期刊文献+

一种针对AODV协议黑洞攻击的检测策略 被引量:9

A DETECTION STRATEGY FOR BLACK HOLE ATTACK BASED ON AODV
下载PDF
导出
摘要 无线自组织网络是由若干个移动节点组成的网络,当一个节点需要和另一个节点通信时,它们通过中间节点将数据转发,因此网络中每个节点既是独立的终端设备,也能作为路由器使用。黑洞攻击是无线自组织网络一种常见的攻击,恶意节点利用协议机制向其他节点广播自己具有到达目的节点的最短路径,导致所有的数据将会流向这些恶意节点。这些恶意节点通过丢弃数据发动拒绝服务攻击,或者将数据重定向到伪装的目的节点。基于AODV(Ad Hoc On-Demand Distance Vector Routing)协议,提出一种针对其黑洞攻击的检测策略。通过NS-2的仿真实验,分析关于无线Ad Hoc网络的三个性能指标,分组投递率,端到端的平均时延和归一化的路由开销,实验结果表明该检测策略能够增强AODV路由协议的安全性。 Mobile ad hoc networks is the networks consisted of a couple of mobile nodes, when one node needs to communicate with another, they will forward data via intermediate nodes, therefore each node in the networks acts as the independent terminal device as well as to be used as the router. Black hole attack is a common attack in MANET, malicious nodes use protocol mechanism to claim to other nodes that they have the shortest path to the destination and this results in all traffic data being attracted to them. These malicious nodes launch the deni- M service attack through dropping the packets or redirecting the packets to disguised destination node. Based on AODV in this paper we pro- pose a detection strategy targeted at their black hole attacks. Through NS-2 simulation experiment, we analyse three performance metrics in regard to MANET including packet delivery fraction, average end-to-end delay and normalised routing overhead. Experimental result shows that the detection strategy is able to enhance the security of the AODV protocol.
出处 《计算机应用与软件》 CSCD 2015年第5期273-277,共5页 Computer Applications and Software
基金 上海市研究生创新基金项目(JWCXSL1202)
关键词 无线自组织网络 黑洞攻击 AODV协议 安全 检测策略 Mobile ad hoc networks(MANET) Black hole attack AODV protocol Security Detecting strategy
  • 相关文献

参考文献11

  • 1Burbank JL, Chimento PF, Haberman BK, et al. Key challenges of military tactical networking and the elusive promise of MANET technol- ogy[ J]. IEEE Communications Magazine, 2006, 44( 1 l ) :39 -45.
  • 2陈林星,曾曦,曹毅.移动AdHoe网络-自组织分组无线网络技术[M].北京:电子工业出版社,2012:3-7.
  • 3Chacko N M, Sam S, Leelipushpam PGJ Ieee. A survey on various privacy and security features adopted in MANETs routing Protocol [ C ]. IEEE International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing, Kottayam,2013.
  • 4FarooqAnjum,PetrosMouchtaris.移动AdHoc网络安全[M].北京:清华大学出版社,2009.
  • 5Rajkumar G, Duraisamy D K. A Review Of Ad Hoc On-Demand Dis- tance Vector Routing Protocol For Mobile Ad Hoc Networks [ J ]. Jour- nal of Theoretical and Applied Information Technology, 2012, 36 (1) : 13g - 145.
  • 6Nagpal C K, Kumar C, Bhushan B, et al. A Study of Black Hole At- tack on MANET Performance[J]. International Journal of Modern Ed- ucation and Computer Science, 2012, 4 (8) :47 - 53.
  • 7A1-Shurman M, Yoo S M, Park S. Black hole attack in mobile ad hoc networks[ C ]//Proceedings of the 42rid annual southeast regional con- ference, Huntsville, April,2004.
  • 8Raj P N, Swadas P B. Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet [ J ]. IJCSI International Journal of Canlputer Science Issues. 2009,2:54 -59.
  • 9Jaisankar N, Saravanan R, Swamy K D. A Novel Security Approach for Detecting Black Hole Attack in MANET[ J]. Information Process- ing and Management : Springer, 2010,70 : 217 - 223.
  • 10Ramaswamy S, Fu H R, Sreekantaradhya M. Prevention of Coopera- tive Black Hole Attaek in Wireless Ad Hoc Networks[ C ]. International Conference on Wireless Networks, Nevada,2003.

共引文献1

同被引文献54

引证文献9

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部