期刊文献+

一种移动Ad Hoc网络可生存性模型建模及仿真验证方法 被引量:8

A Modeling and Simulation Verification Approach for the Mobile Ad Hoc Network Survivability Model
下载PDF
导出
摘要 针对网络可生存性模型考虑因素不同、模型描述各异和实验环境概念不同所造成的彼此之间较难的可比性问题,文中提出了一种用于评判多种移动Ad Hoc网络可生存性模型的建模及其仿真验证方法.从可生存性定义出发,采用本体构建可生存性模型的高层描述,在此基础上研究了高层描述向低层仿真执行的转换技术,提出了基于攻击路径自动生成的防御仿真任务部署方法,并实现了可生存性模型的仿真验证.最终在面向战术环境的移动Ad Hoc网络中,通过对SAMNAR模型和群组恢复模型的建模验证说明了文中方法的有效性. It is hard to compare the network survivability models because of the differences in descriptions, experiment environments and other factors considered. In this paper, we propose a modeling and simulation verification approach to evaluate various survivability models. Based on the ontology theory, we construct a high-level description for the survivability model according to the definition of survivability. We thus propose a transformation technique from the high-level de- scription to low-level simulation implementation. In response to the automatically generated attac- king path, we propose an automatic deployment method for defense simulation tasks and complete the simulation verification of the survivability models. At last, within the environment of Tactical Mobile Ad Hoc network, the modeling and verification of SAMNAR Model and Group Recover Model are conducted through our methods. The experiment illustrates the effectiveness of our methods.
出处 《计算机学报》 EI CSCD 北大核心 2013年第7期1465-1474,共10页 Chinese Journal of Computers
基金 国家自然科学基金(61170295) 国家"八六三"高技术研究发展计划项目基金(2007AA01Z407) 国家部委项目(A2120110006) 北京市教育委员会共建项目建设计划(JD100060630) 北京市教委科技面上项目(KM201211232010) 北京航空航天大学基础科研业务费项目(YWF-11-03-Q-001)资助~~
关键词 防御仿真 攻击路径 可生存性模型 移动ADHOC网络 移动互联网 defense simulation attacking path survivability model mobile Ad Hoe network mobile Internet
  • 相关文献

参考文献25

  • 1EllisonRJ,FisherDA,LingerRC,etal.Survivablenetworksystems:Anemergingdiscipline.SoftwareEngineeringInstitute,CarnegieMellonUniversity,Pittsburgh,Pennsylvania,USA:TechnicalReportADA341963,1997. 被引量:1
  • 2PietroRD,VerdeNV.Introducingepidemicmodelsfordatasurvivabilityinunattendedwirelesssensornetworks//Proceedingsofthe2011IEEEInternationalSymposiumonaWorldofWireless,MobileandMultimediaNetworks(WOWMOM2011).Lucca,Italy,2011:16. 被引量:1
  • 3AzniAH,AhmadR,NohZ.SurvivabilitymodelingandanalysisofmobileAdHocnetworkwithcorrelatednodebehavior.ProcediaEngineering,2013,53:435440. 被引量:1
  • 4XiaoKun,RenShangPing,KwiatKevin.Retrofittingcyberphysicalsystemsforsurvivabilitythroughexternalcoordination//Proceedingsofthe41stAnnualHawaiiInternationalConferenceonSystemSciences(HICSS’08).Hawaii,USA,2008:465473. 被引量:1
  • 5JiangXiaoWei,SolihinYan.Architecturalframeworkforsupportingoperatingsystemsurvivability//ProceedingsoftheIEEE17thInternationalSymposiumonHighPerformanceComputerArchitecture(HPCA’11).SanAntonio,USA,2011:456465. 被引量:1
  • 6YangXiaoYuan,WangJingJing,ChenXiaoFeng.Researchonthemodelofthesurvivablestoragesystem(SSS)anditsarchitecture//Proceedingsofthe2011FTRAWorldConvergenceConference(FTRAWCC2011).Jeju,Korea,2011:437452. 被引量:1
  • 7ZhangWei,LiuShugguang,ZhongWeidong.Survivablestoragearchitecture//Proceedingsofthe3rdInternationalSymposiumonInformationProcessing(ISIP2010).Qingdao,China,2010:9597. 被引量:1
  • 8JiangYanji,HuangFenggang.Theresearchofsystemsurvivabilityarchitecturebasedonimmunityprinciple//Proceedingsofthe2ndInternationalSymposiumonInformationScienceandEngineering(ISISE2009).Shanghai,China,2009:313317. 被引量:1
  • 9ZhangYongShi,ZhangJianPei,ZhangLeJun,etal.Asurvivabilityinformationsystembasedonserviceselforganization//Proceedingsofthe5thInternationalConferenceonInternetComputingforScienceandEngineering(ICICSE).Harbin,China,2010:158161. 被引量:1
  • 10WangZhiWen,LuKe,ZouHuaFeng,XiaQin.Componentavailabilitybasedsurvivabilityrecoveryininformationsystem//Proceedingsofthe5thInternationalConferenceonFrontierofComputerScienceandTechnology(FCST).Changchun,China,2010:221226. 被引量:1

二级参考文献21

  • 1HU Y C,PERRIG A,JOHNSON D B.Rushing attacks and defense in wireless ad hoc network routing protocols[A].Proceedings of the 2003 ACM workshop on Wireless Scettrity[C].2003.30-40. 被引量:1
  • 2HU Y C,PERRIG A,JOHNSON D B.Ariadne:a secure on-demand muting protocol for ad hoc networks[J].Wireless Networks,2005,11(1):21-38. 被引量:1
  • 3CARVALHO M.Security in mobile ad hoc networks[J].IEEE Security & Privacy,2008,6(2):72-75. 被引量:1
  • 4DJENOURI D,KHELLADI L,BADACHE A N.A survey of security issues in mobile ad hoc and sensor networks[J].IEEE Communications Surveys & Tutorials,2005.7(4):2-28. 被引量:1
  • 5MARTI S,GIULITJ,LAIK et al.Mitigating muting misbehavior in mobile ad hoc networks[A].Proceedings of the 6th Annual Intemational Conference on Mobile Computing and Networking[C].2000.255-265. 被引量:1
  • 6BUCHEGGER S,BOUDEC J Y L.Performance analysis of the confidant protocol[A].Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing[C].2002.226-236. 被引量:1
  • 7MICHIARDI P,MOLVA R CORE:a collaborative reputation mechanism to enforce node cooperation mobile ad hoc networks[A].Proceedings of the IFIPTC6/TC11 Sixth Joint Working Conference On Communications and Multimedia Security[C].2002.107-121. 被引量:1
  • 8OLIVIERO F,ROMANO S P.A reputation-based metric for secure routing in wireless mesh networks[A].IEEE Global Telecommunications Conference[C].2008.1-5. 被引量:1
  • 9BALAKRISHNAN V,VADHARAJAN V,TUPAKULA U.Subjective logic based trust model for mobile ad hoc networks[A].Proceedings of the 4th Intemational Conferece on Security and Privacy in Communication Netowrks[C].2008.1-11. 被引量:1
  • 10BALAKRISHNAN V,VARADHARAJAN V,TUPAKULA U,et al.Team:trust enhanced security architecture for mobile ad hoc networks[A].Proceedings of the 15th IEEE Intemational Confereace on Networks[C].2007.182-187. 被引量:1

共引文献11

同被引文献66

引证文献8

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部