期刊文献+

基于数据分析的无线匿名路由协议攻击及防御

Attacking and Defense of Wireless Anonymous Routing Protocol Based on Data Analysis
下载PDF
导出
摘要 分析一种基于数据分析的攻击方法,根据被动监听网络所获得的信息,推断无线网络节点之间的通信关系。仿真实验结果表明,该方法在不同场景下能够达到85%~90%的准确率,在大量掩护消息存在的情况下,性能良好。提出一种更为完善的掩护消息方法,强化了现有无线匿名路由协议的功能。 This paper analyzes a new attack for estimating anonymous routing paths, purely based on passive traffic monitoring, and applies the attack to AnonDSR. The promising results on simulation data are presented, with 85%-90% accuracy in different scenarios, even within an environment containing cover traffic, or noise. In addition, it designs a new smart cover traffic scheme which helps enhance anonymity in existing protocols.
作者 姜楠 金宇
出处 《计算机工程》 CAS CSCD 北大核心 2008年第11期168-170,共3页 Computer Engineering
关键词 无线匿名路由协议 匿名动态源路由协议 EM算法 wireless anonymous routing protocol AnonDSR EM algorithm
  • 相关文献

参考文献5

  • 1Michael K. Crowds: Anonymity for Web Transactions[J]. ACM Transactions on Information and System Security, 1998, 1(1): 66- 92. 被引量:1
  • 2Danezis G. Statistical Disclosure or Intersection Attacks on Anonymity Systems[M]. Toronto Candan: Information Hiding Press, 2004, 293-308. 被引量:1
  • 3Kong J. ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks[C]//Proc. of the 4th ACM International Symposium on Mobile Ad-Hoc Networking and Computing. Annapolis, MD, USA:[s. n.], 2003: 291-302. 被引量:1
  • 4Ronggong S. AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad Hoc Networks[C]//Proc. of 2005 ACM Workshop on Security of Ad-Hoc and Sensor Networks~ Alexandria, VA, USA: [s. n.], 2005: 32-42. 被引量:1
  • 5Michael J, Tarzan: A Peer-to-Peer Anonymizing Network Layer[C]//Proc. of ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press,2002:193-206. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部