首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
移动Ad Hoc网络中的组密钥管理策略   总被引:4,自引:0,他引:4  
张桢萍  许力  叶阿勇 《计算机应用》2005,25(12):2727-2730
移动Ad Hoc网络是由移动节点组成的不需要固定基站的临时性计算机通信网络,设计这种网络的主要挑战之一是它们在抵抗安全攻击方面的脆弱性。无中心、动态拓扑和时变链路使得移动Ad Hoc网络的组密钥管理面临巨大的挑战。通过对现有的组密钥管理策略进行对比分析,为该领域的进一步研究提供了思路。  相似文献   

2.
移动Ad Hoc网络路由协议综述   总被引:6,自引:0,他引:6  
1 引言无线网络由于其移动性和灵活性给人们的生活带来了极大的方便,因此日益广泛地进入我们的日常生活。近年来,一种新型的无线网络即移动Ad Hoc网络(MANET)诞生了。移动Ad Hoc网络是由一组移动节点(带有多个终端的路由器、移动通讯设备等)形成一个多跳的、临时性的自治系统。这  相似文献   

3.
Ad Hoc网络是针对移动主机提出的一种新型无线网络范例,与传统的移动无线网络不同,它不依赖任何固定设备.由于网络特性和传播介质的不同,传统有线网络的入侵检测系统(IDs)并不能很好的应用于无线移动Ad Hoc网络.本文在分析AdHoc网络的特点和当前的入侵检测技术后,给出了一种适合于Ad Hoc网络的入侵检测系统的结构.  相似文献   

4.
一种安全的Ad Hoc网络路由协议SGSR   总被引:3,自引:0,他引:3       下载免费PDF全文
Ad Hoc网络作为一种无线移动网络,其安全问题,特别是路由协议的安全备受关注。针对现有适合移动Ad Hoc网络的链路状态路由协议GSR无法防范恶意节点伪造、篡改、DoS攻击的现状,本文提出了一种在移动Ad Hoc网络中抵抗单个节点恶意攻击的安全路由协议SGSR,给出了认证协议的形式化证明,并对路由协议进行仿真和性能分析。  相似文献   

5.
移动Ad Hoc网的典型网络攻击与防范   总被引:2,自引:0,他引:2  
随着移动Ad Hoc网络(MANET)的应用越来越广泛,针对Ad Hoc网络的攻击也越来越多。探讨了移动Ad Hoc网中的典型网络层安全漏洞及可能的攻击,分析了各种解决方案的优缺点,为了移动Ad Hoc网络路由安全的进一步研究,提供了基础。  相似文献   

6.
一种新型基于GPS的无线自组网分群算法   总被引:1,自引:1,他引:0  
设计了一种新的基于GPS的Ad Hoc网络分群算法,在群初始化充分利用节点的地理坐标进行分群,使得分群更加合理;在群的维护管理方面,引入了候选群首辅助管理分群,使Ad Hoc网络的分群保持更加稳定可靠。基于该种分群算法设计的Ad Hoc网络移动管理系统,能够实时跟踪、显示移动节点在地图上的位置信息,解决了Ad Hoc网络中由于节点移动所造成的移动管理等问题。  相似文献   

7.
移动Ad Hoc网络是随着无线通信技术的快速发展而出现的一种新型网络。由于Ad Hoc网络自身的特殊性,其路由协议的设计与传统固定网络有很大不同。文章描述了Ad Hoc网络中路由协议设计所面临的问题,讨论了Ad hoc网络中路由协议设计的几种策略。对现行的Ad Hoc网络路由协议进行了时比、分析和分类阐述,为进一步研究提出了新的课题。  相似文献   

8.
Ad Hoc网络是一种无固定基础设施的新型网络,网络节点不断移动,网络拓扑不断变化。由于其固有的脆弱性使得它极易受到各种攻击,Ad Hoc网络的安全问题给入侵检测技术带来更多的挑战。本文介绍了入侵检测技术及其分类,总结并分析了现有的适于Ad Hoc网络的各种入侵检测技术的优缺点.为今后研究开展研究奠定了理论基础。  相似文献   

