共查询到20条相似文献,搜索用时 171 毫秒
1.
2.
移动Ad Hoc网络路由协议综述 总被引:6,自引:0,他引:6
1 引言无线网络由于其移动性和灵活性给人们的生活带来了极大的方便,因此日益广泛地进入我们的日常生活。近年来,一种新型的无线网络即移动Ad Hoc网络(MANET)诞生了。移动Ad Hoc网络是由一组移动节点(带有多个终端的路由器、移动通讯设备等)形成一个多跳的、临时性的自治系统。这 相似文献
3.
Ad Hoc网络是针对移动主机提出的一种新型无线网络范例,与传统的移动无线网络不同,它不依赖任何固定设备.由于网络特性和传播介质的不同,传统有线网络的入侵检测系统(IDs)并不能很好的应用于无线移动Ad Hoc网络.本文在分析AdHoc网络的特点和当前的入侵检测技术后,给出了一种适合于Ad Hoc网络的入侵检测系统的结构. 相似文献
4.
Ad Hoc网络作为一种无线移动网络,其安全问题,特别是路由协议的安全备受关注。针对现有适合移动Ad Hoc网络的链路状态路由协议GSR无法防范恶意节点伪造、篡改、DoS攻击的现状,本文提出了一种在移动Ad Hoc网络中抵抗单个节点恶意攻击的安全路由协议SGSR,给出了认证协议的形式化证明,并对路由协议进行仿真和性能分析。 相似文献
5.
6.
7.
8.
Ad Hoc网络是一种无固定基础设施的新型网络,网络节点不断移动,网络拓扑不断变化。由于其固有的脆弱性使得它极易受到各种攻击,Ad Hoc网络的安全问题给入侵检测技术带来更多的挑战。本文介绍了入侵检测技术及其分类,总结并分析了现有的适于Ad Hoc网络的各种入侵检测技术的优缺点.为今后研究开展研究奠定了理论基础。 相似文献
9.
Ad Hoc网络是一种无固定基础设施的新型网络,网络节点不断移动,网络拓扑不断变化。由于其固有的脆弱性使得它极易受到各种攻击,Ad Hoc网络的安全问题给入侵检测技术带来更多的挑战。本文介绍了入侵检测技术及其分类,总结并分析了现有的适于Ad Hoc网络的各种入侵检测技术的优缺点,为今后研究开展研究奠定了理论基础。 相似文献
10.
针对各种类型的移动Ad Hoc网络(MANET)攻击的检测和分析已经有大量的研究,但对这些攻击行为的分析和评估仍然缺乏一种系统有效的攻击建模方式.在现有攻击树的基础上提出针对Ad Hoc网络攻击的改进攻击树.改进攻击树扩充了节点间的类型和节点属性,给出了节点属性参数的量化方法.该改进攻击树有效地实现了对移动Ad Hoc网络中链路层以上攻击行为的建模分析和评估,最后结合黑洞攻击,给出该改进攻击树的具体应用. 相似文献
11.
12.
Opportunistic networks (ONs) allow mobile wireless devices to interact with one another through a series of opportunistic contacts. While ONs exploit mobility of devices to route messages and distribute information, the intermittent connections among devices make many traditional computer collaboration paradigms, such as distributed shared memory (DSM), very difficult to realize. DSM systems, developed for traditional networks, rely on relatively stable, consistent connections among participating nodes to function properly.We propose a novel delay tolerant lazy release consistency (DTLRC) mechanism for implementing distributed shared memory in opportunistic networks. DTLRC permits mobile devices to remain independently productive while separated, and provides a mechanism for nodes to regain coherence of shared memory if and when they meet again. DTLRC allows applications to utilize the most coherent data available, even in the challenged environments typical to opportunistic networks. Simulations demonstrate that DTLRC is a viable concept for enhancing cooperation among mobile wireless devices in opportunistic networking environment. 相似文献
13.
Hybrid Wireless Mesh Network (HWMN) is a new wireless networking paradigm. Unlike traditional wireless networks, in HWMNs, hosts may rely on each other to keep the network connected. Operators and wireless internet service providers are choosing HWMNs to offer Internet connectivity, as it allows fast, easy and affordable network deployments. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we investigate the main security issues focusing on the most vulnerable part of the hybrid WLAN mesh infrastructure which concerns the ad hoc network part. Through our proposed architecture, Security Architecture for Operator’s Hybrid WLAN Mesh Network (SATHAME), we identify the new challenges and opportunities posed by this emerging networking environment and explore approaches to secure users, data and communications. From the analysis of strengths and weaknesses of secured routing protocols, we designed a new robust routing structure called MacroGraph (MG). MG structure is extracted from the mesh ad hoc network for each communication to be established between a source and a destination. Especially, MG is a robust structure based on node-disjoint path routing scheme and dynamic trust management that can be adapted to respond to applications’ security requirements. We present a performance analysis of our efficient, robust and scalable multipath reactive secured routing protocol. We investigate the behavior of our proposed scheme under two attack scenarios: Packet Dropping and Route Error attacks in dense network configurations. 相似文献
14.
