期刊文献+

Ad hoc网络中带有DoS阻断功能的密钥管理策略

A Key Management Strategy with the DoS Intrusion Blocking in Ad Hoc Networks
下载PDF
导出
摘要 在Ad hoc网络中密钥的安全问题已经成为研究热点,本文首先对存在的安全隐患进行了分析描述,然后从节点间信任角度出发,结合Ad hoc网络自身特点,提出了一种带DoS入侵阻断功能的分布式密钥管理策略,用于保证整个网络的安全性,提高了网络性能。 Key Security in wireless Ad hoe networks is a hot spot. This paper firstly analyses the trouble of key security in Ad hoe networks, and then proposes a key management strategy with the DoS intrusion blocking (KMDB) , derived from the aspect of the decentralized trust between nodes. The KMDB can improve the performance of network security while determining to minimize the energy consumption in Ad hoc networks, and the integral performance of the networks is improved.
作者 许芷岩 张慧
出处 《湖北第二师范学院学报》 2013年第8期60-62,共3页 Journal of Hubei University of Education
基金 湖北省教育厅B类项目
关键词 AD HOC网络 密钥管理 DoS入侵阻断 Ad hoc networks key management DoS intrusion blocking
  • 相关文献

参考文献6

  • 1许芷岩.Ad hoc网络中基于分簇的密钥认证安全策略[J].湖北第二师范学院学报,2011,28(2):52-54. 被引量:3
  • 2易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 3刘勇,英春,史美林.自组网的安全问题[J].计算机世界,2000,44(C):14-15.
  • 4Hongmei Deng, Wei Li, Dharma P. Agrawal. Routing Security in Wireless Ad Hoc Networks [ J ]. IEEE Communications Magazine, 2002.
  • 5Zhou. L and Hass. Z. Securing Ad Hoc Networks [J]. IEEE Network, 1999, 1 3 (6) :24 - 30.
  • 6Frank Stajano, Ross J. Anderson.. The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks [ J ]. Security Protocols Workshop, 1999 : 17 - 194.

二级参考文献27

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2S. Corson, J. Macker. Mobile ad hoc networking (MANET):Routing protocol performance issues and evaluation considerations.RFC 2501, http://www. ietf. org/rfc/rfc2501. txt, 1999-01.
  • 3C. Schuba, I. Krsul, M. Kuhn, et al. Analysis of a denial of service attack on TCP. In: Proc. 1997 IEEE Symp. Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press,1997. 208~223.
  • 4Haining Wang, Danlu Zhang, Kang G. Shin. Detecting SYN flooding attacks. In: Proc. the 21st Annual Joint Conf. IEEE Computer and Communications Societies ( INFOCOM' 2002 ) .New York: IEEE Computer Society Press, 2002. 1530~1539.
  • 5Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, et al.Taming IP packet flooding attacks. Computer Communication Review, 2004, 34(1): 45~50.
  • 6Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In:Proc. 2004 IEEE Symp. Security and Privacy. Oakland: IEEE Computer Society Press, 2004. 130~ 147.
  • 7P. Ferguson, D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing.RFC 2267, http://www.ietf.org/rfc/rfc2267.txt, 1998-01.
  • 8CIAC. H-02: SUN's TCP SYN flooding solutions. Information Bulletin, http://www. ciac. org/ciac/bulletins/h-02. shtml, 1996-10.
  • 9T. Aura, P. Nikander. Stateless connections. In: Proc. the 1st Int'l Conf. Information and Communication Security (ICICS97),Lecture Notes in Computer Science 1334. Heidelberg: Springer,1997. 87~97.
  • 10Lidong Zhou, Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 1999, 13(6): 24~30.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部