9.
Ad Hoc网络是一种无固定基础设施的新型网络,网络节点不断移动,网络拓扑不断变化。由于其固有的脆弱性使得它极易受到各种攻击,Ad Hoc网络的安全问题给入侵检测技术带来更多的挑战。本文介绍了入侵检测技术及其分类,总结并分析了现有的适于Ad Hoc网络的各种入侵检测技术的优缺点,为今后研究开展研究奠定了理论基础。  相似文献   

10.
针对各种类型的移动Ad Hoc网络(MANET)攻击的检测和分析已经有大量的研究,但对这些攻击行为的分析和评估仍然缺乏一种系统有效的攻击建模方式.在现有攻击树的基础上提出针对Ad Hoc网络攻击的改进攻击树.改进攻击树扩充了节点间的类型和节点属性,给出了节点属性参数的量化方法.该改进攻击树有效地实现了对移动Ad Hoc网络中链路层以上攻击行为的建模分析和评估,最后结合黑洞攻击,给出该改进攻击树的具体应用.  相似文献   

11.
Ad hoc网络密钥生成管理方案综述与分析*   总被引:2,自引:1,他引:1  
Ad hoc网络安全性是迅速发展的一个研究热点,提出高效适用的密钥生成管理方案是其中的难点,目前对此已有的成果纷繁多样。分类总结了这方面的理论,对比和分析了各种方法的功能,并指出了各自存在的问题。总结出密钥生成和管理协议存在的共性问题,为进一步的工作提供了清晰的思路。  相似文献   

12.
Opportunistic networks (ONs) allow mobile wireless devices to interact with one another through a series of opportunistic contacts. While ONs exploit mobility of devices to route messages and distribute information, the intermittent connections among devices make many traditional computer collaboration paradigms, such as distributed shared memory (DSM), very difficult to realize. DSM systems, developed for traditional networks, rely on relatively stable, consistent connections among participating nodes to function properly.We propose a novel delay tolerant lazy release consistency (DTLRC) mechanism for implementing distributed shared memory in opportunistic networks. DTLRC permits mobile devices to remain independently productive while separated, and provides a mechanism for nodes to regain coherence of shared memory if and when they meet again. DTLRC allows applications to utilize the most coherent data available, even in the challenged environments typical to opportunistic networks. Simulations demonstrate that DTLRC is a viable concept for enhancing cooperation among mobile wireless devices in opportunistic networking environment.  相似文献   

13.
Hybrid Wireless Mesh Network (HWMN) is a new wireless networking paradigm. Unlike traditional wireless networks, in HWMNs, hosts may rely on each other to keep the network connected. Operators and wireless internet service providers are choosing HWMNs to offer Internet connectivity, as it allows fast, easy and affordable network deployments. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we investigate the main security issues focusing on the most vulnerable part of the hybrid WLAN mesh infrastructure which concerns the ad hoc network part. Through our proposed architecture, Security Architecture for Operator’s Hybrid WLAN Mesh Network (SATHAME), we identify the new challenges and opportunities posed by this emerging networking environment and explore approaches to secure users, data and communications. From the analysis of strengths and weaknesses of secured routing protocols, we designed a new robust routing structure called MacroGraph (MG). MG structure is extracted from the mesh ad hoc network for each communication to be established between a source and a destination. Especially, MG is a robust structure based on node-disjoint path routing scheme and dynamic trust management that can be adapted to respond to applications’ security requirements. We present a performance analysis of our efficient, robust and scalable multipath reactive secured routing protocol. We investigate the behavior of our proposed scheme under two attack scenarios: Packet Dropping and Route Error attacks in dense network configurations.  相似文献   

14.
As there are more and more mobile devices in use, different mobile networking models such as ad hoc or mesh are attracting a large research interest. Self-organizing mobile ad hoc networks (MANET) allow devices to share their services and resources without any central administration or Internet support. In this respect they can become the backbone of the wireless grid or the gateway to existing grids. To achieve these goals, MANET management must be as effective as that of wired networks. This is, however, a challenging task due to network features like mobility, heterogeneity, limited resources of hosts and feeble communication. This paper presents a set of simple, cost-effective and resilient procedures for the basic tasks of MANET creation and management.  相似文献   

