首页 | 本学科首页   官方微博 | 高级检索  
     

基于可生存性的Ad Hoc网络容侵策略
引用本文:钱钢,龚春亚.基于可生存性的Ad Hoc网络容侵策略[J].计算机工程,2005,31(18):135-137.
作者姓名:钱钢  龚春亚
作者单位:南京师范大学计算机系,南京,210097
基金项目:国家“863”计划基金资助项目(2003AA413022);南京师大“十五”“211”工程资助项目“信息安全保密技术研究”
摘    要:针对Ad Hoc网络可生存性的威胁因素,采用基于本地群的安全复原策略,在邻节点管理机制和本地协同投票机制的基础上提出双层安全实施架构,建立群内移动节点之间安全基础上的群间的安全联动;并以Ad Hoc网络路由协议AODV的内部误用为例,说明安全策略的实施.

关 键 词:Ad  hoc网络可生存性  安全复原策略  双层安全实施架构
文章编号:1000-3428(2005)18-0135-03
收稿时间:2005-07-30
修稿时间:2005-07-30

Survivability-supported Intrusion-tolerance Policy for Ad Hoc
Qian Gang,GONG Chunya.Survivability-supported Intrusion-tolerance Policy for Ad Hoc[J].Computer Engineering,2005,31(18):135-137.
Authors:Qian Gang  GONG Chunya
Affiliation:Department of Computer Science,Nanjing Normal University, Nanjing 210097
Abstract:In order to enhance survivability of ad hoc networks,this paper uses local collaborative groups-based recovery policy.The key modules of the policy are neighborhood watching mechanism and local collaborative voting mechanism.And this paper provides the two-level-enforced implementation architecture.As a result of the limitation of network resource,the architecture is based on mobile agent structure.This security policy and implementation architecture effectively assure the survivability,security and availability of ad hoc network.
Keywords:Ad hoc network survivability  Secure recovery policy  Two-level-enforced security implementation architecture
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号