期刊文献+

基于邻居节点监测的MANET路由安全机制 被引量:2

Routing Security Mechanism Based on Neighbor Nodes Monitoring and Detecting for MANET
下载PDF
导出
摘要 提出了一种适用于MANET按需路由协议的路由安全机制NRR。该方法通过邻居节点监测机制、节点名誉机制和路由修复机制3个组成部分,实现了完全分布式的入侵检测,能防御典型的内部节点攻击,并能修复因攻击而造成的受损路由,最大程度地保证了路由协议的稳定性。 A routing security mechanism for on-demand routing in MANET-- NRR (neighbor monitoring, node reputation and route healing) is examined and proposed. This mechanism includes three parts: neighbor monitoring and detecting, node reputation and route healing. This mechanism realizes fully distributed instruction detection. The theme can prevent inner non-cooperative nodes from attacking, can heal the damaged routing caused by attacks and ensure the stability of the on-demand routing protocol in its best.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第18期148-150,153,共4页 Computer Engineering
关键词 MANET 路由安全 邻居监测 内部节点 MANET routing security neighbor monitoring and detecting non-cooperative nodes
  • 相关文献

参考文献11

  • 1赵绍刚,肖征荣.移动无线Ad Hoc网络的路由安全[J].电信快报,2004(3):6-8. 被引量:2
  • 2蒋廷耀,杨景华,李庆华.移动Adhoc网络安全技术研究进展[J].计算机应用研究,2005,22(2):1-4. 被引量:9
  • 3Chin-Yang Tseng,Balasubramanyam P.A Specification-based Intrusion Detection System for AODV[C]//Proc.of ACM Workshop on Security of Ad Hoc and Sensor Networks,Fairfax,VA,USA.2003. 被引量:1
  • 4Marti S,Giuli T J,Lai K,et al.Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[EB/OL].(2000-09).http://citeseer.nj.nec.com/marti00mitigating.html. 被引量:1
  • 5Balasubramaniyan J S,Fernandez J O G,Isacoff D,et al.An Architecture for Intrusion Detection Using Autonomous Agents[R].Purdue University,1998. 被引量:1
  • 6Perkins C,Royer E,Das S.Ad Hoc on Demand Distance Vector Routing[S].RFC 3561,2003-07. 被引量:1
  • 7Johnson D B,Maltz D A,Hu Y C.The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks[Z].(2004-07).IETF draftietf-manet-dsr10.txt. 被引量:1
  • 8Toh C K.Associatibity-based Routing for Ad Hoc Mobile Networks[J].Wireless Personal Communications,1997,4(2):103-109. 被引量:1
  • 9Zapata M G.Secure Ad Hoc On-demand Distance Vector Routing[[J].ACM Mobile Computing and Communications Review,2002,6(3):106-107. 被引量:1
  • 10Zapata M G,Asokan N.Securing Ad Hoc Routing Protocols[C]// Proceedings of the ACM Workshop on Wireless Security.2002:1-10. 被引量:1

二级参考文献26

  • 1l Chlamtac, M Conti, et al. Mobile Ad hoc Networking: Imperatives and Challenges[J]. Ad hoc Net works, 2003,1(1) :13-64. 被引量:1
  • 2Luis F G Sarmenta. Sabotage-tolerance Mechanism for Volunteer Computing Systems [ J ]. Future Generation Computer Systems, 2002,18(4) :561-572. 被引量:1
  • 3C Perkins. Highly Dynamic Destination-Sequenced Distance-Vector routing ( DSDV ) for Mobile Computers [ C ]. Proceedings of SIGCOMM, 1994. 被引量:1
  • 4S Murthy, et al. An Efficient Routing Protocol for Wireless Networks[ J ]. Mobile Networks and Applications, 1996,1 ( 2 ) : 183-197. 被引量:1
  • 5C E Perkins, E M Royer. Ad hoc On-demand Distance Vector Routing[J]. IEEE Workshop on Mobile Computing Systems and Applications, 1999,(2) :90-100. 被引量:1
  • 6D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[ C]. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1994, ( 12 ) : 158-163. 被引量:1
  • 7K Sanzgiri, B Dahill, et al. A Secure Routing Protocol for Ad hoc Networks [ C ]. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002. 1-10. 被引量:1
  • 8Hongmei Deng,et al. Routing Security in Wireless Ad hoc Networks[J]. IEEE Communications Magazine,2002, (10) :70-75. 被引量:1
  • 9C1 Karlof, D Wager. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [ J ]. Ad hoe Networks, 2003, ( 1 ) :293-315. 被引量:1
  • 10Miller B P, et al. A Re-examination of the Reliability of UNIX Utilities and Services[ R]. Department of Computer Science, University of Wisconsin,1995. 1-30. 被引量:1

共引文献9

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部