首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
移动代理技术在Ad Hoc无线网络中的应用研究   总被引:1,自引:0,他引:1  
Ad Hoc无线网络是一组具有路由和转发功能的移动节点组成的一个多跳的临时性自治系统,是一种无中心的无线网络。现有的主动路由协议或者按需路由协议都不能很好地满足Ad Hoc网络的需要。介绍了Ad Hoc无线移动网络和移动代理技术。在分析了现有的2种路由协议后,提出了在按需路由协议中加入移动代理技术来增强Ad Hoc无线网络的性能。在这些结果的基础上,提出了移动代理通信协议。  相似文献   

2.
朱峥  安珊珊 《信息技术》2007,(10):17-19
将Ad Hoc网络与蜂窝网融合首要解决的问题是Ad Hoc如何接入蜂窝网,多数方案使用的是移动IP。提出了一种基于扩展Ad Hoc路由协议的多跳转发网络方案。Ad Hoc多种路由协议中可以实现Ad Hoc网络与蜂窝网互连的只有DSDV,但在移动场景中的低性能限制了它的发展。AODV是Ad Hoc路由协议中最有前途的协议,但它并不支持Ad Hoc节点接入基站的路由搜索。研究对AODV协议进行改进,以使它能支持移动节点到固定基站以及有线网络的寻路。  相似文献   

3.
《信息技术》2015,(2):130-133
移动Ad Hoc网络是一种具有高度动态拓扑结构、节点任意移动的自组织网络。路由协议能够为数据分组的传输指定路径,是移动节点相互通信的基础,对移动Ad Hoc网络的性能起着至关重要的作用。文中介绍移动Ad Hoc网络及其路由协议的基本概念和特殊性,研究几种典型按需路由协议的原理,对协议进行综合比较,简要讨论了各自的优缺点。  相似文献   

4.
提出了一种基于二进前向神经网络的无线移动Ad Hoc网络节点识别方法。安全问题是无线移动Ad Hoc网络的一个关键性问题,路由协议的安全尤为重要,本文针对恶意节点的主动攻击提出了一种基于二进前向神经网络的无线移动Ad Hoc网络节点识别方法,该方法可以有效的避免恶意节点接入网络,从而提高了网络路由的安全性。  相似文献   

5.
移动Ad Hoc网络的节点常被安装在无人看护的地方,并且缺乏对物理窃听的防范.因此,移动网络节点容易受到安全威胁.当受到拒绝服务攻击的时候,Ad Hoc网络表现的特别脆弱.在这篇文章中,我们分析了一种新的DoS攻击――Ad Hoc泛洪攻击,在Ad Hoc网络中当使用按需路由的协议时,很容易受到这种泛洪攻击的威胁.它能使整个网络处于一种拒绝服务的状态.入侵者广播大量的路由请求分组,或者发送大量的攻击数据包以耗尽带宽和节点的资源,从而使正常的通信被拒绝.而后提出了泛洪攻击预防方法(Flooding Attack Prevention FAP).这种方法能够有效地防止移动自组织网络中的Ad Hoc泛洪攻击.FAP方法是由邻居抑制和路径切断两个方面组成.当入侵者广播大量的路由请求分组时,它的邻居就会察觉到高频的路由请求,它会根据收到的查询率来降低它和入侵者之间通信的优先级,而且,无服务的低优先级查询最终会被丢弃.当入侵者发送大量的攻击数据包给一个目标节点时,这个节点可能会切断这条路径并且不再和入侵者建立路径.因此,在移动自组织网络中,可以通过FAP来防止Ad Hoc泛洪攻击.  相似文献   

6.
Ad Hoc网络因具备无需基础设施的灵活性,使其越来越得到重视,但因受无线带宽有限、节点频繁移动、电池能量制约的影响,移动Ad Hoc网络民用化仍面临很多挑战。文章在全面分析Ad Hoc网络路由协议的基础上,为了避免节点频繁移动而造成网络资源浪费,提出了基于AODV协议的多路径路由协议TRND-AODV,并分析了使用OPNET仿真平台得出的仿真结果。仿真结果表明当网络负载较大时,多路径路由协议在时延等多方面性能显著提高。  相似文献   

7.
一种适用于非对称链路的Ad Hoc网络路由协议   总被引:3,自引:0,他引:3  
提出了一种适用于非对称链路的Ad Hoc网络路由协议。该协议是一种基于路由池的反应式路由协议,当源节点与目标节点有数据交换时,通过路由发现过程分别在源节点和目标节点构建数据路由池和应答路由池,数据的发送和应答路径随机地从相应路由池中选取,并在数据的交换的过程中动态地更新和维护路由池。仿真结果表明该协议适用于普遍存在非对称链路的无线移动Ad Hoc网络。  相似文献   

