首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
移动Adhoc网络是由一组自主的无线节点或终端相互合作而形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁。从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动AdHoc网络的安全弱点,然后结合其安全策略和机制,分析了FSR、SRP和AODV3种典型的路由协议的工作原理和优缺点。  相似文献   

2.
基于IP技术实现的AdHoc网络通信,节点移动引起网络拓扑结构的变化,易造成通信的中断和间歇。命名数据网络(NDN,Named Data Network)是正在研究中的下一代互联网络,使用数据名字转发数据而不用关心节点地理位置,网络扩展性强,特别适用于AdHoc网络的应用环境。通过分析NDN网络通信模型,结合AdHoc网络的特点要求,设计基于NDN技术的AdHoc网络,提出制约其应用的数据命名规则、端到端通信和安全保密问题的解决方案。  相似文献   

3.
移动Ad Hoc网络的安全路由协议研究   总被引:2,自引:0,他引:2  
ad hoc网络是一种新型的无线移动网络,因其独特的组网特性,使得安全问题成为其发展的最大束缚。路由协议的安全是自组网安全的一个重要部分。本文首先论述移动AdHoc网络中的安全问题,介绍了多种安全路由的协议和方案,并对其中的三种按需安全路由协议进行了比较,最后提出进一步研究AdHoc网络路由安全应注意的问题。  相似文献   

4.
认知AdHoc网络是一种特殊的无线网络,与传统的无线AdHoc网络不同,它需要考虑主用户与认知用户的接入优先级问题,因此传统的路由技术不适用于认知AdHoc网络。简单介绍了认知AdHoc网络的架构,列举了传统AdHoc无线网络的路由算法并分析它们的缺点。为了适应认知AdHoc网络的特点,基于不同的参数指标,研究人员提出了一系列高效的算法,将重点分析这些路由算法。  相似文献   

5.
Ad Hoc网络技术研究进展   总被引:8,自引:0,他引:8  
AdHoc网络现在是非常有吸引力的研究方向。本文介绍了Ad Hoc网络的定义、特点、体系结构、信道接入协议,最后分析了Ad Hoc网络面临的问题。希望本文能为进行AdHoc网络技术研究的人们提供一定的方便。  相似文献   

6.
针对AdHoc网络中存在的安全问题,利用量子通信绝对安全的特性和细胞自我免疫系统的性质,将二者有机地结合在一起,有效地提高了AdHoc的安全性能。分析结果表明,结合量子密钥分发以及细胞自我免疫技术之后,AdHoc网络仍然具有明显而且优越的自组织性和适应性,更重要的是,安全性能可以得到很大改善。对于未来军事通信中网络安全的发展起到关键作用。  相似文献   

7.
孟晓明 《信息技术》2006,30(4):28-31
介绍了网格计算环境的特点、安全需求及其安全问题研究现状,对网格计算中的安全标准、安全认证、公有与私有资源的安全利用、应用安全、恶意攻击的检测与防范等安全问题进行了分析和讨论,提出了在研究和解决网格计算的安全问题时,一方面可以借鉴传统网络的安全策略和技术并加以改进,另一方面要充分考虑网格计算环境的特殊性,研究和构建“特殊.的安全策略和技术”。  相似文献   

8.
基于蓝牙的Ad Hoc网络形成协议   总被引:2,自引:0,他引:2  
讨论了基于蓝牙的自组织(AdHoc)网络形成协议,即蓝牙设备如何自组织地组建成多跳的AdHoc网络,介绍了基于蓝牙的Adhoc网络中微微网之间的2种基本的通信模型,对基于蓝牙的AdHoc网络形成协议的研究现状进行了概述,并具体描述了4种有代表性的协议,即BTCP、Bluetrees、BlueStars和Scatternet-Route,对它们的特点进行了简单的比较,最后指出了现有协议中存在的一些问题,以及今后可能的研究方向。  相似文献   

9.
冯广友  王海 《电讯技术》2007,47(6):84-89
战术互联网是AdHoc网络技术在军事领域的重要应用,广播是战术互联网中基本的信息发布方式,也是AdHoc网络技术研究的一个重要问题。首先把AdHoc网络广播算法分为邻居决定转发和自身决定转发,然后仿真分析几种典型的广播算法;最后根据战术互联网的特点,结合现有的AdHoc网络广播,提出一种新的战术互联网广播协议(TIBP)。仿真结果表明:TIBP在战术互联网环境下具有较高的效率。  相似文献   

10.
蜂窝网络和AdHoc网络是两种不同结构的网络,前者是有中心的集中式网络结构,而后者是无中心的网络结构。为了有效地提高蜂窝网络的数据传输容量并改善网络覆盖,国外学者提出在蜂窝网络中引入AdHoc中继节点。分析了蜂窝网络和AdHoc网络各自的优缺点,二者融合带来的优势;并介绍了两种蜂窝网中引入AdHoc中继节点的实现方案,最后提出了融合网络中的重点和难点问题,对今后的研究具有一定的启示作用。  相似文献   

