期刊文献+

面向铁路应急的MANET安全节点发现协议建模 被引量:1

Modeling of MANET Security Node Discovery Protocol for Railway Emergency
下载PDF
导出
摘要 针对铁路应急通信网络安全问题,通过对其特征的详细分析,提出了面向铁路应急的移动自组网络安全节点发现协议建模,以达到解决铁路应急通信网络安全节点发现问题的目的.在对铁路应急的移动自组网络规则描述的基础上,给出具体的安全节点建模过程,并对其正确性、安全性、执行效率进行了详细的分析.最后以两类具体的安全节点发现过程为实例进行探讨,表明其与传统加密方式结合后,仍保持其有效性. In order to achieve the purpose of security node discovery in railway emergency communication network,a modeling of security node discovery protocol for railway emergency mobile ad hoc network is presented according to security problems in railway emergency communication network by analyzing their characteristics in detail.On the basis of the rule description of mobile ad hoc network for railway emergency,the specific security node modeling process is presented,and its correctness,security and performance are analyzed in detail.Finally,two kinds of specific security node discovery processes are presented to show that the method combined with the traditional encryption is still effective.
出处 《兰州交通大学学报》 CAS 2015年第1期60-64,共5页 Journal of Lanzhou Jiaotong University
基金 国家自然科学基金(61261014 61202314) 甘肃省科技支撑计划项目(1204GKCA051) 高等学校基本科研业务费项目(212090) 兰州交通大学-金川公司预研基金(JCYY2013009)
关键词 铁路应急通信 移动自组网络 安全节点发现 railway emergency communication mobile ad hoc networks security node discovery
  • 相关文献

参考文献11

  • 1徐岩,王娟娟.基于京津城际铁路的GSM-R通信安全评价方法研究[J].兰州交通大学学报,2011,30(6):93-98. 被引量:1
  • 2李翠然,钟章队,谢健骊.认知的铁路应急自组织网络研究[J].铁道学报,2013,35(1):60-65. 被引量:7
  • 3Humayun B. Survey of routing protocols for mobile ad- hoc network [J]. International Journal of Information and Communication Technology Research, 2011,1 (6) 165-177.
  • 4Hu Y C,Perring A,Johnson D B. Wormhole attacks in wireless networks [J]. Selected Areas in Communica- tions, 2006,24(2) : 370-380.
  • 5冯涛,孙冠男,夏彦晖,马建峰.基于本体的拜占庭攻击的建模及检测[J].中国科学院研究生院学报,2011,28(5):696-705. 被引量:1
  • 6Feng T, Zhang B T. Security random network coding model against byzantine attack based on CBC[-C]// Proceedings of the 4th International Conference on In- telligent Computation Technology and Automation. Shenzhen:IEEE Press, 2011,2:1178-1181.
  • 7Feng T, Wang S. UC secure network coding against pollution attacks[,J]. Information Technology Journal, 2012,11(9) : 1175-1183.
  • 8Montenegro G, Castelluccia C. Statistically unique and cryptographically verifiable (SUCV) identifier and ad- dresses[C]// Proc. of 2002 Network and Distributed System Security conference. California: ACM Press, 2002 : 539-545.
  • 9Crescenzo G, Arce G. Improved topology assumptions for threshold cryptography over mobile ad- hoc net- works[C]//Proceedings the 3rd ACM Workshop on Security for Ad-hoc and Sensor Networks. New York ACM Press, 2005 : 53-62.
  • 10Crescenzo G, Arce G. Threshold cryptography in mo- bile ad hoc Networks[-C]//4th International Confer- ence on Security in Communication Networks. New York: Springer-Verlag, 2004 : 1156-1162.

二级参考文献61

  • 1刘小强,朱刚.高速铁路环境中无线信道传输特性的探讨[J].铁道通信信号,2007,43(4):54-56. 被引量:10
  • 2Lamport L, Shostak R, Pease M. The Byzantine general problems [ C ] //Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
  • 3Hu, Perrig A, Johnson B, et al. Rushing attacksand defense in wireless ad hoc network routing protocols [ C ] //ACM Workshop on Wireless Security (WiSe). 2003.
  • 4Sharma S, Gupta R. Simuhion study of blackhole attack in the mobile Ad Hoc network [ J ]. Journal of Engineering Science and Technology, 2009, 4 (2) :243-250.
  • 5Baras J, Radosavae S, Theodorakopoulos G. Intrusion detection system resiliency to Byzantine attacks: the case study of wormholes in OLSR[ R]. U S Army Research Laboratory under the Collaborative Technology Alliance Program, 2008.
  • 6Awerbuch B, Curtmola R, Holmer D, et al. ODSBR: an on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks [ J ]. ACM Transactions on Information and System Security,2008,10 ( 4 ) : 27-31.
  • 7Newsomc J, Song D, Perrig A, et al. The sybil attack in,sensor networks: analysis & defenses[C] f/ ACM. Berkeley, California, USA. 2004 : 26 -27.
  • 8Undercoffer J, Joshi A, Pinkston J. Modeling computer attacks: an ontology for intrusion detection [ C ]//Berlin, Heidelberg: Springer- Verlag,2003:131 - 135.
  • 9Abdoli F, Meibody N, Bazoubandi R. An attacks ontology for computer and networks attack [ J]. Innovations and Advances in Computer Sciences and Engineering, 2010: 473-4.76.
  • 10Liu F H, Lee W T. Constructing enterprise information network security risk management mechanism by ontology[ J]. Tamkang Journal of Science and Engineering, 2010,13 ( 1 ) ;79-87.

共引文献6

同被引文献13

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部