期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack
1
作者 Rakesh Kumar Jha Idris Z. Bholebawa +1 位作者 Upena D. Dalal A. Vishal Wankhede 《International Journal of Communications, Network and System Sciences》 2012年第6期353-367,共15页
Wireless networks are playing an imperative role in our daily existence;in current scenario, the users want wireless connectivity for all location with all types of service. One of the major challenges for wireless ne... Wireless networks are playing an imperative role in our daily existence;in current scenario, the users want wireless connectivity for all location with all types of service. One of the major challenges for wireless network is security issue. First and foremost task is to detect the security attacks in the network and the second task is to prevent from an authorized attacks. In our view, a lot of researches are going on and somehow we have succeeded in the first case but the second task is very tough due to wireless channel. Our research is based on how to avoid network attack i.e. misbehavior node attack in the WiMAX system. In this paper we have proposed an algorithm for WiMAX network and our algorithm are able to prevent fixed as well as mobile misbehavior node attacks. As we know, misbehavior node misbehaves in the sense that the node does not esteem its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Our proposed work based on the standard time required for communication for valid user with some threshold time for valid delay and some unwanted delay with network conditions. Our approach can control continuous flooding of packets and continuously transmits Constant Bit Rate (CBR) packets by misbehavior node, which introduces noise in the network and upset the performance of the network. In the mean while the valid user communicate in a trouble-free approach. 展开更多
关键词 WIMAX PHY LAYER MAC LAYER NETWORK LAYER WIMAX Architecture QoS (Quality of Service) misbehavior node OPNET MODELER
在线阅读 下载PDF
无线传感器网络中不良节点的判断与定位 被引量:1
2
作者 于宁 万江文 +1 位作者 马万兴 冯仁剑 《高技术通讯》 EI CAS CSCD 北大核心 2009年第3期219-223,共5页
为降低整个无线传感器网络的定位误差,基于图论相关原理和方法,对无线传感器网络中存在的边缘节点和亚孤立节点进行了判断,通过对此类不良节点周围的节点密度、接收锚节点的范围和方向进行分析,给出了不良节点定位误差偏大的理论解释和... 为降低整个无线传感器网络的定位误差,基于图论相关原理和方法,对无线传感器网络中存在的边缘节点和亚孤立节点进行了判断,通过对此类不良节点周围的节点密度、接收锚节点的范围和方向进行分析,给出了不良节点定位误差偏大的理论解释和对其进行修正定位的解决方案,确立了无线传感器网络中边缘节点和亚孤立节点的判断与定位方法。不同场景下定位性能的仿真实验显示,运用这种方法,对规则的网络拓扑,经修正后不良节点的定位精度比修正前一般可以提高17%以上;对不规则的网络拓扑,经修正后的亚孤立节点定位精度比修正前一般可以提高10%以上。 展开更多
关键词 无线传感器网络 定位 图论 不良节点
在线阅读 下载PDF
基于可信机制的WSN节点恶意行为检测方法
3
作者 曾令国 袁利永 王晖 《浙江师范大学学报(自然科学版)》 CAS 2018年第1期39-43,共5页
为了解决无线传感器网络中的网络安全问题,针对无线传感器网络中节点恶意行为,提出了一种基于可信机制的节点恶意行为检测方法."所提方法"考虑到了来自第3方节点的间接信任并将直接信任同间接信任进行整合.整合过程中首先对第... 为了解决无线传感器网络中的网络安全问题,针对无线传感器网络中节点恶意行为,提出了一种基于可信机制的节点恶意行为检测方法."所提方法"考虑到了来自第3方节点的间接信任并将直接信任同间接信任进行整合.整合过程中首先对第3方节点的信任按照一定的方法进行判断,当满足一定条件时按照D-S证据理论进行整合处理.仿真实验结果表明:"所提方法"能使得网络抵制节点恶意行为的健壮性更好,同时也保证网络具备更高的数据包传递有效性. 展开更多
关键词 无线传感器网络 节点恶意行为 可信机制 信任整合
在线阅读 下载PDF
HEAD:A Hybrid Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
4
作者 郭建立 刘宏伟 +1 位作者 董剑 杨孝宗 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第S1期202-207,共6页
Mobile ad hoc networks rely on the cooperation of nodes for routing and forwarding. However, it may not be advantageous for individual nodes to cooperate. In order to make the mobile ad hoc network more robust, we pro... Mobile ad hoc networks rely on the cooperation of nodes for routing and forwarding. However, it may not be advantageous for individual nodes to cooperate. In order to make the mobile ad hoc network more robust, we propose a scheme called HEAD (a hybrid mechanism to enforce node cooperation in mobile ad hoc networks) to make the misbehavior unattractive. HEAD is an improvement to OCEAN (observation-based cooperation enforcement in ad hoc networks). It employs only first hand information and works on the top of DSR (dynamic source routing) protocol. By interacting with the DSR, HEAD can detect the misbehavior nodes in the packet forwarding process and isolate them in the route discovery process. In order to detect the misbehavior nodes quickly, HEAD introduces the warning message. In this paper, we also classify the misbehavior nodes into three types:malicious nodes, misleading nodes, and selfish nodes. They all can be detected by HEAD, and isolated from the network. 展开更多
关键词 ad hoc network COOPERATION misbehavior node
原文传递
A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks 被引量:17
5
作者 Adnan AHMED Kamalrulnizam ABU BAKAR +2 位作者 Muhammad Ibrahim CHANNA Khalid HASEEB Abdul Waheed KHAN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期280-296,共17页
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable apprecia- tion and technological development over the last few years. Despite ease of deployment, tremendous applications ... Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable apprecia- tion and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challeng- ing issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behav- ior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recog- nition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state- of-the-art into two groups namely node-centric trust mod- els and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assign- ments, we evaluate the efficacy of the existing schemes. Fi- nally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation manage- ment. 展开更多
关键词 TRUST REPUTATION wireless sensor network mo-bile ad-hoc networks ROUTING node misbehavior
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部