共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
针对无线 Mesh 网络中传统单径路由协议的不足,提出一种基于动态源路由协议(DSR)的多路径路由算法(IDSR).该算法通过在路由发现过程引入带宽和最大转发次数等限制条件,保证了多条路由请求信息的获取;通过在节点不相交的多径选择过程中引入多 QoS 路由代价函数,有效地实现多路径的选择;通过提供多 QoS 保障,使算法具有较高的求解效率,避免了单径路由的不稳定等特点.实验结果表明,IDSR 算法在无线 Mesh 网络的路由中具有更好的 QoS 性能. 相似文献
3.
基于AODV协议的自组网络安全机制的研究 总被引:1,自引:1,他引:0
路由协议的安全性是移动自组网络安全中最重要的一环,AODV路由协议因简单和控制开销小而广泛用于自组网络,但其没有任何安全机制保障,为此,本文探讨了AODV路由协议存在的主要安全隐患,对协议进行必要的改进,增加攻击检测功能,并为网络中节点建立信誉机制,二者相互作用共同完成协议安全性保障.利用NS进行仿真,结果表明改进后的算法能够检测到网络中节点的恶意行为并迅速做出反应,实现对网络内部及外部攻击的防范. 相似文献
4.
5.
6.
7.
8.
9.
10.
11.
Introducing node mobility into the network also introduces new anonymity threats. This important change of the concept of anonymity has recently attracted attentions in mobile wireless security research. This paper presents identity-free routing and on- demand routing as two design principles of anonymous routing in mobile ad hoc networks. We devise ANODR (ANonymous On-Demand Routing) as the needed anonymous routing scheme that is compliant with the design principles. Our security analysis and simulation study verify the effectiveness and efficiency of ANODR. 相似文献
12.
13.
A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications, thereby obtaining sensitive information of the system, such as the identity of a critical node. In order to thwart such attacks, anonymous routing protocols are developed. For the purposes of security and robustness, an ideal anonymous routing protocol should hide the identities of the nodes in the route, in particular, those of the source and the destination. Multiple routes should be established to increase the difficulty of traffic analysis and to avoid broken paths due to node mobility. Existing schemes either make the unrealistic and undesired assumption that certain topological information about the network is known to the nodes, or cannot achieve all the properties described in the above. In this paper, we propose an anonymous routing protocol with multiple routes called ARMR, which can satisfy all the required properties. In addition, the protocol has the flexibility of creating fake routes to confuse the adversaries, thus increasing the level of anonymity. In terms of communication efficiency, extensive simulation is carried out. Compared with AODV and MASK, our ARMR protocol gives a higher route request success rate under all situations and the delay of our protocol is comparable to the best of these two protocols. 相似文献
14.
AOS: an anonymous overlay system for mobile ad hoc networks 总被引:1,自引:0,他引:1
Providing anonymous communications in mobile ad hoc networks (MANETs) is an effective countermeasure against malicious traffic
analysis. This paper presents AOS, an Anonymous Overlay System for MANETs, which provides provably strong source and destination
anonymity under a rather strong adversary model. AOS differs significantly from previous anonymous communication systems for
MANETs mainly in three aspects. First, AOS is an overlay system independent of the underlying MANET protocol stack. Second,
AOS resolves the conflict between anonymous communications and secure routing in MANETs and enables providing both at the
same time. Last but not least, AOS can satisfy diverse anonymity requirements with different communication and computation
overhead. AOS is the first system of its kind, and its efficacy and efficiency are confirmed by detailed qualitative and quantitative
analysis. 相似文献
15.
16.
A. Naghizadeh S. Berenjian E. Meamari R. Ebrahimi Atani 《International Journal of Communication Systems》2016,29(3):602-619
Many methods are suggested to preserve anonymity of users for peer‐to‐peer (P2P) networks. Most of these methods, by relying on established anonymous solutions on client/server applications, are presented for unstructured P2P networks. However, structured overlays, by using distributed hash tables for their routing, do not resemble traditional paradigms. Therefore, current anonymous methods cannot be implemented for them easily. In this paper, we introduce structural‐based tunneling (SBT) to provide mutual anonymity for circular P2P structures. In this method, we get help from inherited features of network infrastructure to establish a standard way for making tunnels. SBT introduces a flexible design that is able to manage different parts of the tunnels on current infrastructures. For this purpose, we incorporate SBT with Chord to show how such design can be managed for real‐world applications. The results of applied method with simulations show that by managing critical features of SBT, a trade‐off can be made between stronger security and performance of the network. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
17.
Yuh‐Min Tseng Yi‐Hung Huang Hui‐Ju Chang 《International Journal of Communication Systems》2014,27(7):1034-1050
Multireceiver identity (ID) based encryption and ID‐based broadcast encryption allow a sender to use the public identities of multiple receivers to encrypt messages so that only the selected receivers or a privileged set of users can decrypt the messages. It can be used for many practical applications such as digital content distribution, pay‐per‐view and multicast communication. For protecting the privacy of receivers or providing receiver anonymity, several privacy‐preserving (or anonymous) multireceiver ID‐based encryption and ID‐based broadcast encryption schemes were recently proposed, in which receiver anonymity means that nobody (including any selected receiver), except the sender, knows who the other selected receivers are. However, security incompleteness or flaws were found in these schemes. In this paper, we propose a new privacy‐preserving multireceiver ID‐based encryption scheme with provable security. We formally prove that the proposed scheme is semantically secure for confidentiality and receiver anonymity. Compared with the previously proposed anonymous multireceiver ID‐based encryption and ID‐based broadcast encryption schemes, the proposed scheme has better performance and robust security. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
18.
19.
随着无线移动终端的广泛应用,漫游认证、身份保密等问题显得日益突出。该文分析了现有的各种漫游认证协议在匿名性及安全性上存在的问题,指出现有协议都无法同时满足移动终端的完全匿名与访问网络对非法认证请求的过滤,进而针对性地提出了一种新的匿名认证协议。该协议基于椭圆曲线加密和代理签名机制,通过让部分移动终端随机共享代理签名密钥对的方式,实现了完全匿名和非法认证请求过滤。此外,协议运用反向密钥链实现了快速重认证。通过分析比较以及形式化验证工具AVISPA验证表明,新协议实现了完全匿名,对非法认证请求的过滤,双向认证和会话密钥的安全分发,提高了安全性,降低了计算负载,适用于能源受限的移动终端。 相似文献
20.
随着网络通信技术的发展,Tor匿名通信系统在得到广泛应用的同时暴露出匿名性较弱等不安全因素,针对上述问题,基于节点的区域管理策略提出一种多样化的可控匿名通信系统(DC-ACS),DC-ACS中多样化匿名链路建立机制根据用户需求选择相应区域的节点完成匿名通信链路的建立,同时基于行为信任的监控机制实现对用户恶意匿名行为的控制,并且保证了发送者和接收者对匿名链路入口节点和出口节点的匿名性。通过与Tor匿名通信系统的比较,DC-ACS在具有匿名性的同时,具有更高的安全性和抗攻击的能力,解决了Tor匿名通信系统所存在的安全隐患。 相似文献