8.
移动代理在MANET路由协议中的应用研究   总被引:1,自引:0,他引:1  
移动Ad Hoc网络(MANET)是由移动节点组成的分布式异构网络,其路由协议的研究是该领域的焦点之一。本文分析了现有移动Ad Hoc网络两类路由协议的优缺点,接着提出将移动代理应用于AODV路山协议的方案,最后给出了初步的仿真结果。仿真结果表明,通过移动代理的漫游更新途经节点路由表,可以在网络负载增加不人的情况下,减少路由发起数,降低端到端的数据传输延迟。  相似文献   

9.
靳超  李德敏  佟乐  陈凤伟 《通信技术》2011,44(2):59-61,64
研究了Ad Hoc网络中移动模型问题。针对目前Ad Hoc网络节点通常具有群组移动性的特征,提出了一种新的移动模型—高斯-马尔科夫组移动模型。通过与RWP、CGM移动模型仿真对比得出,该移动模型符合能够有效描述具有群组移动性的Ad Hoc网络,同时也表明,不同的移动模型对Ad Hoc网络路由协议性能具有很大的影响。  相似文献   

10.
杨润萍  杜世民 《信息技术》2007,31(9):121-123
移动Ad Hoc网络是指由一组带有无线收发装置的移动节点组成的一个多跳的、不需要固定中心接入点或者基站支持的自治系统。对移动Ad Hoc网络多播路由中的MAODV协议进行理论分析,采用OPNET软件对该协议在AdHoc网络中的分组投递速率和延迟等关键参数进行仿真统计,并分析了节点移动速率对路由协议性能的影响。  相似文献   

11.
移动自组网是一种有特殊用途的对等式网络,具有无中心、自组织、可快速展开、可移动等特点,这些特点使得它在战场、救灾等特殊场合的应用日渐受到人们的重视.由于在移动自组网络中每节点既是主机又是路由器,所以容易遭受基于路由信息的攻击,而现今的路由协议基本没有考虑到该问题.本文在分析移动自组网络安全特性的基础上,综述了该方面的研究工作,建立了基于声誉机制评价体系,并给出了具体的评价方法和计算模型.在此基础上,提出了基于声誉机制的安全路由协议S-DSR.仿真结果表明在存在攻击节点的情况下S-DSR协议比DSR协议具有更好的包传输率、包丢失率等属性.  相似文献   

12.
路由信息的攻击对AODV协议性能的影响分析   总被引:4,自引:0,他引:4  
AODV协议是移动自组网络中一种按需反应的表驱动路由协议。在移动自组网中,每个节点既是计算机又是路由器,容易遭受基于路由信息的网络攻击,而现今的路由协议基本没有考虑到该问题。本文在分析移动自组网中针对路由信息主要攻击方法的基础上,建立了主动性和自私性两个攻击模型,并且在AODV协议中扩充实现了这两类攻击行为。通过对模拟结果的分析和比较,讨论了路由信息的攻击对AODV协议性能的影响,并进一步探讨了针对基于路由信息攻击的防御措施。  相似文献   

13.
A mobile ad hoc network (MANET) is a self-configurable network connected by wireless links. This type of network is only suitable for provisional communication links as it is infrastructure-less and there is no centralized control. Providing QoS and security aware routing is a challenging task in this type of network due to dynamic topology and limited resources. The main purpose of secure and trust based on-demand multipath routing is to find trust based secure route from source to destination which will satisfy two or more end to end QoS constraints. In this paper, the standard ad hoc on-demand multi-path distance vector protocol is extended as the base routing protocol to evaluate this model. The proposed mesh based multipath routing scheme to discover all possible secure paths using secure adjacent position trust verification protocol and better link optimal path find by the Dolphin Echolocation Algorithm for efficient communication in MANET. The performance analysis and numerical results show that our proposed routing protocol produces better packet delivery ratio, reduced packet delay, reduced overheads and provide security against vulnerabilities and attacks.  相似文献   

14.
Integration of ad hoc networks with the Internet provides global Internet connectivity for ad hoc hosts through the coordination of mobile IP and ad hoc protocols. In a pure ad hoc network, it is difficult to establish trust relationship between two ad hoc hosts due to lack of infrastructure or centralized administration. In this paper, an infrastructure‐supported and distributed authentication protocol is proposed to enhance trust relationships amongst ad hoc hosts. In addition, an effective secure routing protocol (SRP) is discussed to protect the multi‐hop route for Internet and ad hoc communication. In the integrated ad hoc networks with Internet accessibility, the ad hoc routing security deployed with the help of infrastructure has a fundamental impact on ad hoc hosts in term of Internet access, integrity, and authentication. Both analysis and simulation results demonstrate the effectiveness of the proposed security protocol. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

