期刊文献+

追溯机制在Ad Hoc网络中的应用探究

Research of IP traceback technology on Ad Hoc network
下载PDF
导出
摘要 现追溯机制应用于Ad Hoc网络存在一定的不足,为保障和提高网络安全并展开深层次的研究,详细分析了Ad Hoc网络的路由协议和数据分组结构、追溯机制的各种技术,在此基础上结合各自的机理对追溯技术的应用进行了探究,提出了解决问题的思路和方法。 Existing traceback technology is applied to the Ad Hoc network has some disadvantages,in order to guarantee and improve the network security and technology with studying deeply,a detailed analysis of the various routing protocols in Ad Hoc networks and data packet structure, on the basis of the mechanism of the application of traceability technology was explored,proposed the ideas and methods to solve problems.
作者 王悦 雷佩莹
机构地区 西安文理学院
出处 《电子测试》 2014年第1期88-90,共3页 Electronic Test
基金 西安市科技计划项目CX12189WL33
关键词 追溯 AD HOC 路由协议 拓扑结构 数据分组结构 traceback Ad Hoc routing protocol topology structure data packet structure
  • 相关文献

参考文献2

二级参考文献33

  • 1[1]BABA T,MATSUDA S.Tracing Network Attacks to Their Sources[J].IEEE Internet Computing March,April 2002,6(2):20-26.
  • 2[2]KUZNETSOV V.An evaluation of different IP traceback approaches[EB/OL].http:// www.sm.luth.se/csee/csn/publications/ip_traceback.pdf,2004.
  • 3[3]BELOVIN S,LEECH M,TAYLOR T.ICMP Traceback Messages.Internet draft,work in progress,OCT[EB/OL].http://www,ietf.org/internet-frafts/fraft-ietf-itrace-01.test,2001.
  • 4[4]SAVAGE S,WETHERALL D,KARLIN A,et al.Practical network support for ip traceback[A].Proceedings of the 2000 ACM SIGCOMM Conference[C].2000..
  • 5[5]SNOEREN AC,et al.Single-Packet IP Traceback[J].IEEE/ACM TRANSACTIONS ON NETWORKING,2002,10(6) .
  • 6Hagen S.IPv6精髓[M].北京:清华大学出版社,2004.
  • 7BELLOVIN S, TAYLOR T. RFC 2026, ICMP traceback messages [ S]. [S. 1. ] : IETF, 2003.
  • 8WU S F, ZHANG L X, MASSEY D, et al. draft-wu-itrace-intention- 00, Intention-driven ICMP traceback[ S]. [ S. 1. ] : IETF, 2001.
  • 9SAVAGE S, WETHERALL D, KARKIN A, et al. Practical network support for IP traceback [ C]//ACM Special Interest Group Conference on Applications, Technologies, Architectures, and Protocols for Com- pnter Communicalion. New York: ACM Press, 2000:295 -306.
  • 10BELENKY A, ANSARI N. Tracing multiple attackers with Deter- ministic Packet Marking (DPM) [ C]// IEEE Pacific Rim Confer- ence on Communications, 2003. New York: IEEE, 2003:49-52.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部