期刊文献+

基于AODV协议的自组网络安全机制的研究 被引量:8

The Research on Security Mechanism Based on AODV Routing Protocol in Mobile Ad Hoc Network
下载PDF
导出
摘要 路由协议的安全性是移动自组网络安全中最重要的一环,AODV路由协议因简单和控制开销小而广泛用于自组网络,但其没有任何安全机制保障,为此,本文探讨了AODV路由协议存在的主要安全隐患,对协议进行必要的改进,增加攻击检测功能,并为网络中节点建立信誉机制,二者相互作用共同完成协议安全性保障.利用NS进行仿真,结果表明改进后的算法能够检测到网络中节点的恶意行为并迅速做出反应,实现对网络内部及外部攻击的防范. Security of routing protocols is the most important secure factor in the mobile Ad Hoc networks. AODV protocol is used widely in the Ad Hoc networks for its simplicity and small control overhead ,but it does not have any security mechanism. With some potential insecure factors in AODV protocol analyzed, some necessary improvemerits are made to AODV protocol, including adding attack detection and building up credence mechanism, which would collaboratively guarantee the network security. Simulation results indicate that it can react quickly when some malicious behaviors in the network are detected and effectively protect the network from kinds of attacks.
作者 李喆 刘军
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第2期272-276,共5页 Acta Electronica Sinica
基金 国家高技术发展计划项目(No.2002AA784030)
关键词 移动自组网络 路由安全性 攻击检测 信誉度 AODV mobile Ad Hoc network routing security attack detection credence Ad Hoc on demand distancevector (AODV)
  • 相关文献

参考文献13

  • 1C -K Toh.Ad Hoc Mobile Wireless Networks:Protocols and Systems[M].Indiana:Prentice Hall PTR,2002.55-77. 被引量:1
  • 2Yang H.Security in mobile Ad Hoc networks:Challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47. 被引量:1
  • 3Charles E Perkins,Elizabeth M Belding Royer,Samir R Das.Ad hoc on-demand distance vector(AODV) routing[EB/OL].http:// www.ietf.org/rfc/rfc3561.txt,2003-07. 被引量:1
  • 4Ingo Riedel.Security in Ad Hoc networks:Protocols and ECC on Embedded System[D].Bochum:Ruhr University,2003. 被引量:1
  • 5谢冬莉,周晓峰.对AODV路由协议的三种攻击方法及相应的解决方案[J].计算机与现代化,2004(10):101-103. 被引量:5
  • 6Sonja Buchegger,Jean-Yves Le Boudec.Performance analysis of the confidant protocol:Cooperation of nodes-Fairness in distributed ad-hoc networks[A].IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing(MobiHOC2002)[C].Lausanne,2002.226-236. 被引量:1
  • 7Sheng Zhong,Jiang Chen,Yang Richard Yang.Sprite:A simple,cheat proof,credit-based system for mobile ad-hoc networks[A].The 22nd Annual Joint Conf IEEE Computer and Communications Societies(INFOCOM 2003)[C].San Francisco:CA,2003.1987-1997. 被引量:1
  • 8Butty'an L,Phuhaux J,Nuglets.A virtual currency to simulate cooperation in self-organized Ad Hoc network[R].Swiss:Swiss Federa Institute of Technology-Lausanne,2001. 被引量:1
  • 9Pietro michiardi,Refik molva.CORE:A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[A].Sixth IFIP conference on security communications,and multimedia(CMS 2002)[C].Slovenia:Portoroz,2002.107-121. 被引量:1
  • 10Yongguang Zhang,Wenke Lee.Intrusion detection techniques for mobile wireless networks[J].Wireless Networks,2003,9(5):545-556. 被引量:1

二级参考文献11

  • 1Perkins C E,Das S R,Royer E.Ad-Hoc on Demand Distance Vector Routing[DB/OL].http://www.ietf.org/internet-drafts/draft-itef-manet-aodv-09.txt,2001-11-12. 被引量:1
  • 2Royer E M.A review of current routing protocals for ad hoc mobile wirless networks[J].IEEE Personal Commun.,1999,6(2):46-55. 被引量:1
  • 3Dominique Alessandri, Christian Cachin, Marc Dacier et al.Towards a taxonomy of intrusion detection systems and attacks[R].Technical Report Research Report RZ-3366 ,IBM Research ,Zurich Research Laboratory,Zurich, CH, 2001 被引量:1
  • 4Frank Stajano, Ross J Anderson.The resurrecting duckling:Security issues for ad-hoc wireless networks [ C ].In: B Christiano, B Crispo, M Roc eds. Security Protocols ,7th International Workshop Proceedings: 172~194,Lecture Notes in Computer Science, 1999 被引量:1
  • 5The IDWG official charter: http://www.ietf.org/html.charters/idwgcharter. html 被引量:1
  • 6Bernardes M C ,dos Santos Moreira E.Implementation of an Intrusion Detection System Based on mobile Agents [ C ] .In: Proceedings of the2000 International Symposium on Software Engineering for Parallel and Distributed Systems, 2000:158~164 被引量:1
  • 7Chan P C, Wei ,V K.Preemptive Distributed Intrusion Detection using mobile agents[C ].In :Proceedings of Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises , 2002:103~108 被引量:1
  • 8周海刚,肖军模.Ad hoc网络安全模型的研究[J].解放军理工大学学报(自然科学版),2002,3(3):5-8. 被引量:10
  • 9臧婉瑜,于勐,谢立,孙钟秀.按需式ad hoc移动网络路由协议的研究进展[J].计算机学报,2002,25(10):1009-1017. 被引量:39
  • 10王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53

共引文献4

同被引文献112

引证文献8

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部