首页 | 本学科首页   官方微博 | 高级检索  
     

Ad Hoc网络中的虫洞攻击与检测方法研究
引用本文:王羽,张琨,刘健,陈旋.Ad Hoc网络中的虫洞攻击与检测方法研究[J].计算机时代,2014(2):20-24.
作者姓名:王羽  张琨  刘健  陈旋
作者单位:南京理工大学计算机科学与工程学院,江苏南京210094
基金项目:江苏省“六大人才高峰”项目(11-C-028);国家自然科学基金(61003210)
摘    要:虫洞攻击是一种针对移动自组织网络路由协议的攻击,一般是至少由两个节点进行合谋的协同攻击。攻击节点之间通过虫洞攻击能够大量吸引数据包,从而达到控制网络的目的。基于按需距离矢量路由协议,根据移动自组织网络中的虫洞攻击原理,采用NS2仿真平台,通过对按需距离矢量路由协议的修改,对虫洞攻击进行了仿真,并且分析了虫洞攻击对网络性能参数的影响。根据虫洞攻击特性,设计了三种攻击检测方法:地理位置定位、邻居信任检测以及邻居监听。将这三种方法在NS2中仿真,验证了其可行性。

关 键 词:移动自组织网络  按需距离矢量路由协议  NS  虫洞攻击

Research of wormhole attacks in Ad Hoc networks and the detection method
Wang Yu,Zhang Kun,Liu Jian,Chen Xuan.Research of wormhole attacks in Ad Hoc networks and the detection method[J].Computer Era,2014(2):20-24.
Authors:Wang Yu  Zhang Kun  Liu Jian  Chen Xuan
Affiliation:(School of Computer Science and Technology, Nanjing University of Science and Technology, Nayjing, Jiangsu 120094, China)
Abstract:The wormhole attack is one of attacks against the mobile ad hoc network routing protocol and is a coordinated attack by two nodes. The attacked nodes can attract a large number of data packets through the wormhole attack, so as to achieve the purpose of controlling the network. Based on the on-demand distance vector routing protocol and the principle of wormhole attack in the network, the wormhole attacks are simulated by using the NS2 simulation platform and modifying the on-demand distance vector routing protocol. The impact of wormhole attacks on network performance parameters are analyzed. According to the features of wormhole attacks, three kinds of attacking detection methods are designed: geographic location detection, neighbor trust detection and neighbor monitoring detection. Finally, three methods are simulated in the NS2, and its feasibility is verified.
Keywords:Ad Hoe  AODV  NS2 simulation  wormhole attack
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号