As there are more and more mobile devices in use, different mobile networking models such as ad hoc or mesh are attracting a large research interest. Self-organizing mobile ad hoc networks (MANET) allow devices to share their services and resources without any central administration or Internet support. In this respect they can become the backbone of the wireless grid or the gateway to existing grids. To achieve these goals, MANET management must be as effective as that of wired networks. This is, however, a challenging task due to network features like mobility, heterogeneity, limited resources of hosts and feeble communication. This paper presents a set of simple, cost-effective and resilient procedures for the basic tasks of MANET creation and management. 相似文献
15.
An implicit assumption underlying most networking research has been that two Internet users would be connected only by fixed links (wire lines). Increased use of portable computers, wireless networks and satellites has generated interest in supporting “computing on the move”, or mobile computing. Instead of maintaining a fixed position in a network, users in this environment are free to roam. Mobile computing raises interesting issues, such as how to route packets as the mobile user (host) moves about and how to guarantee the quality of service (QOS) that an application running on such a mobile host may need. Other issues include the choice of a transport protocol to use on top of a mobile host and how to deal with poor performance in wireless links. There are two possible approaches to supporting mobile computing over the Internet. The first uses a mobile IP (Internet Protocol), whereby packets (datagrams) are forwarded by a designated stationary host to the mobile host. The second approach involves wireless ATM (asynchronous transfer mode), with host mobility supported by rerouting/rearranging the end-to-end ATM connection between mobile and stationary hosts 相似文献
16.
Xu Wu 《Peer-to-Peer Networking and Applications》2012,5(2):193-204
In this paper we propose a distributed Trust Management Model (DTMM) for constructing much shorter and more robust trust chains
in mobile p2p networks. With DTMM, each moving object within the same group tends to have a high probability of keeping stable
distances from each other. The main contribution of this model is to predict the future availability of wireless links and
lead to fast generating valid trust evidences. A major difference between DTMM and many existing models in trust literature
is that DTMM does not rely on any fixed networking infrastructure, and therefore is able to adapt to both high mobility environments.
Our work appears to be the first attempt to research the relationship between mobile patterns and trust management of peers
in mobile P2P network. The simulation results show that our model is highly robust and scalable in the dynamic environment
of mobile networks. 相似文献
17.
《Computer Networks》1999,31(7):741-765
Existing mobile systems (e.g., mobile IP, mobile ATM and third generation cellular systems) lack the intrinsic architectural flexibility to deal with the complexity of supporting adaptive mobile applications in wireless and mobile environments. We believe that there is a need to develop alternative network architectures from the existing ones to deal with the demands placed on underlying mobile signalling, adaptation management and wireless transport systems in support of new mobile services, e.g. interactive multimedia and web access. In this paper we present the design, implementation and evaluation of mobiware, a middleware technology that enables the introduction of new services in mobile networks. Mobiware provides a toolkit that service providers can utilize to build services that can dynamically exploit the intrinsic scalable properties of mobile multimedia applications in response to time-varying mobile network conditions. Based on an open programmable networking paradigm, mobiware runs on mobile devices, wireless access points and mobile-capable switch/routers providing a set of open programmable interfaces and distributed objects for adaptive mobile networking. Mobiware is software-intensive and is built on CORBA and Java distributed object technologies. The source code for mobiware v1.0 is freely available (comet.columbia.edu/mobiware) for experimentation. 相似文献
18.
随着宽带网络迅速普及,越来越多的人希望用手提电脑、PDA、手机等设备移动接入网络.而无线宽带网络逐渐在公共接入.公共安全.公共服务等方面发挥巨大潜力,引发了无线网络建设的热潮;本文在分析制约无线网络发展的主要问题基础上.对规模化无线网络建设给出一些具体方案和建议. 相似文献
19.
After discussing advances in wired networking in a previous column (see ibid., p.107-9, April 2000), I now turn to advances in wireless networking. Wireless networks can include everything from cellular, personal communications system (PCS), and Group System for Mobile communications (GSM) networks to wireless LANs, satellite-based networks, and fixed wireless networks. Many of these technologies have experienced significant growth lately because of an increasingly mobile workforce and accelerating user acceptance 相似文献