首页 | 本学科首页   官方微博 | 高级检索  
     

一种无线Ad Hoc网络动态混淆匿名算法
引用本文:吴振强, 马建峰. 一种无线Ad Hoc网络动态混淆匿名算法[J]. 计算机研究与发展, 2007, 44(4): 560-566.
作者姓名:吴振强  马建峰
作者单位:1(西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071) 2(陕西师范大学计算机科学学院 西安 710062) (zqiangwu@snnu.edu.cn)
摘    要:无线Ad Hoc网络的特殊性决定了它要受到多种网络攻击的威胁,现有的加密和鉴别机制无法解决流量分析攻击.在比较了抗流量分析的匿名技术基础上,提出混淆技术可以满足无线Ad Hoc网络的匿名需求,但现有的混淆算法在Ad Hoc网络下却存在安全与效率的问题.提出了一种动态混淆的RM(pseudo-random mix)算法,该算法主要对混淆器的管理部分进行重新设计. RM算法根据混淆缓冲区的情况进行决策,当缓冲区未满时采用时延转发方式,缓冲区满后采用随机数转发方式,这样既保证了无线Ad Hoc节点的匿名性,同时又解决了停等算法的丢包现象.对RM算法的安全性和效率进行了分析,仿真结果与理论分析相一致,表明RM算法在无线Ad Hoc网络下具有较好的自适应性和实用价值.

关 键 词:动态匿名  伪随机混淆算法  Ad Hoc网络  流量分析  缓冲管理器
修稿时间:2006-07-17

A Dynamic Mix Anonymity Algorithm for Wireless Ad Hoc Networks
Wu Zhenqiang, Ma Jianfeng. A Dynamic Mix Anonymity Algorithm for Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2007, 44(4): 560-566.
Authors:Wu Zhenqiang  Ma Jianfeng
Affiliation:1(Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071) 2(College of Computer Science, Shaanxi Normal University, Xi'an 710062)
Abstract:A wireless ad hoc network is subject to various security attacks.The encryption and authentication methods protect communication partners from disclosure of their secret messages but cannot prevent traffic analysis.It is argued that the mix method is better for wireless ad hoc networks after exploring the approaches to preventing traffic analysis through hiding the source and destination of packets,however,the security and efficiency are mission-critical and challenging to the present mix algorithm for ad hoc networks.In this paper,a pseudo-random mix(RM)-based anonymity algorithm is presented for ad hoc networks by redesigning the buffer manager.The RM algorithm delays a message by time stamps when the mix buffer is not full,otherwise it forwards a message by a random number.The RM algorithm not only guarantees the anonymity of an anonymous communication system,but also solves the problem of discarding packet in the stop and go algorithm.The analysis shows that the RM algorithm has desirable security property and it can evidently improve the efficiency of an anonymous system.The simulation shows that the RM algorithm is better than those known algorithms in adaptability and utility for wireless ad hoc networks.
Keywords:dynamic anonymity  pseudo-random mix algorithm  ad hoc network  traffic analysis  buffer manager
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机研究与发展》浏览原始摘要信息
点击此处可从《计算机研究与发展》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号