首页 | 本学科首页   官方微博 | 高级检索  
     

无线影子 网络环境下安全策略研究
引用本文:李力,董建锋,贾磊雷. 无线影子 网络环境下安全策略研究[J]. 信息网络安全, 2011, 0(10): 19-20. DOI: 10.3969/j.issn.1671-1122.2011.10.008
作者姓名:李力  董建锋  贾磊雷
作者单位:1. 总后直属供应保障局自动化站,北京,100071
2. 二炮后勤部,北京,100085
摘    要:无线影子网络作为一种Ad-hoc网络,可以为灾后救援提供应急通信保障。文章分析了影子网络面临的节点攻击、DDoS攻击、窃听与流量分析、数据篡改、重放攻击等风险,提出了影子网络的安全目标,并着重对应用在该网络上的安全认证技术、安全路由技术、入侵检测技术等安全策略进行了分析研究。

关 键 词:影子网络  网络安全  安全策略

The Research on Security Mechanism for Wireless Shadow Networks
LI Li,DONG Jian-feng,JIA Lei-lei. The Research on Security Mechanism for Wireless Shadow Networks[J]. Netinfo Security, 2011, 0(10): 19-20. DOI: 10.3969/j.issn.1671-1122.2011.10.008
Authors:LI Li  DONG Jian-feng  JIA Lei-lei
Affiliation:1.The General Logistics Department Directly Under the Supply Security Bureau Automation Station,Beijing 100071,China;2.Erpao Logistics Department,Beijing 100085,China)
Abstract:Radio shadow network as a Ad-hoc network, can provide disaster relief emergency communication guarantee. This paper analyzes the shadow network facing node attack, DDoS attack, tapping and flow analysis, data modification, replay attack risk, put forward the shadow network security goals, and focus on the application in the network security authentication, routing security, intrusion detection technology and security policy are analyzed.
Keywords:shadow network  network security  security mechanism
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号