期刊文献+

DDRP中的虫洞攻击分析与预防 被引量:2

Analysis and Prevention of WormholeAttack in DDRP
下载PDF
导出
摘要 定向扩散路由协议极易遭受虫洞攻击。为此,以仅存在2个毒害节点的情况为例,推导毒害节点放置位置与虫洞攻击严重程度间的定量关系。通过OMNeT++上的仿真实验,求解毒害节点最佳放置位置,并说明对应的最大虫洞攻击严重程度。为预防虫洞攻击,提出一种将最佳梯度节点加强转换为梯度节点概率选择加强的策略。仿真实验结果表明,该预防策略是有效的。 Directed Diffusion Routing Protocol(DDRP) is easy to suffer from wormhole attack.Take only two wormhole nodes in Wireless Sensor Network(WSN) for example,the quantitative relationship between placement of poison nodes and severity of wormhole attack is formulated reduction.The optimal placement of two poison nodes and most severity of wormhole attack are solved by simulation on OMNeT++ platform.In order to prevent wormhole attack,the best gradient node reinforcement is changed into gradient nodes probabilistic selected reinforcement in DDRP.Simulation results prove the effectiveness of the proposed strategy
出处 《计算机工程》 CAS CSCD 北大核心 2011年第21期14-16,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10776026)
关键词 定向扩散路由协议 毒害节点最佳放置位置 最大虫洞攻击严重程度 预防策略 概率选择加强 Directed Diffusion Routing Protocol(DDRP) optimal placement of poison nodes severity of most wormhole attack prevention strategy probabilistic selected reinforcement
  • 相关文献

参考文献6

二级参考文献42

  • 1王建新,张亚男,王伟平,卢锡城.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,33(4):596-601. 被引量:19
  • 2李俊,崔国华,郑明辉.移动自组网络安全分布式组密钥管理方案[J].小型微型计算机系统,2007,28(6):991-997. 被引量:6
  • 3Zhong Sheng, Wu Fan. On Designing Collusion-resistant Routing Schemes for Noncooperative Wireless Ad Hoc Networks[C]//Proc. of the 13th Annual International Conference on Mobile Computing and Networking. Montreal, Quebec, Canada: [s. n.], 2007: 278-289. 被引量:1
  • 4Moore T. A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks[C]//Proc. of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Washington D. C., USA: [s. n.], 2006: 251-255. 被引量:1
  • 5Ngai E C H, Lyu M R. An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation[C]//Proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Taiwan, China: IEEE Press, 2006: 94-103. 被引量:1
  • 6Pissinou N, Ghosh T, Makki K. Collaborative Trust-based Secure Routing in Multihop Ad Hoc Networks[J]. Lecture Notes in Computer Science, 2004, 3042(11): 1446-1451. 被引量:1
  • 7Ghosh T, Pissinou N, Makki K. Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks[C]//Proc. of the 29th IEEE Annual Conference on Local Computer Networks. Tampa, Florida, USA: IEEE Computer Society, 2004:224-231. 被引量:1
  • 8Ghosh T, Pissinou N. Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks[J]. Mobile Networks and Applications, 2005, 10(6): 985-995. 被引量:1
  • 9Hu Lingxuan, Evans D. Using Directional Antennas to Prevent Wormhole Attacks[C]//Proc. of the llth Annual Network and Distributed System Security Symposium. San Diego, California, USA: [s. n.], 2004. 被引量:1
  • 10Naveen S, Shankar U, Wagner D. Secure Verification of Location Claims[C]//Proc. of the 2nd ACM Workshop on Wireless Security. Doha, Qatar: Is. n.], 2003:1-10. 被引量:1

共引文献11

同被引文献14

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部