期刊文献+

基于朋友机制的移动ad hoc网络路由入侵检测模型研究 被引量:4

Friends mechanism-based routing intrusion detection model for mobile ad hoc network
下载PDF
导出
摘要 从如何有效检测移动ad hoc网络路由入侵行为、如何准确地响应并将恶意路由节点移除网络,提供可信路由环境的角度进行分析,提出了一种基于朋友机制的轻量级移动ad hoc网络入侵检测模型,并以典型的黑洞攻击为例,通过OPNET网络建模仿真及实验分析,验证了该模型的可行性和有效性。 The proposed model mainly focused on how to effectively detect routing invasions from mobile ad hoc network as well as how to accurately respond to the malicious nodes, providing a trusted routing environment. A lightweight intrusion detection model was proposed to based on the friends mechanism, taking black hole attack for example, the OPNET software gives the simulation test, and results show that the schemes can effectively detect attacks, it is validated and compared with other conventional models.
出处 《通信学报》 EI CSCD 北大核心 2015年第S1期203-214,共12页 Journal on Communications
基金 国家自然科学基金资助项目(61373170)~~
关键词 移动AD HOC网络 路由安全 入侵检测 朋友机制 mobile ad hoc network routing security intrusion detection friends mechanisms
  • 相关文献

参考文献19

  • 1SRINIVASARAO G,KUMAR S S.An Efficient Intrusion Detection System in Mobile Ad hoc Networks. Lecture Notes in Electrical Engineering . 2013
  • 2KULKARNI P.Design of hierarchical intrusion detection unit for ad hoc networks based on bayesian networks. Dissertations&These grad works . 2008
  • 3CHANG C C,LIN C J.LIBSVM:a library for support vector machines. http://www.csie.ntu.edu.tw/.rcjlinhibsvm . 2001
  • 4VAPNIK V N.The nature of statistical learning theory. Series:Information Science and Statistics . 1996
  • 5裴伟东,陈增强,袁著祉.利用朋友机制生成一类无标度网络[J].吉林大学学报(信息科学版),2007,25(4):371-378. 被引量:5
  • 6马春娥,史浩山.一种基于移动ad hoc网络的安全性模型研究[J].传感技术学报,2006,19(4):1305-1309. 被引量:1
  • 7Thorsten Joachims.Making Large Scale SVM Learning Practical. LS-8 Report 24 . 1998
  • 8RAZAK S A,FURNELL S,CLARKE N,et al.A two-tier intrusion detection system for mobile ad hoc networks–a friend approach. Intelligence and Security Informatics . 2006
  • 9MIRANDA H,RODRIGUES L.Friends and foes:preventing selfishness in open mobile ad hoc networks. Proc of the First International Workshop on Mobile Distributed Computing (MDC’’03) . 2003
  • 10Helmy,Ahmed.Small Worlds in Wireless Networks. IEEE Communications Letters . 2003

二级参考文献22

  • 1Z J Haas and B Liang.Ad-Hoc Mobility Management with Randomized Database Groups[C]// IEEE ICC'99,Vancouver,BC,Canada,June 1999:65-10.
  • 2Hu Y-C,Perrig A,and Johnson D B.Ariadne:A Secure OnDemand Routing Protocol for Ad Hoc Networks//Proceedings of MobiCom,September 2002.
  • 3Tsirigos A,Haas Z J,and Tabrizi S.Multipath Routing in Mobile Ad Hoc Networks or How to Route in the Presence of Topological Changes[C]//IEEE MILCOM' 2001,Tysons Corner,VA,October 2001:28-31.
  • 4Ellis R.Torus Hitting Times Project[EB/OL].http://www.math.tamu.edu/~rellis/comb/torus/torus.html.
  • 5Aldous David J and Fill A.Markov Chains on Graphs.Manuscript Under Preparation,2000.
  • 6Rahul C.Shah,Sumit Roy,Sushant Jain,and Waylon Brunette.Data MULEs:Modeling a Three-Tier Architecture for Sparse Sensor Networks[C]//Proceedings of the IEEE Workshop on Sensor Network Protocols and Applications(SNPA),to appear,2003.
  • 7Peter G.Doyle and Snell J Laurie.Random walks and electric networks[M].Carus Mathematical Monographs,2001,22.
  • 8BARABASI A-L.The New Science of Networks[M].Cambridge:Prerseus Publishing,2002.
  • 9DOROGOVTSEVTSEV S N,MENDES J F F.Evolution of Network:From Biological Nets to the Internet and WWW[M].London:Oxford University Press,2003.
  • 10PASTOR-SATORRAS R,VESPIGNANI A.Evolution and Structure of the Internet:A Statistical Physics Approach[M].Cambridge:Cambridge University Press,2004.

共引文献4

同被引文献19

引证文献4

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部