首页 | 本学科首页   官方微博 | 高级检索  
     

DSR协议下3种攻击的影响比较与仿真研究
引用本文:蔡继文,易平,周雍恺,田野,柳宁.DSR协议下3种攻击的影响比较与仿真研究[J].计算机工程,2009,35(21):155-158.
作者姓名:蔡继文  易平  周雍恺  田野  柳宁
作者单位:1. 上海交通大学信息安全工程学院网络信息安全教育部工程研究中心,上海,200030
2. 上海交通大学信息安全工程学院网络信息安全教育部工程研究中心,上海,200030;东南大学儿童发展与学习科学教育部重点实验室,南京,210096
基金项目:国家"863"计划基金资助项目,国家大学生创新活动计划基金资助项目,上海市自然科学基金资助项目,上海交通大学PRP项目基金资助项目 
摘    要:针对移动Ad Hoc网络的动态拓扑容易遭受各种网络攻击的特点,研究和比较现有的多种攻击模型,在动态源路由(DSR)协议下提出将黑洞节点按主动攻击和被动攻击进行分类的方法。在NS2网络仿真平台上实现包括RREQ洪泛攻击、被动型黑洞攻击和主动型黑洞攻击在内的3种攻击模式。通过仿真实验评估和比较这3种攻击对网络性能的影响,得出结论,就破坏性而言,RREQ洪泛攻击强于黑洞攻击,而主动型黑洞攻击强于被动型黑洞攻击。

关 键 词:移动自组织网络  动态源路由  洪泛攻击  被动型黑洞攻击  主动型黑洞攻击
修稿时间: 

Impact Comparison and Simulation Research of Three Attacks Under DSR Protocol
CAI Ji-wen,YI Ping,ZHOU Yong-kai,TIAN Ye,LIU Ning.Impact Comparison and Simulation Research of Three Attacks Under DSR Protocol[J].Computer Engineering,2009,35(21):155-158.
Authors:CAI Ji-wen  YI Ping  ZHOU Yong-kai  TIAN Ye  LIU Ning
Affiliation:(1. Network Information Security Engineering and Research Center, Ministry of Education, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200030; 2. Key Laboratory of Child Development and Learning Science, Ministry of Education, Southeast University, Nanjing 210096)
Abstract:This paper compares several attack 'models aiming at mobile Ad Hoc network's prosperity of routing vulnerable, and presents a classification that divides black hole attacks into two specific types, such as passive black hole attacks and active black hole attacks under Dynamic Source Routing(DSR) protocol. It implements three attack patterns, including the RREQ flooding attacks, the passive black hole attacks and the active black hole attacks, on DSR protocol using the Network Simulator 2(NS2). It demonstrates different performances of the network under these attacks and compares their fatality, so as to draw the conclusion that RREQ flooding attack is more harmful than the two kinds of black holes, and additionally, among black hole attacks, an active one is more dangerous.
Keywords:mobile Ad Hoc network  Dynamic Source Routing(DSR)  flooding attack  passive black hole attack  active black hole attack
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号