首页 | 本学科首页   官方微博 | 高级检索  
     

拓扑隐藏的MANET 安全多路径路由协议
引用本文:胡琪,张娇,张玉军,李忠诚.拓扑隐藏的MANET 安全多路径路由协议[J].软件学报,2011,22(5):1009-1019.
作者姓名:胡琪  张娇  张玉军  李忠诚
作者单位:1. 中国科学院,计算技术研究所,网络技术研究中心,北京,100190;中国科学院,研究生院,信息科学与工程学院,北京,100049
2. 中国科学院,计算技术研究所,网络技术研究中心,北京,100190
基金项目:国家自然科学基金,国家科技支撑计划
摘    要:分析了移动自组网(mobile ad hoc network,简称MANET)暴露拓扑带来的安全问题,提出了一种拓扑隐藏的安全多路径路由协议.在路由发现过程中,不在路由包中携带任何路径信息,从而有效隐藏网络拓扑.通过按需的邻居发现进行身份认证并建立路由表项,最终采用排除节点的方法实现多路径的选取;在路由维护过程中,设计了专门的错误发现机制以检验所选路径的有效性和安全性.该协议综合考虑时间因素和路径长度因素,实现了安全的最短路径确定.安全分析表明,该方案可以抵御黑洞攻击、虫洞攻击、rushing攻击和sybil等典型攻击,同时对一般类型的攻击也具有抵御能力.仿真结果表明,与SRP(secure routing protocol)这种典型的安全多路径方案相比,该方案能够找到更多节点不相交的多路径;在普通场景中,该方案没有对协议性能带来额外影响;在黑洞攻击场景中,该方案只需付出一定的信令开销即可大幅度提高数据包转发率,可有效抵御黑洞攻击.

关 键 词:拓扑隐藏  无线自组网  安全路由  多路径路由  最短路径
收稿时间:2008/12/24 0:00:00
修稿时间:2009/11/26 0:00:00

Topology-Hiding Secure Multipath Routing Protocol for MANET
HU Qi,ZHANG Jiao,ZHANG Yu-Jun and LI Zhong-Cheng.Topology-Hiding Secure Multipath Routing Protocol for MANET[J].Journal of Software,2011,22(5):1009-1019.
Authors:HU Qi  ZHANG Jiao  ZHANG Yu-Jun and LI Zhong-Cheng
Affiliation:1(Network Technology Research Center,Institute of Computing Technology,The Chinese Academy of Sciences,Beijing 100190,China)2(School of Information Science and Engineering,Graduate University,The Chinese Academy of Sciences,Beijing 100049,China)
Abstract:This paper provides a detailed analysis on the threats of topology-exposure in Mobile Ad Hoc Network (MANET) and proposes a secure topology-hiding multipath routing protocol based on the analysis. In Route Discovery, the new protocol exposes no routing information in packets to hide the network topology and adopts a node-excluded mechanism to find multiple paths. During this process, this protocol implements on-demand Neighbor Discovery to verify node identities. In Route Maintenance, a fault detection mechanism is designed to provide assurance that the selected paths are available and secure. Considering the factors of both reaction time and the path length, the scheme aims to find the shortest secure path. The security analysis shows that this scheme can resist the black hole attack, the wormhole attack, the rushing attack, the sybil attack, and other types of common attacks. Through extensive simulations, results demonstrate that this approach can find many more active paths than SRP without bringing negative influences into the normal scenario. Furthermore, this solution largely improves the packet delivery ratio in the black hole attack scenario at an acceptable cost.
Keywords:topology-hiding  mobile ad hoc network  routing security  multipath routing  shortest path
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号