11.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

12.
Extending Global IP Connectivity for Ad Hoc Networks   总被引:1,自引:0,他引:1  
Ad hoc networks have thus far been regarded as stand-alone networks without assumed connectivity to wired IP networks and the Internet. With wireless broadband communications and portable devices with appropriate CPU, memory and battery performance, ad hoc connectivity will become more feasible and demand for global connectivity through ad hoc networking is likely to rapidly grow. In this paper we propose an algorithm and describe a developed prototype for connectivity between an ad hoc network running the ad hoc on-demand distance-vector protocol and a wired IP network where mobile IP is used for mobility management. Implementation issues and performance metrics are also discussed.  相似文献   

13.
Security considerations in ad hoc sensor networks   总被引:1,自引:0,他引:1  
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks come to be wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis has been placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that need be solved for achieving security in an ad hoc network. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service, and key management service.  相似文献   

14.
无人机自组网技术研究   总被引:1,自引:0,他引:1  
在无人机系统中,编组和协同作战能力对提高无人机作站效能和生存能力具有重要意义。无线自组网是一种特殊结构的无线通信网络,其通信依靠节点之间的相互协作,以无线多跳方式完成,因此网络不依赖于任何固定设施,具有自组织和自管理的特性,这种特殊的组网方式使得无线自组网非常适用于无人机系统。介绍了无线自组网的原理,分析了无线自组网应用于无人机系统主要面临的关键技术:路由技术和安全问题。介绍了无线自组网的发展情况和在无人机领域的研究情况。  相似文献   

15.
郑军  王杉  付强  李权 《通信技术》2002,(2):76-79
蓝牙技术是利用无线电波把许多物理设备连接起来的一种规范,因为它的开放性与移动性,使得它的安全问题显得尤为重要。讨论了蓝牙安全体制中的几种特殊的安全措施,主要包括:鉴权,加密,密钥管理等,最后,提出了在蓝牙安全规范中存在的问题和可能出现的安全隐患。  相似文献   

16.
Integration of ad hoc networks with the Internet provides global Internet connectivity for ad hoc hosts through the coordination of mobile IP and ad hoc protocols. In a pure ad hoc network, it is difficult to establish trust relationship between two ad hoc hosts due to lack of infrastructure or centralized administration. In this paper, an infrastructure‐supported and distributed authentication protocol is proposed to enhance trust relationships amongst ad hoc hosts. In addition, an effective secure routing protocol (SRP) is discussed to protect the multi‐hop route for Internet and ad hoc communication. In the integrated ad hoc networks with Internet accessibility, the ad hoc routing security deployed with the help of infrastructure has a fundamental impact on ad hoc hosts in term of Internet access, integrity, and authentication. Both analysis and simulation results demonstrate the effectiveness of the proposed security protocol. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

17.
Nikos  Dimitris  Christos   《Ad hoc Networks》2007,5(3):289-298
Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.  相似文献   

18.
Mobile ad hoc networks rely on the co-operation of devices that route for each other. This immediately presents security problems. Each device's data passes through the not so friendly hands of other devices. Forwarding devices must use their processing power and battery power to route packets for others. When bandwidth is limited they must also use bandwidth that they might want to use for themselves. These are not great issues with the first incarnations of ad hoc networks — military systems or others where all the devices are owned by a single organisation. However, if ad hoc networks are to be generally deployed and become an alternative or adjunct to future cellular systems, then ways to encourage co-operation are required. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

19.
A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with a well-established cellular network can improve communication and security in ad hoc networks, as well as enrich the cellular services. This research proposes a cellular-aided mobile ad hoc network (CAMA) architecture, in which a CAMA agent in the cellular network manages the control information, while the data is delivered through the mobile terminals (MTs). The routing and security information is exchanged between MTs and the agent through cellular radio channels. A position-based routing protocol, the multi-selection greedy positioning routing (MSGPR) protocol, is proposed. At times due to the complicated radio environment, the position information is not precise. Even in these cases, the MT can still find its reachable neighbors (the association) by exchanging hello messages. This association is used in complement with the position information to make more accurate routing decisions. Simulation results show that the delivery ratio in the ad hoc network is greatly improved with very low cellular overhead. The security issues in the proposed architecture and the corresponding solutions are addressed. The experimental study shows that CAMA is much less vulnerable than a pure ad hoc network.  相似文献   

20.
Wireless mobile ad hoc networks consist of mobile nodes interconnected by wireless multi‐hop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. The topology of such networks changes dynamically as mobile nodes join or depart the network or radio links between nodes become unusable. Supporting appropriate quality of service for mobile ad hoc networks is a complex and difficult issue because of the dynamic nature of the network topology and generally imprecise network state information, and has become an intensely active area of research in the last few years. This paper
  • 1 This article, except for some minor changes, is essentially the same as one that appears in 103 . The latter is a revised and updated version of 51
  • presents the basic concepts of quality of service support in ad hoc networks for unicast communication, reviews the major areas of current research and results, and addresses some new issues. The principal focus is on routing and security issues associated with quality of service support. The paper concludes with some observations on the open areas for further investigation. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号