期刊文献+

基于AODV的安全高效路由方案设计 被引量:4

Design of Secure Efficient Routing Scheme Based on AODV
下载PDF
导出
摘要 路由协议的安全性是移动自组网络安全中最重要的一环,极易受到各种攻击。分析AODV路由协议存在的主要安全隐患,探讨现有安全路由方案的不足,提出一种新的基于椭圆曲线密码体制、自证明公钥、单向哈希链等技术的安全高效路由方案,同时完成会话密钥的交换。仿真结果表明,改进后的协议以较少的开销得到较高的安全性。 Mobile Ad hoc networks usually use Ad hoc On-demand Distance Vector(AODV) protocol for lower overhead, but vulnerable to attacks for the lack of security mechanism. A security enhancement scheme based on Elliptic Curve Cryptography(ECC), self-certified pubic key, one-way Hash-chain is proposed, it establishes the session key between source and destination. Experimental results show that the proposed protocol is secure and efficient.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第1期157-160,共4页 Computer Engineering
关键词 Ad HOC网络 AODV协议 椭圆曲线密码 自证明公钥 网络仿真 Ad hoc networks AODV protocol Elliptic Curve Cryptography(ECC) self-certified pubic key network simulation
  • 相关文献

参考文献5

二级参考文献34

  • 1许力,张继东,郑宝玉,杨震.移动自组网能量保护策略研究进展[J].通信学报,2004,25(9):93-103. 被引量:16
  • 2谢冬莉,周晓峰.对AODV路由协议的三种攻击方法及相应的解决方案[J].计算机与现代化,2004(10):101-103. 被引量:5
  • 3陈稼婴,杨震.Adhoc网络中基于节能的AODV路由算法改进[J].南京邮电学院学报(自然科学版),2004,24(3):18-22. 被引量:13
  • 4ZAPATA M G,Draft-guerrero-manet-saodv-02.txt[EB/OL].IETF.(2004-12-16)[2005-10-30].http://ietfreport.isoc.org/idref/draft-guerrero-manet-saodv/. 被引量:1
  • 5SANZGIRI K,DAHILL B,LEVINE B N,et al.A secure routing protocol for Ad hoc networks[C].Paris:ICNP'02,2002. 被引量:1
  • 6ZHANG Yongguang,LEE W K.Intrusion detection in wireless Ad-hoc networks[C].Boston,Massachusetts:MobiCom2000,2000. 被引量:1
  • 7PAPADIMITRATOS P,HAAS Z J.Secure routing for mobile Ad hoc networks[EB/OL].San Antonio:CNDS2002.(2002-1-27)[2005-10-30].http://people.ece.cornell.edu/~haas/wnl/Publications/cnds02.pdf. 被引量:1
  • 8BUTTYAN L,VAJDA I.Towards provable security for Ad hoc routing protocols[EB/OL].Budapest:Budapest University of Science and Economics.(2004-07-08)[2005-10-30].http://citeseer.ist.psu.edu/698331.html. 被引量:1
  • 9MARSHALL J.An analysis of the secure routing protocol for mobile Ad hoc network route discovery:using intuitive reasoning and formal verification to identify flaws[D].Florida:Florida State University,2003. 被引量:1
  • 10YANG S,BARAS J.Modeling vulnerabilities of Ad hoc routing protocols[C].New York:ACM Press,2003. 被引量:1

共引文献8

同被引文献39

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部