期刊文献+

无线Mesh网中的伪装节点检测研究

Node spoofing detection in wireless Mesh network
下载PDF
导出
摘要 为了有效的检测无线Mesh网的骨干网络中的伪装节点,依据最新的IEEE 802.11s标准,对无线网状网中伪装节点攻击的原理、特点和危害进行了深入研究。针对802.11s协议下的无线网状网提出了两种伪装节点攻击模型,提出了基于移动终端代理,结合节点访问控制机制,利用序列号与时间戮间一对一递增关系来检测伪装节点的方法。实验结果表明,该方法可以及时有效的检测出无线网状网络中的伪装节点,且具有较低的误报率和较高的检测精度。 The structure of the 802.11 wireless mesh network is introduced and analyzed according to the latest IEEE802.11s standards to detect the Node spoofing attack.The principle,type and danger of the node spoofing attack in 802.11 WMN are researched particularly.The popular methods is analyzed simply to detect node spoofing and its advantages or disadvantages respectively.At last,a way of using the corresponding incremental change relationship between the sequence number and timestamps to detect the node spoofing,which is based on the mobile terminal and combined with the access control mechanism,is proposed.Experiments prove that the method is available and feasible in reducing the false positive and raising detecting accur-acy.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第6期2187-2191,共5页 Computer Engineering and Design
基金 河南省科技创新杰出青年计划基金项目(104100510025)
关键词 802.11s 无线网状网 伪装节点 移动终端 序列号 时间戳 802.11s wireless mesh network spoofing node mobile terminal sequence number timestamps
  • 相关文献

参考文献15

  • 1ZHANG Y, LUO J, HUH. Wireless mesh networking archi- tectures protocols and standards [M]. Auer Bach Publications, Taylor & Francis Group, First Edition, NY, 2006. 被引量:1
  • 2Bruno R, Conti M, Gregori E. Mesh networks: Commodity multi-hop ad-hoe networks [J]. IEEE Communications Maga zine, 2005, 43 (3) : 123-131. 被引量:1
  • 3Santhanam L, Nandiraju N, Agrawal P. Distributed selPpoli- cing architecture fostering node cooperation in wireless Mesh networks [G]. LNCS 4217: The Proc of the Personal Wireless Communication, 2006:147 158. 被引量:1
  • 4付颖芳,张兴,张婷,栾良玉.无线mesh网络中的虫洞攻击检测研究[J].通信学报,2011,32(1):59-65. 被引量:10
  • 5KHAN S, LOOK k, NAEEM T, et al. Denial of service at- tacks and challenges in broadband wireless network [J]. Inter national Journal of Computer Science and Network Security, 2008, 8 (7): 1-6. 被引量:1
  • 6Santhanam L, Nandiraju D, Agrawal D P. Active cache based defense against DoS attacks in wireless Mesh network [C]. 2nd IEEE International Symposium on Wireless Pervasive Com- puting, 2007. 被引量:1
  • 7司纪锋,王美琴,曹宝香.无线局域网MAC地址欺骗攻击的检测[J].计算机技术与发展,2006,16(2):232-234. 被引量:4
  • 8Shafiullah KHAN, Noor MAST, Kok Keong Lool. Cloned ac- cess point detection and prevention mechanism in IEEE 802. 11 wireless Mesh networks [J]. Journal of Information Assurance and Security, 2008, 3 (4): 257-262. 被引量:1
  • 9MANO C, BLAICH A, LETAL Q Ripps. Rogue identifying packet payload slice detecting unauthorized wireless hosts through network traffic conditioning [J]. ACM Transactions on Information and System Security, 2008, 11 (2): doi> 10. 1145/1330332. 1330334. 被引量:1
  • 10GUO F, CKER CHIUEH T. Sequence number-based MAC address spoof detection [C]. Seattle, WA, USA: Proceedings of the 8th International Symposium on Recent Advances in In- trusion Detection, 2005. 被引量:1

二级参考文献16

  • 1李庆,梁学俊,江汉红.无线局域网WEP协议安全漏洞研究[J].微机发展,2004,14(11):133-135. 被引量:3
  • 2Mishra A, Arbaugh W A. An Initial Security Analysis of the IEEE 802. 1x Standard [EB/OL]. http://www.memestreams.net/users/jlm/blogid1785350,2002. 被引量:1
  • 3Bellardo J ,Savage S. 802.11 Denial-of-Service Attacks:Real Vulnerabilities and Practical Solutions [EB/OL]. http://ramp. ucsd. edu/bellardo/pubs/usenix-sec03-80211dos-html/index.html,2003. 被引量:1
  • 4What hackers don' t want you to know about securing your wirdess LAN[EB/OL]. www. AirMagnet. com,2004-04. 被引量:1
  • 5STAJANO F, ANDERSON R. The resurrencting duckling: security issues for ad hoc wireless networks[A]. Proc the 7th International Workshop on Security Protocols, Cambridge, UK, 1999.22-26. 被引量:1
  • 6BULUSU N, HEIDEMANN J, ESTRIN D. GPS-less Low Cost Outdoor Localization for Very Small Devices[M]. IEEE Personal Communications Magazine, 2000. 被引量:1
  • 7HU L, EVANS D. Using directional antennas to prevent wormhole attacks[A]. Proceedings of Network and Distributed System Security Symposium (NDSS)[C]. San Diego, 2004. 被引量:1
  • 8HU Y, PERRIG A, JOHNSON D. Packet leashes: a defense against wormhole attacks in wireless networks[A]. Proc 22nd INFOCOM[C]. 2003.1976-1986. 被引量:1
  • 9CHIU H, LUI K. DelPHI: wormhole detection mechanism for ad hoc wireless networks[A]. 1st International Symponium on Wireless Pervasive Computing[C]. Phuket, Thailand, 2006. 1-6. 被引量:1
  • 10SUN C, DOO-YOUNG K, DO-HYEON L, et al. WAP: wormhole attack prevention algorithm in mobile ad hoc networks[A]. Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008)[C]. 2008. 343-348. 被引量:1

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部