共查询到20条相似文献,搜索用时 109 毫秒
1.
本文首先分析了现有移动Ad Hoc网络的两类路由协议及其优缺点,接着提出将移动代理应用于按需路由的方案。通过移动代理更新节点路由表,从而在网络负载增加不大的情况下,减小路由请求发起数,降低端到端的数据传输延迟。还可在移动代理中加入节点能量信息、节点负载信息等,通过移动代理在网络中漫游,收集并更新途经节点的相应信息,从而达到节能和缓解网络拥塞的目的。 相似文献
2.
移动代理在MANET路由协议中的应用研究 总被引:1,自引:0,他引:1
移动Ad Hoc网络(MANET)是由移动节点组成的分布式异构网络,其路由协议的研究是该领域的焦点之一。本文分析了现有移动Ad Hoc网络两类路由协议的优缺点,接着提出将移动代理应用于AODV路山协议的方案,最后给出了初步的仿真结果。仿真结果表明,通过移动代理的漫游更新途经节点路由表,可以在网络负载增加不人的情况下,减少路由发起数,降低端到端的数据传输延迟。 相似文献
3.
代理移动IPv6为移动节点提供了基于网络的移动性管理方法,移动节点不参与管理移动性信令.为了在移动互联网络中应用代理移动IPv6协议,需要定义安全有效的认证协议.目前还没有见到关于代理移动IPv6认证协议方面的研究,本文提出了一种代理移动IPv6的认证协议,该认证协议可以提供接入认证功能,并可防止重放攻击和密钥暴露.为了分析该认证协议的性能,本文给出了认证费用和认证延迟分析的解析模型,分析了移动性和流量参数对认证费用和认证延迟的影响.研究结果表明提出的代理移动IPv6认证协议安全有效. 相似文献
4.
问题的提出在移动IPv4中,当移动节点漫游到外地网络时,由通信对端送给连接在外地链路上的移动节点的数据包先被送到它的本地代理,然后经隧道送到移动节点的转交地址。然而,由移动节点发出的数据包却被直接送到通信对端,这就是移动IP协议中的三角路由问题。路由优化机制主要是用来解决三角路由问题,使得通信对端发送的数据包能够直接送到移动节点而无需本地代理的干预。这种经过优化的路由在时延和资源消耗方面都比三角路由好,改善了移动IP协议的性能。图1为三角路由和优化路由的比较。图1中的红线表示通信对端和移动节点之间经过… 相似文献
5.
6.
移动IPv6安全问题分析 总被引:5,自引:0,他引:5
移动IPv6协议作为下一代互联网解决移动通信的基本理论,为解决“三角路由”问题和更好的支持节点移动,定义了一些控制信令和新的移动扩展头,但同时也带来了新的安全威胁,为此提出了一些安全策略来保护控制信令。本文探讨了移动IPv6协议主要面临的安全威胁,分析了通过IPSec安全联盟来保护移动节点和家乡代理之间的控制信令以及RR协议来保护移动节点和通信节点之间的控制信令的安全策略。 相似文献
7.
8.
9.
移动IP在全球范围内的应用引入了许多安全问题,其中以认证问题最为关键,特别是当移动节点在外地链路上漫游时这种问题尤为明显。论文介绍了移动IP的认证机制以及针对其缺陷进行的DoS攻击,提出了一系列防范措施。理论分析表明,这些防范措施可以在一定程度上对DoS攻击进行防范,并维护移动IP网络的系统安全。 相似文献
10.
AAA在移动IP中的应用探讨 总被引:2,自引:1,他引:1
移动IP解决了移动节点在不改变IP地址的情况下的漫游问题,移动节点在漫游时,外地域通过AAA 服务器对其进行安全认征、授权、计费。本文探讨了一种AAA下移动IP的认证注册方案。在注册过程中利用公钥和对称密钥实现移动节点和网络的双向认证。 相似文献
11.
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application. 相似文献
12.
针对云计算中数据位置验证存在的共谋攻击,本文提出了抗共谋攻击的数据位置验证协议.首先给出了数据位置验证的系统模型,分析了安全威胁,并给出了数据位置验证的安全定义.随后,将安全定位协议与数据持有性证明协议相结合,设计了一维空间下的数据位置验证协议,并证明了所提协议满足安全定义且能抵御共谋攻击.在一维协议基础之上,构建了三维空间下的数据位置验证协议.最后,在三维空间下将本文所提协议与Lost协议和Geoproof协议进行了性能的测试和比较.结果表明所提协议能够验证服务器具体位置且能抵御共谋攻击. 相似文献
13.
《Digital Communications & Networks》2022,8(5):604-613
The cloud computing technology has emerged, developed, and matured in recent years, consequently commercializing remote outsourcing storage services. An increasing number of companies and individuals have chosen the cloud to store their data. However, accidents, such as cloud server downtime, cloud data loss, and accidental deletion, are serious issues for some applications that need to run around the clock. For some mission and business-critical applications, the continuous availability of outsourcing storage services is also necessary to protect users' outsourced data during downtime. Nevertheless, ensuring the continuous availability of data in public cloud data integrity auditing protocols leads to data privacy issues because auditors can obtain the data content of users by a sufficient number of storage proofs. Therefore, protecting data privacy is a burning issue. In addition, existing data integrity auditing schemes that rely on semi-trusted third-party auditors have several security problems, including single points of failure and performance bottlenecks. To deal with these issues, we propose herein a blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. We realize a concrete construction by using a verifiable delay function with high efficiency and proof of retrievability, and prove the security of the proposal in a random oracle model. The proposed construction supports dynamic updates for the outsourced data. We also design smart contracts to ensure fairness among the parties involved. Finally, we implement the protocols, and the experimental results demonstrate the efficiency of the proposed protocol. 相似文献
14.
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol 相似文献
15.
Routing protocol of MANET works with the presumption that nodes will transmit the data in collaboration. This presumption is a limitation of routing protocol which gives an occasion to attackers to hinder the security of the device and data in the network. Therefore, it becomes vital to develop methods and systems which will ensure the safety, integrity and confidentiality of data in such devices and systems. Although, existing IDS are able to detect various types of attack but some misbehavior goes undetected which potentially damage the network. Collusion attack is one such misbehavior where nodes perform maliciously in collaboration with neighboring nodes without being detected. In this work, Intrusion detection algorithm has been proposed that can effectively detect and isolate colluding nodes from the network so that these malicious nodes do not affect the performance of the network . Proposed detection algorithm uses in–out traffic information and overhearing statistics of nodes to identify colluding attackers. Detection algorithm works successfully for DSR routing protocol. Experimental results on NS-2 show that the proposed algorithm is capable of reducing the packet drops consequently improving the throughput of the network in presence of collusion attack. 相似文献
16.
由于目前基于匿名水印协议版权管理的共谋容限性较弱,或者保证共谋容限性的协议较复杂,文中提出了一种新的匿名水印协议,并对新协议的性能进行了分析。新协议的创新点在于,匿名水印由销售者生成,且经可信方CA对其部分进行置乱处理后方可作为有效水印。此协议保证了较强的共谋容限性,同时,在不传输原始作品的前提下,匿名水印仍然能由含边信息的水印系统生成。 相似文献
17.
In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data. 相似文献
18.
19.