共查询到19条相似文献,搜索用时 281 毫秒
1.
2.
3.
4.
为提高无线传感器网络的安全性和节能性,提出一种基于信任的安全路由协议TSRP。根据新的直接信任值、间接信任值、挥发因子和剩余能量来计算邻居节点的综合信任值,以评估节点的安全指标,并快速地识别和排除发起黑洞攻击、选择性转发攻击、Hello洪泛攻击和槽洞攻击的恶意节点。sink针对难以发现的虫洞攻击,根据多条链路的链路质量、传输距离和跳数计算出最优路径以保证所选路由的安全性和节能性。仿真结果表明,与AODV和TBSRP相比,TSRP选择的最优路由有效地减少了每个节点的负载,降低了网络的延迟和丢包率。 相似文献
5.
面向车载网的基于AODV优化路由协议的研究 总被引:1,自引:0,他引:1
车载网VANETs(Vehicular ad hoc networks)属于新型的通信模型,其可实现车间通信和车与基础设施通信。由于VANETs节点密度动态变化,节点的快速移动、移动模型的局限性等特点,为VANETs的数据传输提出挑战。鉴于此,提出优化的按需距离矢量AODV(Ad Hoc On demand Distance Vector)方案IAODV(Improved AODV)。在城市环境中,AODV在端到端传输时延、数据包丢失率方向性能较差。为此,IAODV采用限定源节点的路由跳数,降低AODV的端到端传输时延,同时为源节点提供备份路由,从而改善数据包丢失率。仿真结果表明,与AODV协议相比,IAODV在端到端传输时延、数据包丢失率得到有效提升。 相似文献
6.
Ad Hoc网络中AODV路由协议的分析与改进 总被引:1,自引:1,他引:0
AODV协议是AdHoc网络中典型的反应式路由协议。该协议仅适用于双向传输信道,路由表仅维护一条到指定目的节点的路由,所以对于AODV协议的改进是必要的。就是针对AdHoc协议应用在某些特定场合做了一定的改进,并通过实验仿真验证了改进后的AODV协议可以提高网络的吞吐量并有效的降低了网络传输时延。 相似文献
7.
在AODV路由协议的路由维护阶段,当节点检测到链路中断时,会采取一种链路修复机制,然而该机制的实施难以避免数据包的丢失和传输时延的增加,针对这个问题本文提出一种对AODV协议的改进方案。该方案通过计算节点间的链路生存期,在AODV协议的路由发现阶段引入优先节点机制,在路由维护阶段引入链路中断避免机制。仿真实验结果表明,改进的AODV路由协议减少了RREQ消息的数量,降低了丢包率,并且缩短了传输时延,特别适用于节点密度较大的车载网络。 相似文献
8.
徐艳玲 《网络安全技术与应用》2014,(10):25-25
当Ad Hoc网络的拓扑发生变化后,传统的AODV(Ad Hoc Ondemand Distance Vector,按需距离矢量)路由协议需要以较大的开销并花费较多的时间才能重新找到一条路由.为了改善传统AODV协议的性能,本文提出了一种改进的AODV(Improved Ad Hoc Ondemand Distance Vector,简称IAODV)路由协议.性能仿真表明,本文所提的IAODV协议能够有效地减少路由开销,提升路由效率. 相似文献
9.
在无线传感器网络中,基于地理位置的路由协议面临着选择性转发攻击的威胁,针对GPSR(Greedy Perimeter Stateless Routing)和GEAR(Geographicaland Energy Aware Routing)协议存在的问题,设计了一种用于验证节点的方案,将节点的实际地理位置信息与接收信号强度指示信息相比较,用以验证节点的可靠性,仿真实验表明,有效避免了sinkhole攻击(槽洞攻击)和wormhole攻击(虫洞攻击),进一步提高了网络的安全性. 相似文献
10.
11.
