期刊文献+

基于邻居路由的Ad Hoc网络虫洞检测 被引量:4

Wormhole detection based on neighbor routing in Ad Hoc network
下载PDF
导出
摘要 针对Ad Hoc网络中虫洞检测方法带来的高时延和能耗问题,提出一种低时延和能耗的轻量级虫洞检测方法。即在节点查询路由后,利用路由节点的邻居数目,找出可能受虫洞影响节点的集合,同时依据路由节点的某个邻居节点的路由信息,进一步确定路由节点是否受虫洞影响。仿真结果表明,该方法可有效减少虫洞检测中的路由查询次数,并且与DeWorm和E2SIW方法相比,可有效减少时间延迟和能量消耗。 To solve high energy and time delay cost problems caused by wormhole detection in Ad Hoc networks, a light- weighted wormhole detection method, using less time delay and energy, was proposed. The method used the neighbor number of routing nodes to get a set of abnormal nodes and then detect the presence of a wormhole by using the neighbor information of abnormal node when routing process was completed. The simulation results show that the proposed method can detect wormhole with less number of routing query. Compared with the DeWorm ( Detect Wormhole) method and the E2SIW ( Energy Efficient Scheme Immune to Wormhole attacks) method, it effectively reduces the time delay cost and energy cost.
出处 《计算机应用》 CSCD 北大核心 2014年第3期710-713,723,共5页 journal of Computer Applications
关键词 AD HOC网络 虫洞攻击 路由信息 路由节点 虫洞检测 Ad Hoc network wormhole attack routing information routing node wormhole detection
  • 相关文献

参考文献15

  • 1YANG H, LUO H, YE F, et al. Security in mobile Ad Hoc net- works: challenges and solutions [ J]. IEEE Wireless Communica- tions, 2004, 11(1): 38-47. 被引量:1
  • 2CHUN H Y, PERRIG A, JOHNSON D B. Wormhole attacks in wireless networks [ J]. IEEE Journal on Selected Areas in Communi~ cations, 2006, 24(2): 370-380. 被引量:1
  • 3HU Y-C, PERRIG A, JOHNSON D B. Packet leashes: a defense against wormhole attacks in wireless Ad Hoc network [ C]// Pro- ceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. Washington, DC: IEEE Computer Society, 2003:1976 -1986. 被引量:1
  • 4付颖芳,张兴,张婷,栾良玉.无线mesh网络中的虫洞攻击检测研究[J].通信学报,2011,32(1):59-65. 被引量:10
  • 5CHOI S, KIM D Y, LEE D H, et al. WAP: wormhole attack pre- vention algorithm in mobile Ad I-Ioc networks [ C]//Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiq- uitous, and Trustworthy Computing. Washington, DC: IEEE Com- puter Society, 2008:343 -348. 被引量:1
  • 6WANG X, WONG J. An end-to-end detection of wormhole attack in wireless Ad Hoc networks [ C]//Proceedings of the 31 st Annual In- ternational Computer Software and Applications Conference. Wash- ington, DC: IEEE Computer Society, 2007:39-48. 被引量:1
  • 7GUO J, LEI Z Y . A kind of wormhole attack defense strategy of WSN based on neighbor nodes verification [ C]//Proceedings of the IEEE 3rd International Conference on Communication Software and Networks. Washington, DC: IEEE Computer Society, 2011: 564- 568. 被引量:1
  • 8AZER M A, KASSAS M E, SOUDANI S E. An innovative approach for the wormhole attack detection and prevention in wireless Ad Hoe networks [ C] // Proceedings of the 2010 International Conference on Networking, Networking, Sensing and Control. Washington, DC: IEEE Computer Society, 2010:366-371. 被引量:1
  • 9SHARMA P, TRIVEDI A. An approach to defend against wormhole attack in Ad Hoc network using digital signature [ C]//Proceedings of the IEEE 3rd International Conference on Communication Software and Networks. Washington, DC: IEEE Computer Society, 2011: 307 -311. 被引量:1
  • 10BAN X, SARKAR R, GAO J. Local connectivity tests to identify wormholes in wireless networks [ C]// Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York: ACM Press, 2011:1-11. 被引量:1

二级参考文献11

  • 1STAJANO F, ANDERSON R. The resurrencting duckling: security issues for ad hoc wireless networks[A]. Proc the 7th International Workshop on Security Protocols, Cambridge, UK, 1999.22-26. 被引量:1
  • 2BULUSU N, HEIDEMANN J, ESTRIN D. GPS-less Low Cost Outdoor Localization for Very Small Devices[M]. IEEE Personal Communications Magazine, 2000. 被引量:1
  • 3HU L, EVANS D. Using directional antennas to prevent wormhole attacks[A]. Proceedings of Network and Distributed System Security Symposium (NDSS)[C]. San Diego, 2004. 被引量:1
  • 4HU Y, PERRIG A, JOHNSON D. Packet leashes: a defense against wormhole attacks in wireless networks[A]. Proc 22nd INFOCOM[C]. 2003.1976-1986. 被引量:1
  • 5CHIU H, LUI K. DelPHI: wormhole detection mechanism for ad hoc wireless networks[A]. 1st International Symponium on Wireless Pervasive Computing[C]. Phuket, Thailand, 2006. 1-6. 被引量:1
  • 6SUN C, DOO-YOUNG K, DO-HYEON L, et al. WAP: wormhole attack prevention algorithm in mobile ad hoc networks[A]. Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008)[C]. 2008. 343-348. 被引量:1
  • 7AZER M, EL-KASSAS S, EL-SOUDANI M. lmmuning routing protocols from the Wormhole attack[A]. The Fourth International Conference on Systems and Networks Communications[C]. Porto, Portugal, 2009.31-36. 被引量:1
  • 8TINA H, HUANG C, BLUM B M, et al. Range-free localization schemes for large scale sensor networks[A]. Mobicom 2003[C]. 2003.81-95. 被引量:1
  • 9WANG X, WONG J. A end-to-end detection of wormhole attack in wireless ad hoc networks[A]. 31st Annual International Computer Software and Applications Conference[C]. Beijing, China, 2007.34-41. 被引量:1
  • 10DRAVES R, PADHYE J, ZILL B. Routing in multi-radio, multi-hop wireless mesh networks[A]. Proc ACM Annual International Conference on Mobile Computing and Networking[C]. 2004.114-128. 被引量:1

共引文献9

同被引文献23

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部