期刊文献+

一种战术Ad hoc网络干扰检测算法

A Jamming Detection Algorithm for Tactical Ad hoc Networks
下载PDF
导出
摘要 无线干扰使战术Ad hoc网络面临严重安全威胁,甚至可以完全阻断网络通信,因此,急需提出适用于战术Ad hoc网络的干扰检测方法。提出了一种基于数据包重发次数和数据包传输率的战术Ad hoc网络响应式干扰检测方法,并在ns-3环境下仿真实现。仿真表明该方法可快速有效检测出干扰。 Jamming attack is the most important threaten to tactical ad hoc networks, In the wont scenario, it can completely block all network communications. Thus, New Algorithm for jamming detection is required, especially for tactical ad hoc networks. In this paper, We present a novel mechanism to detect reactive jamming in tactical ad hoc networks, which is based on the required number of re-transmission attempts of transmitted packets and packet delivery rate (PDR) of received packets. The simulation is implemented in ns-3 network simulator. Simulation indicates that jamming can be detected by our algorithm quickly and efficiently.
作者 王敏
出处 《通信对抗》 2016年第4期34-38,共5页 Communication Countermeasures
关键词 战术Ad HOC网络 响应式干扰 干扰检测 数据包传输率 tactical Ad hoc network reactive jamming jamming detection packet delivery rate
  • 相关文献

参考文献1

二级参考文献15

  • 1YANG H, LUO H, YE F, et al. Security in mobile Ad Hoc net- works: challenges and solutions [ J]. IEEE Wireless Communica- tions, 2004, 11(1): 38-47.
  • 2CHUN H Y, PERRIG A, JOHNSON D B. Wormhole attacks in wireless networks [ J]. IEEE Journal on Selected Areas in Communi~ cations, 2006, 24(2): 370-380.
  • 3HU Y-C, PERRIG A, JOHNSON D B. Packet leashes: a defense against wormhole attacks in wireless Ad Hoc network [ C]// Pro- ceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. Washington, DC: IEEE Computer Society, 2003:1976 -1986.
  • 4CHOI S, KIM D Y, LEE D H, et al. WAP: wormhole attack pre- vention algorithm in mobile Ad I-Ioc networks [ C]//Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiq- uitous, and Trustworthy Computing. Washington, DC: IEEE Com- puter Society, 2008:343 -348.
  • 5WANG X, WONG J. An end-to-end detection of wormhole attack in wireless Ad Hoc networks [ C]//Proceedings of the 31 st Annual In- ternational Computer Software and Applications Conference. Wash- ington, DC: IEEE Computer Society, 2007:39-48.
  • 6GUO J, LEI Z Y . A kind of wormhole attack defense strategy of WSN based on neighbor nodes verification [ C]//Proceedings of the IEEE 3rd International Conference on Communication Software and Networks. Washington, DC: IEEE Computer Society, 2011: 564- 568.
  • 7AZER M A, KASSAS M E, SOUDANI S E. An innovative approach for the wormhole attack detection and prevention in wireless Ad Hoe networks [ C] // Proceedings of the 2010 International Conference on Networking, Networking, Sensing and Control. Washington, DC: IEEE Computer Society, 2010:366-371.
  • 8SHARMA P, TRIVEDI A. An approach to defend against wormhole attack in Ad Hoc network using digital signature [ C]//Proceedings of the IEEE 3rd International Conference on Communication Software and Networks. Washington, DC: IEEE Computer Society, 2011: 307 -311.
  • 9BAN X, SARKAR R, GAO J. Local connectivity tests to identify wormholes in wireless networks [ C]// Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York: ACM Press, 2011:1-11.
  • 10DONG D, LI M, LIU Y, et al. Topological detection on wormholes in wireless Ad Hoc and sensor networks [ J]. IEEE/ACM Transac-tions on Networking, 2011, 19(6) : 1787 - 1796.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部