期刊文献+

DTN中抵御内部节点攻击研究

Research on resistance to internal node attack in DTN
下载PDF
导出
摘要 针对延迟/中断容忍网络(DTN,delay/disruption-tolerant networks)中的应对内部节点攻击的安全问题,详细阐述了DTN中抵御2种内部节点攻击的热点研究问题——自私节点攻击和恶意节点攻击,并分别对现有的抵御这2种攻击的解决方法进行了讨论与分析;最后总结并展望了未来研究的重点。 To solve the security problems about internal node attack in Delay/Disruption-Tolerant Networks(DTN),two attacks which become hot issues are elaborated including selfish node attack and malicious node attack.Then the existing solutions for the two problems are discussed and analyzed.Finally,the remaining problem and possible research directions are pointed out.
出处 《北京信息科技大学学报(自然科学版)》 2013年第3期57-63,共7页 Journal of Beijing Information Science and Technology University
基金 北京信息科技大学网络文化与数字传播北京市重点实验室开放课题资助(6ICDD201206 7ICDD201207)
关键词 延迟 中断容忍网络 内部节点攻击 安全问题 delay/disruption-tolerant networks internal node attack security issues
  • 相关文献

参考文献46

  • 1Fall Kevin. A delay tolerant network architecture for challenged internets [ C ] // Proceedings of ACM SIGCOMM 2003 Conference on Computer Communications. Germany : Computing Machinery,2003 : 27 Association for - 34.
  • 2Anders Lindgren, Avri Doria, Jan Lindblom, et al. Networking in the land of northern lights-two years of experiences from DTN system deployments [ C ] // Proceedings of the 2008 ACM Workshop on Wireless Networks and Systems for Developing Regions. San Francisco, California, USA : ACM, 2008 : 1 - 7.
  • 3Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, et al. Interactive wifi connectivity for moving vehicles [ C ]// Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM "08. USA: ACM, 2008:427 - 438.
  • 4Haas Zygmunt J, Small Tara. A new networking model for biological applications of ad hoc sensor networks [ J ]. IEEE Transactions on Networking,2006,14 ( 1 ) : 27 - 40.
  • 5Aaditeshwar Seth, Srinivasan Keshav. Pctical security for disconnected nodes [ C ] // Proceedings of 1^st IEEE ICNP Workshop on Secure Network Protocols, NPSec. US : Institute of Electrical and Electronics Engineers Computer Society,2005 : 31 - 36.
  • 6Erman Ayday, Hanseung Lee, Faramarz Fekri. An interative algorithm for trust and reputation management [ C ] // 2009 IEEE International Symposium on Information Theory, ISIT 2009 . 2009:2051 - 2055.
  • 7Nguyen Hoang Anh, Silvia Giordano, Alessandro Puiatti. Probabilistic roting protocol for intermittently connected mobile ad hoc network [ C ]//2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 2007:19 -24.
  • 8Antonis Panagakis, Athanasios Stavrakakis. On the effects of DTNs [ C ] // Proceedings of International Conference on System Software Workshops, COMSWA Vaios, Loannis cooperation in the 2007 2nd Communication and Middleware and RE 2007. 2007 : 1 - 6.
  • 9Merkourios Karaliopoulos. Assessing the vulnerability of DTN data relaying schemes to node selfishness [ J ]. IEEE Communications Letters,2009,13 (12) :923 - 925.
  • 10Li Yong, Su Guolong, Wu Dapeng Oliver, et al. The impact of node selfishness on multicasting in delay tolerant networks [ J ]. IEEE Transaction on Vehicular Technology, 2011,60 (5) : 2224 - 2238.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部