期刊文献+

移动Ad Hoc网络的安全问题和解决方案

Security Issues and Solutions concerning Mobile Ad Hoc Networks
在线阅读 下载PDF
导出
摘要 移动Ad Hoc网络的自身特点,使它比有线网络更容易遭受攻击。文章首先分析了威胁移动Ad Hoc网络安全的典型攻击,主要讨论了移动Ad Hoc网络的安全路由技术和入侵检测技术两种安全技术,对一些典型安全方案进行了论述与比较。 Owing to the nature of the mobile ad hoc network,it is more vulnerable to be attacked than wired network.The paper firstly analyzes the typical attacks threatening the mobile ad hoc network,and then mainly discusses two kinds of security techniques in the mobile ad hoc network,i.e.secure routing techniques and intrusion detection techniques,finally makes a comparison on some typical security solutions.
作者 朱敏
出处 《南通航运职业技术学院学报》 2010年第4期43-46,共4页 Journal of Nantong Vocational & Technical Shipping College
关键词 移动AD HOC网络 安全 入侵检测 安全路由 Mobile Ad Hoc Networks Security Intrusion detection Secure routing
  • 相关文献

参考文献7

  • 1施荣华,李星星.基于移动代理的移动Ad Hoc网络入侵检测系统[J].微计算机信息,2010,26(12):3-5. 被引量:3
  • 2李金鹏,吕光宏,王立平,薛强.移动Ad hoc网络安全路由协议研究[J].计算机技术与发展,2008,18(7):24-28. 被引量:10
  • 3B.Sun,K.Wu,U.Pooch.Alert Aggregation in Mobile Ad Hoc Networks. ACM Wireless security . 2003
  • 4O.Kachirski,R.Guha.Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. Knowledge Media Net,Proc.IEEE Workshop . 2002
  • 5Djenouri D,Khelladi L,Badache AN.A survey of security issues in mobile ad Hoc and sensor networks. Communications Surveys and Tutorials, IEEE . 2005
  • 6Yih-Chun Hu,Adrian Perrig.A survey of secure wireless ad hoc routing. Security and Privacy Magazine, IEEE . 2004
  • 7P. G. Argyroudis,D. O‘Mahony.Secure routing for mobile ad hoc networks. IEEE Communications Surveys & Tutorials . 2005

二级参考文献27

  • 1Mobile Ad-Hoc Networks (MANET) [EB/OL].http://www.ietf.org/ html.charters/manet-charter.html.
  • 2施荣华,颜艳华.移动自组网中的移动敌手防御[A].第九届国际青年计算机科学家会议.2026-2031,2008.
  • 3Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad Hoc Network [J]. Proc. MOBICOM 2000, Boston, ACM press, 2000: 275 -283.
  • 4T. Anantvalee, J. Wu. A Survey on Intrusion Detection in Mobile Ad Hoe Networks [J]. Wireless/Mobile Network Security: Springer 2006, Ch7, 170-196.
  • 5S. Marti. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks [J]. Proc. 6th Annual International Conf. Mobile Comp. and Net, 2000(8): 255-265.
  • 6B.Sun, K.Wu and U.Pooch. Alert Aggregation in Mobile Ad Hoc Networks [J]. ACM Wireless security (WISE.03), San Diego, CA, 2003:69-78.
  • 7O. Kachirski and R. Guha. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks [J]. Knowledge Media Net, Proc. IEEE Workshop, 2002(7): 153-158.
  • 8Farhan A. F., Zulkhairi D., M.T.Hatim. Mobile Agent Intrusion Detection System For Mobile Ad Hoc Networks: A Non-overlapping Zone Approach [J]. Internet, 2008.ICI 2008.4th IEEE/ IFIP International Conference, 2008.9: 1-5.
  • 9IETF Mobile Ad hoe Networks(MANET) Working Group [EB/OL]. 2001 - 03. http://www. ietf. org/html. charters/ manet - charter. html.
  • 10Perkins C E,Bhagwat P. Highly dynamic destination sequenced distance- vector routing (DSDV) for mobile eomputers[ C]// Proceedings of the SIGOOMMp94. [ s. I. ] : [ s. n. ]. 1994: 234 - 244.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部