15.
Varshney  U. 《Computer》1997,30(1):131-133
An implicit assumption underlying most networking research has been that two Internet users would be connected only by fixed links (wire lines). Increased use of portable computers, wireless networks and satellites has generated interest in supporting “computing on the move”, or mobile computing. Instead of maintaining a fixed position in a network, users in this environment are free to roam. Mobile computing raises interesting issues, such as how to route packets as the mobile user (host) moves about and how to guarantee the quality of service (QOS) that an application running on such a mobile host may need. Other issues include the choice of a transport protocol to use on top of a mobile host and how to deal with poor performance in wireless links. There are two possible approaches to supporting mobile computing over the Internet. The first uses a mobile IP (Internet Protocol), whereby packets (datagrams) are forwarded by a designated stationary host to the mobile host. The second approach involves wireless ATM (asynchronous transfer mode), with host mobility supported by rerouting/rearranging the end-to-end ATM connection between mobile and stationary hosts  相似文献   

16.
In this paper we propose a distributed Trust Management Model (DTMM) for constructing much shorter and more robust trust chains in mobile p2p networks. With DTMM, each moving object within the same group tends to have a high probability of keeping stable distances from each other. The main contribution of this model is to predict the future availability of wireless links and lead to fast generating valid trust evidences. A major difference between DTMM and many existing models in trust literature is that DTMM does not rely on any fixed networking infrastructure, and therefore is able to adapt to both high mobility environments. Our work appears to be the first attempt to research the relationship between mobile patterns and trust management of peers in mobile P2P network. The simulation results show that our model is highly robust and scalable in the dynamic environment of mobile networks.  相似文献   

17.
《Computer Networks》1999,31(7):741-765
Existing mobile systems (e.g., mobile IP, mobile ATM and third generation cellular systems) lack the intrinsic architectural flexibility to deal with the complexity of supporting adaptive mobile applications in wireless and mobile environments. We believe that there is a need to develop alternative network architectures from the existing ones to deal with the demands placed on underlying mobile signalling, adaptation management and wireless transport systems in support of new mobile services, e.g. interactive multimedia and web access. In this paper we present the design, implementation and evaluation of mobiware, a middleware technology that enables the introduction of new services in mobile networks. Mobiware provides a toolkit that service providers can utilize to build services that can dynamically exploit the intrinsic scalable properties of mobile multimedia applications in response to time-varying mobile network conditions. Based on an open programmable networking paradigm, mobiware runs on mobile devices, wireless access points and mobile-capable switch/routers providing a set of open programmable interfaces and distributed objects for adaptive mobile networking. Mobiware is software-intensive and is built on CORBA and Java distributed object technologies. The source code for mobiware v1.0 is freely available (comet.columbia.edu/mobiware) for experimentation.  相似文献   

18.
随着宽带网络迅速普及,越来越多的人希望用手提电脑、PDA、手机等设备移动接入网络.而无线宽带网络逐渐在公共接入.公共安全.公共服务等方面发挥巨大潜力,引发了无线网络建设的热潮;本文在分析制约无线网络发展的主要问题基础上.对规模化无线网络建设给出一些具体方案和建议.  相似文献   

19.
Varshney  U. 《Computer》2000,33(6):100-103
After discussing advances in wired networking in a previous column (see ibid., p.107-9, April 2000), I now turn to advances in wireless networking. Wireless networks can include everything from cellular, personal communications system (PCS), and Group System for Mobile communications (GSM) networks to wireless LANs, satellite-based networks, and fixed wireless networks. Many of these technologies have experienced significant growth lately because of an increasingly mobile workforce and accelerating user acceptance  相似文献   

20.
借助P2P思想,构建一个基于移动网络基础设施提供对等服务的无线传感器网络体系结构。移动网络充当移动P2P平台,提供一种普适的传感器组网。代表传感器网络的网关节点隐藏了其实现细节,在P2P模式工作下向用户提供更加优质的个人服务。此外,还讨论了服务平台构建过程中的一般性问题。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号