期刊文献+

基于入侵检测技术的MANET安全研究 被引量:5

Research on MANET Security Based on Intrusion Detection Technology
下载PDF
导出
摘要 入侵检测系统可显著提高移动自组网络的安全水平。文中分析了MANET的IDS的特点,并对IDS一些典型安全方案的研究现状进行分类阐述,分析了各种方案的优点和缺点。阐明目前研究存在的问题,并提出了相应的改进方法,且讨论了后续的研究方向。 The intrusion detection system (IDS) can significantly improve the security of the mobile ad hoc network (MANET). This paper analyzes the characteristics of the IDS MANET, reviews the research status of some typical IDS security programs, and analyzes their advantages and disadvantages. Some existing problems in the research are clarified, the corresponding improvement methods are put forward, and the future research direction is discussed.
出处 《电子科技》 2016年第11期157-160,共4页 Electronic Science and Technology
关键词 MANET 入侵检测 看门狗 博弈论 MANET intrusion detection watchdog game theory
  • 相关文献

参考文献23

  • 1Mishra A,Nadkami K,Patcha A.Intrusion detection in wireless ad hoc networks [J].IEEE Wireless Communications,2004,11(1):48-60.
  • 2易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 3卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 4Silva APR D,Martins M H T,Rocha B P S,et al.Decentralized intrusion detection in wireless sensor networks [J].Proceedings of ACM International Workshop on Quality of Service & Security in Wireless & Mobile Networks,2005,7(8):16-23.
  • 5Zhang Y,Lee W.Intrusion detection in wireless Ad - hoc networks [C].Boston : Proceedings of the 6th Annual International Conference on Mobile Computing and Networking,2000.
  • 6Zhang Y,Lee W,Huang Y A.Intrusion detection techniques for mobile wireless networks [J].Wireless Networks,2003,9(5):545-556.
  • 7Araghi T K,Zamani M,Manaf A B A,et al.A survey for prevention of black hole attacks in wireless mobile Ad Hoc networks using cryptographic techniques [C].Malaysia:12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACAC0S,13),2013.
  • 8Marti S,Giuli T J,Lai K,et al.Mitigating routing misbehavior in mobile ad hoc networks [C].Boston: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom),2000.
  • 9Nasser N,Chen Y.Enhanced intrusion detection system for discovering malicious nodes in mobile Ad Hoc networks [C].Scotland : IEEE International Conference on Communications,2007.
  • 10Balakrishnan K,Deng J,Varshney P K.TWOACK:preventing selfishness in mobile ad hoc networks [J].IEEE,2005,4(4):2137-2142.

二级参考文献171

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 3Zhang Yong-guang and Lee Wenke. Intrusion detection in wireless Ad-hoc networks[C]. Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, August, 2000: 275-283.
  • 4Zhang Yong-guang and Lee Wenke. Intrusion Detection Techniques for Mobile Wireless Networks. Mobile Networks and Applications, 2003, 9(5): 545-556.
  • 5Kachirski O and Guha R. Intrusion detection using mobile agents in wireless ad hoc networks. IEEE Workshop on Knowledge Media Networking (KMN'02), Kyoto, Japan, 2002: 153-158.
  • 6Puttini R S, Percher J M, and Me L, et al.. A modular architecture for distributed IDS in MANET[C]. Proceedings of the 2003 International Conference on Computational Science and Its Applications (ICCSA 2003), Springer Verlag, LNCS 2668, San Diego, USA, 2003: 984-990.
  • 7Huang Yi-an and Lee Wenke. A cooperative intrusion detection system for ad hoc networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), Fairfax, VA, USA, October 31, 2003: 135-147.
  • 8Sun B, Wu K, and Pooch U W. Routing anomaly detection in mobile ad hoc networks[C]. Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03), Dallas, Texas, October 2003: 25-31.
  • 9Albers P, Camp O, Percher J M, and Jouga B, et al.. Security in ad hoc Networks: a general intrusion detection architecture enhancing trust based approaches. Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), Ciudad Real, Spain, Apr. 2002: 1-12.
  • 10Bhargava S and Agrawal D P. Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks[C]. Vehicular Technology Conference, 2001: 2143-2147.

共引文献327

同被引文献61

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部