Shahram Jamali 《New Review of Information Networking》2016,21(2):79-100
MANETs are mobile networks that are spontaneously deployed over a geographically limited area without requiring any pre-existing infrastructure. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANET is vulnerable to a specific routing misbehavior, called wormhole attack. In a wormhole attack, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer hop count. If the source node follows this fake route, malicious nodes have the option of delivering the packets or dropping them. This article aims at removing these attacks. For this purpose, it investigates the use of an Artificial Immune System (AIS) to defend against wormhole attack. The proposed approach learns rapidly how to detect and bypass the wormhole nodes without affecting the overall performance of the network. The proposed approach is evaluated in comparison with other existing solutions in terms of dropped packet count, packet loss ratio, throughput, packet delivery ratio, and end-to-end delay. A simulation result shows that the proposed approach offers better performance than other schemes defending against the wormhole attack. 相似文献
12.
无线传感器网络中的虫洞攻击防护机制 总被引:2,自引:0,他引:2
虫洞攻击能够随意制造“热点”区域以加速消耗特定区域能量,对依赖连接的无线传感器网络来说影响最大:直接导致获得的数据混乱,结果远远偏离实际情况。现有的措施虽然有一定的抵御作用,但是它们仍然存在很多不足。针对这种情况,提出了基于信誉认证的虫洞攻击抵御机制,利用了自反馈的信誉认证机制,不需要任何额外硬件。仿真实验结果表明,基于信誉认证的虫洞抵御机制能够有效地抵御无线传感器网络中各种类型的虫洞攻击。 相似文献
13.
APS(Ad Hoc Position System)中的DV-Hop算法因其良好的精度及与测距误差无关等特点而使之为一个优秀的算法。但其安全性比较差,容易受到攻击。虫洞攻击是一种容易实现且破坏性大的攻击。DV-Hop算法依靠距离矢量交换估计距离,容易受到虫洞攻击的影响。提出在DV-Hop算法中增加检测虫洞攻击及抵抗该攻击的方法,并通过Algosensim仿真软件进行模拟。通过实验表明,修改后的DV-Hop算法对于虫洞攻击有较好的抵抗性。 相似文献
14.
15.
16.
滕萍 《网络安全技术与应用》2011,(3):8-10
随着信息技术的发展,无线网络已经成为现代通信系统的一个重要组成部分.Ad Hoc无线网络就是其中的一种.虫洞攻击是一种针对移动Ad Hoc网络路由协议的高级攻击形式,极难防御.本文提出了一种较为简便的网络拓扑分析算法检测虫洞攻击,并基于该算法提出了OLSR路由协议安全改进机制. 相似文献
17.
节点定位技术是无线传感器网络的支撑技术之一,节点位置信息是很多基于无线传感器网络的应用的基础.无线传感器网络是一个动态的网络,每隔一段时间需要进行重新定位,并且在重定位过程中易受到攻击节点攻击.针对无线传感器网络中无需测距的定位技术,分析虫洞攻击对DV-Hop定位的影响,提出了一种基于信誉模型的抵御虫洞攻击的分布式轻量级DV-Hop安全定位算法TMDV-Hop(Trust-Model-based DV-Hop Localization Against Wormhole Attack).仿真表明,在无需额外硬件辅助下,TMDV-Hop算法能有效降低虫洞攻击对定位过程的影响,验证了该算法的有效性. 相似文献
18.
Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism. 相似文献
19.
Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread on a geographically limited region, without requiring any preexisting infrastructure. Mostly, nodes are both self-governed and self-organized without requiring a central monitoring. Because of their distributed characteristic, MANETs are vulnerable to a particular routing misbehavior, called wormhole attack. In wormhole attack, one attacker node tunnels packet from its position to the other attacker nodes. Such wormhole attack results in a fake route with fewer hop count. If source node selects this fictitious route, attacker nodes have the options of delivering the packets or dropping them. For this reason, this paper proposes an improvement over AODV routing protocol to design a wormhole-immune routing protocol. The proposed protocol called defending against wormhole attack (DAWA) employs fuzzy logic system and artificial immune system to defend against wormhole attacks. DAWA is evaluated through extensive simulations in the NS-2 environment. The results show that DAWA outperforms other existing solutions in terms of false negative ratio, false positive ratio, detection ratio, packet delivery ratio, packets loss ratio and packets drop ratio. 相似文献