期刊文献+

可入侵检测的移动Ad Hoc网络安全综合评价 被引量:9

Comprehensive evaluation of security of mobile Ad Hoc network with intrusion detection
下载PDF
导出
摘要 为提高移动Ad Hoc网络安全性能,将混沌免疫聚类算法嵌入移动Ad Hoc网络,设计具有入侵检测功能的移动Ad Hoc网络,并据此构建移动Ad Hoc网络安全评价指标体系。采用模糊理论改进指标权重判断矩阵建立模糊权重确定方法,同时采用将模糊理论和层次分析法相结合的方法建立可入侵检测的移动Ad Hoc网络安全综合评价模型。研究结果表明:移动Ad Hoc网络安全评价实例结果与入侵检测仿真分析结果一致,可入侵检测的移动Ad Hoc网络安全性能较好,说明移动Ad Hoc网络安全性能综合评价方法是一种有效的评价方法。 In order to enhance the performance security of mobile Ad Hoc network, a mobile Ad Hoc network with intrusion detection was designed after a chaotic immune clustering algorithm was embedded into mobile Ad Hoc network and the security evaluation index system of the mobile Ad Hoc network was built. Moreover, fuzzy weight judgment matrix with fuzzy theory was used to establish fuzzy weight determination method, and a comprehensive evaluation of the security of mobile Ad Hoc network with intrusion detection was established based on fuzzy theory and analytic hierarchy. The results show that the security evaluation example results and intrusion detection simulation results of the mobile Ad Hoc network are consistent, the security performance of mobile Ad Hoc network with the intrusion detection is fine, which shows that the comprehensive evaluation of the security of mobile Ad Hoc network with intrusion detection is a kind of effective comprehensive evaluation method for network security.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第9期3031-3039,共9页 Journal of Central South University:Science and Technology
基金 国家自然科学基金资助项目(51176045) 湖南省教育厅科技项目(12C0123 11C0403)~~
关键词 移动AD HOC网络 网络安全 模糊理论 层次分析方法 入侵检测 mobile Ad Hoc network network security fuzzy theory analytic hierarchy process intrusion detection
  • 相关文献

参考文献21

  • 1KOK G X, CHOW C O, XU Y H, et al. Sensor-free route stability metric for mobile Ad Hoc networks[J]. Computer Networks, 2016, 100: 166-178. 被引量:1
  • 2CARVALHO T, JENIOR J J, FRANCES R. A new cross-layer routing with energy awareness in hybrid mobile Ad Hoc networks: a fuzzy-based mechanism[J]. Simulation Modelling Practice and Theory, 2016, 63: 1-22. 被引量:1
  • 3SARKAR S, DATTA R. A secure and energy-efficient stochastic multipath routing for self-organized mobile Ad Hoc networks[J]. Ad Hoc Networks, 2016, 37(2): 209-227. 被引量:1
  • 4XIA Hut, YU Jia, TIAN Chengliang, et al. Light-weight trust-enhanced on-demand multi-path routing in mobile Ad Hoc networks[J]. Journal of Network and Computer Applications, 2016, 62: 112-127. 被引量:1
  • 5NARULA P, DHURANDHER S K, MISRA S, et al. Security in mobile Ad Hoc networks using soft encryption and trust-based multi-path routing[J]. Computer Communications, 2008, 31(4): 760-769. 被引量:1
  • 6KOMNINOS N, VERGADOS D D, DOULIGERIS C. Authentication in a layered security approach for mobile ad Hoc networks[J]. Computers & Security, 2007, 26(5): 373-380. 被引量:1
  • 7FENG Li, LI Zili, ZHANG Yi. Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network[J]. Journal of Network and Computer Applications, 2009, 32(4): 781-787. 被引量:1
  • 8VIJAYAKUMAR A, SELVAMANI K, KUMAR A P. Reputed packet delivery using efficient audit misbehaviour detection and monitoring method in mobile Ad Hoc networks[J]. Procedia Computer Science, 2015, 48: 489-496. 被引量:1
  • 9KRISHNAN D. A distributed self-adaptive intrusion detection system for mobile Ad-Hoc networks using tamper evident mobile agents[J]. Procedia Computer Science, 2015, 46: 1203-1208. 被引量:1
  • 10KUMAR V, KUMAR R. An adaptive approach for detection of blackhole attack in mobile Ad Hoc network[J]. Procedia Computer Science, 2015, 48: 472-479. 被引量:1

二级参考文献50

共引文献50

同被引文献54

引证文献9

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部