15.
In this paper, we use fuzzy Petri nets (FPNs) to propose a secure routing protocol in mobile ad hoc network. The proposed method is based on secure ad hoc on‐demand distance vector (SAODV), which is named FPN‐SAODV. In FPN‐SAODV routing protocol, for each packet delivery or firing each transition, a type of bidirectional node‐to‐node fuzzy security verification is conducted that can be carried out with five security threshold levels. This inference uses four fuzzy variables that have been selected to well represent the malicious behaviors of some public attacks in mobile ad hoc network. Furthermore, a through route security verification has been used for selecting the most secure route among each candidate path through source node to destination. Both of these verifications utilize FPN inherent features for their operation. For evaluation purpose, we used the metrics such as packet delivery ratio, end‐to‐end delay, average security level of the nodes, and percentage of true/false detector nodes. These metrics have been used for investigating the inner operation of FPN‐SAODV as determining the proper level of security threshold level in node‐to‐node security verification module. Also, these are used for comparison of FPN‐SAODV performance versus the original AODV. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

16.
Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique characteristics coupled with the growing concerns for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in mobile ad hoc networks has been primarily focused on routing and mobility aspects rather than securing the ad hoc networks themselves. Due to ever increasing security threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc network infrastructure. To realize this objective, we have proposed a practical and effective security model for mobile ad hoc networks. The proposed predictive security model is designed using a fuzzy feedback control approach. The model is based on identifying critical network parameters that are affected by various types of attacks and it continuously monitors those parameters. Once we measure the relative change in these parameter values, we could detect the type of attack accurately and protect the system, without compromising its effectiveness. Experimental results of the model simulated for selected packet mistreatment attacks and routing attacks are very promising.  相似文献   

17.
Today's communication world is majorly driven by mobile nodes that demand wireless systems for their data relay. One such network is mobile ad hoc network, which is a purely wireless network with which communication is feasible instantly without any aid of preexisting infrastructure; due to this magnificent feature, it has a wide variety of applications. Mobile ad hoc network hinges on cooperative nature of the mobile nodes for relaying data. But at the same time, nodes relaying data for others may compromise, leading to various security attacks. Two main security attacks that drastically bring down the performance of mobile ad hoc network are black hole and gray hole attacks. In this paper, we propose 2 versions of invincible Ad hoc On‐Demand Distance Vector protocol to detect black hole and gray hole nodes that have bypassed preventive mechanism during route discovery process. First is the basic version, which is based on node‐to‐node frame check sequence tracking mechanism, and second is the enhanced version, which is based on signed frame check sequence tracking mechanism. They create a deterrent environment addressing all kinds of black and gray hole attacks. They also provide reliable data transmission to all the nonmalicious nodes in the network by using end‐to‐end authentication mechanism. Simulation results show better performance in packet delivery ratio when compared with other contemporary solutions while addressing all kinds of black and gray hole attacks. It shows significant improvement in end‐to‐end delay and normalized routing load over Ad hoc On‐Demand Distance Vector under black hole or gray hole attacks and also shows better throughput and packet delivery ratio than the existing solution.  相似文献   

18.
Ad hoc网络的安全性问题越来越引起人们的关注,如何确保Ad hoc网络路由协议的安全成为Ad hoc研究的一项关键技术。本文介绍了安全协议的目标以及针对Ad hoc网络路由协议的恶意攻击,接着详细分析了目前比较典型的几种Ad hoc网络安全路由的研究现状,在对他们进行综合比较的基础上指出了存在的问题。  相似文献   

19.
移动Adhoc网络的自组织、动态拓扑以及无线接入等特点使路由的安全性问题日益突出,而现有的Adhoc网络路由协议并没有提供安全的保护机制。论文首先论述了Adhoc网络几种常见的按需安全路由协议,指出有待解决的问题,在此基础上提出一种改进的、有效的安全路由协议(SEAR),阐述了该协议的路由请求、响应和维护的路由方式和过程,并通过协议间的比较分析其安全性和网络性能。该方案采用对称密钥协商和公钥认证方式,在兼顾性能资源的同时也保证了Adhoc网络的路由安全。  相似文献   

20.
Ubarhande  S. D.  Doye  D. D.  Nalwade  P. S. 《Wireless Networks》2019,25(4):1867-1874

Mobile ad hoc network is open medium and infrastructure-less network. Mobile ad hoc network is susceptible to various security attacks such as, black hole attack, gray hole attack, bad mouthing attack, sybil attack and worm hole attack due to open medium, infrastructure-less features and lack of in-built security. In black hole attack and gray hole attack, attacker falsely sends route reply and dropped data packets received from source node. Due to these attacks, performance of mobile ad hoc network decreases. This paper proposes a time stamp-based algorithm which is an enhanced version of existing IDSNAODV algorithm. Proposed algorithm modifies existing palling process to validate identity of observer nodes using a time stamp-based approach. Based on defined set of rules and recorded activities report, source node decides the nature of target node. The performance of proposed algorithm is evaluated using the network simulator. The proposed algorithm shows improved performance for packet delivery ratio, throughput and routing overhead as compared to existing algorithm.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号