期刊文献+

移动Ad Hoc网络中的可信路由机制研究 被引量:3

Study of trusted routing mechanism in mobile Ad Hoc network
下载PDF
导出
摘要 作为下一代网络发展趋势之一的移动Ad Hoc网络受到各种类型的安全威胁,灰洞攻击就是其中最常见的类型之一。仿真模拟了MANET环境下的灰洞攻击,即选择性丢包攻击对MANET性能的影响。从仿真模拟中可以看出灰洞攻击对于MANET的路由影响,不仅导致丢包率增加,而且会导致端到端时延方面的增加。基于信任度的定义,提出一种可信AODV路由协议(Trusted AODV Routing,TAR),方案通过交换相邻节点的节点信任度,并计算路径信任度的方法,集合最短路径算法,从而选择合适的可信路径。通过性能分析,TAR协议在丢包率、端到端时延和路径建立时延方面,相比于AODV协议有明显的提高,能够有效地抵制灰洞攻击。 As one of the trends of next generation networks, Mobile Ad Hoc Network(MANET) suffers from various types of security threats, among of which, grayhole attack is one of the most common types. Grayhole attack is simulated(selective packet- drop attack) in mobile Ad Hoc network. From the simulation, grayhole attack makes increase in drop ratio and end-to-end delay which further makes entire network disrupted. A Trusted AODV Routing protocol (TAR) is proposed to ensure the security of MANET to prevent grayhole attack. Based on exchanging neighbor node trust value and computing path trust value, the scheme combines with the shortest path algorithm to choose the trusted routing path. From the performance analysis, TAR has signifi- cant improvement in drop ratios and end-to-end delay than AODV in presence of grayhole attacks.
作者 刘玉 殷辉
出处 《计算机工程与应用》 CSCD 2013年第11期76-79,182,共5页 Computer Engineering and Applications
基金 安徽省优秀青年人才基金项目(No.2012SQRW127)
关键词 移动AD HOC网络 可信路由 无线自组网按需平面距离向量(AODV) 灰洞攻击 mobile Ad Hoc network trusted routing Ad Hoc On-Demand Distance Vector(AODV) grayhole attack
  • 相关文献

参考文献13

  • 1Manikandan S P, Manimegalai R.Survey on mobile Ad Hoc network attacks and mitigation using routing protocols[J]. American Journal of Applied Sciences, 2012,9 ( 11 ) : 1796-1801.
  • 2Manjre B M,Gulhane V A.Seeure and reliable Ad-Hoc on demand multipath distance vector routing protocol for mobile Ad Hoe networks[C]//2011 International Conference on Information and Network Technology,2011.
  • 3Kamboj D, Sehgal P K.A comparative study of various secure routing protocols based on AODV[J].Internati0nal Journal of Advanced Computer Science and Applications, 2011,2(7) :80-85.
  • 4Vanaparthi R, Pragati G.Routing protocols to enhance security in MANETS[J].Global Journal of Computer Science and Technology, 2011,11 ( 13 ).
  • 5Liu Jinghua, Geng Peng, Qiu Yingqiang, et al.A secure rout- ing mechanism in AODV for Ad Hoe networks[C]//Proceed- ings of 2007.International Symposium on Intelligent Signal Processing and Communication System,2007.
  • 6Balfe S, Yan P W, Paterson K G.A guide to trust in mobile Ad Hoe networks[J].Security and Communication Networks, 2009.
  • 7Sukumaran S, Jaganathan V.Reputation based on demand routing protocol using mobile agent in mobile Ad-Hoc net- works[C]//International Conference on Wireless Communica- tion and Sensor Computing(ICWCSC),2010.
  • 8Ghosh T, Pissinou N, Makki K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN' 04), 2004.
  • 9Pissinou N, Ghosh T, Makki K.Collaborative trust-based secure routing in multihop Ad Hoc networks[C]//IFIP Inter- national Federation for Information Processing,2004.
  • 10Cheng Yong, Huang Chuanhe, Shi Wenming.Trusted dynamic source routing protocol[C]//The 3rd International Confer-ence on Wireless Communications, Networking and Mobile Computing, 2007.

二级参考文献14

  • 1DJENOURI D, KHELLADI L, BADACHE A N. A survey of security issues in mobile ad hoc and sensor networks[J]. IEEE Communications Surveys & Tutorials, 2005, 7(4):2-28.
  • 2ZHOU L D, ZYGMUNT J H. Securing ad hoc networks[J]. IEEE Network, 1999, 13(6):24-30.
  • 3CAPKUN S, BUTTYAN L, HUBAUX J E Self-organized public-key management for mobile ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2003, 2(1):52-64.
  • 4YI S, KRAVETS R. MOCA: mobile certificate authority for wireless ad hoc networks[A]. The 2nd Annual PKI Research Workshop (PKI 03)[C]. USA, 2003.65-79.
  • 5PIRZADA A A, MCDONALD C. Establishing trust in pure ad hoc networks[A]. Proceedings of the 27th Australasian Conference on Computer Science[C]. Australia, 2004.47-54.
  • 6ESCHENAUER L, GLIGOR V D, BARAS J. On trust establishment in mobile ad-hoc networks [J]. Security Protocols, 2004, 2845:47-62.
  • 7AZZEDIN F, MAHESWARAN M. Evolving and managing trust in grid computing systems[A]. IEEE Ccec 2002: Canadian Conference on Electrcial and Computer Engineering, Vols 1-3, Conference Proceedings[C]. Canadian, 2002.1424-1429.
  • 8ABDUL-RAHMAN A, HAILES S. A distributed trust model[A]. Proe of the 1997 New Security Paradigms Workshop[C]. New York, 1998. 48-60.
  • 9BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[A]. Proc of the European Symp on Research in Security[C]. Berlin, 1994.3-18.
  • 10JOSANG A. A subjective metric of authentication[A]. Computer Security-Esorics 98[C]. 1998. 329-344.

共引文献4

同被引文献25

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部