection model reputation mode side channel
  • 相关文献

参考文献12

  • 1张中科,汪芸.无线自组织网络下抵抗内部节点丢弃报文攻击的安全通信模型[J].计算机学报,2010,33(10):2003-2014. 被引量:7
  • 2Levente Buttyán,Jean-Pierre Hubaux.Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks[J].Mobile Networks and Applications.2003(5)
  • 3Kevin Lai Sergio Marti,Giuli T J,Mary Baker.Mitigating routing misbehavior in mobile ad hoc networks[].Proceedings of th Annual International Conference on Mobile Computing and Networking(MOBICOM’).2000
  • 4National Institute of Standards and Technology.Valiated FIPS 140-1 and FIPS 140-2 Cryptographic Modules[]..2011
  • 5LIU K,DENG J,Varshney P K,et al.An acknowledgment-basedapproach for the detection of routing misbehavior in MANETs[].IEEE Transactions on Mobile Computing.2007
  • 6PATCHA A,MISHRA A.Collaborative security architecture for black hole attack prevention in moible Ad hoc networks[].Proc of Radio and Wireless Conference.2003
  • 7Anderegg L,Eidenbenz S.On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks[].Procof the ACM MobiCom.2005
  • 8S.E.P.Santi,G.Resta."COMMIT:A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks,"[].th IEEE In’’tl WkspAlgorithms WirelessMobileAd Hocand SensNet.2005
  • 9Chenqi Song et al.Protocols for Stimulationg Packet Forwarding in Wireless Ad Hoc Networks[].Wireless Communications.2010
  • 10S.Buchegger,J.-Y.L.Boudec."Performance Analysis of the Confidant Protocol,"[].Procrd MobiHoc’’.2002

二级参考文献16

  • 1Shao M, Zhu S. A cross-layer dropping attack in video streaming over Ad Hoc networks//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (Securecomm'08). Istanbul, Turkey, 2008: 1-8(Article No. : 25).
  • 2Marti S, Giuli T, Lai K et al. Mitigating routing misbehavior in mobile Ad Hoe networks//Proceedings of the 6th Interna tional Conference on Mobile Computing and Networking (Mobicom'00). Boston, USA, 2000:255-265.
  • 3Lee S, Choi Y. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks//Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06). Alexandria, USA, 2006: 59-70.
  • 4Khalil I, Bagchi S. Mispar: Mitigating stealthy packet dropping in local-monitored multi hop wireless Ad Hoc networks//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (Se curecomm'08). Istanbul, Turkey, 2008:1 10(ArticleNo. : 28).
  • 5Liu K. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 2007, 6(5): 536-550.
  • 6Kozma W, Lazos L. REAct: Resource efficient accountability for node misbehavior in Ad Hoc networks based on random audits//Proceedings of the 2nd ACM Conference on Wireless network security (Wisec' 09 ). Zurich, Switzerland, 2009 : 103- 110.
  • 7Sun Y, Yang Y. Trust establishment in distributed net works: Analysis and modeling//Proceedings of the IEEE In ternational Conference on Communications (Icc' 07). Glas gow, Scotland, 2007:1266 -1273.
  • 8Liu F, Cheng X, Chen D. Insider attacker detection in wireless sensor networks//Proceedings of the 26th IEEE Interna tional Conference on Computer Communications (Infocom' 07). Anchorage, USA, 2007:1937- 1945.
  • 9Brown J, Du X. Detection of selective forwarding attacks in heterogeneous sensor networks//Proceedings of the IEEE In ternational Conference on Communications (ICC'08). Beijing, China, 2008:1583- 1587.
  • 10Wang C, Feng T, Kim J et al. Catching packet droppers and modifiers in wireless sensor networks//Proceedings of 6th IEEE Conference on Sensor, Mesh & Ad Hoe Communication Networks (Second09). Rome, Italy, 2009:529 -537.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部