期刊文献+

一种基于OLSR路由协议中MPR节点的攻击方案及实现 被引量:1

An Attack Based on MPR Nodes in OLSR Routing Protocol
原文传递
导出
摘要 文中在研究hdHoc无线自组网中OLSR(Optimized Link State Routing Protocol)路由协议的基础上,针对其中关键结构-MPR(multipoint relays)节点的特性,提出了一种通过改变乐意度对其进行攻击的方案。最后,用NS仿真工具对论文中介绍的攻击进行了仿真,论证了攻击方案的可行性。 This paper analyzes the OLSR protocol in the Ad Hoc Network. Based on the research and aiming at the characteristic of the critical structure--MPR (multipoint relays) ,an attack method by changing the N-willingness is proposed. Finally, the procedure of the attack is simulated by usingNS2, and the result indicates that the attack is feasible.
出处 《信息安全与通信保密》 2009年第8期236-239,共4页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(60573141和60773041) 江苏省自然科学基金资助项目(BK2008451) 国家高科技863基金资助项目(2006AA012219、2007AA012404、2007AA012478):2006江苏省软件专项,南京市高科技项目(2007软资106) 现代通信国家重点实验室基金(9140C1105040805) 江苏省博士后基金(0801019C) 南京邮电大学科研项目江苏高校科技创新计划项曰(CX08B-085Z、CX08B-086Z)和江苏省六大高峰人才项目资助.
关键词 AD HOC OLSR MPR 乐意度 Ad hoc OLSR MPR N-willingness
  • 相关文献

参考文献8

  • 1王金龙,等.Ad Hoc无线移动网络[M].北京:国防工业出版社,2004-5.
  • 2Yi P, Dai Z, Zhang S, et al. A New Routing Attack in Mobile Ad Hoc Networks[J]. International Journal of Information Technology, 2005, 11(02): 83-94.
  • 3Zhan Huawei, Zhou Yun. Comparison and analysis AODV and OLSR routing protocols in ad hoc network[C]. China:[s.n.],2008.
  • 4Vilela A J P, Barros J.A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks[C]. Greece:[s.n.], 2006.
  • 5Nait-Abdesselem F, Yoo J K, Bensaou B. Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol[C]. China:[s.n.],March 2007.
  • 6Kannhavong B, Nakayama H, Kato N, et al. A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks[C]. USA:[s.n.], 2006.
  • 7姜庆,李大双.OLSR在广义AD-HOC网络中的扩展应用研究[J].信息安全与通信保密,2007,29(2):149-150. 被引量:4
  • 8吕凛杰,刘岚.Ad hoc无线网络路由协议比较分析[J].信息安全与通信保密,2006,28(4):105-107. 被引量:3

二级参考文献8

  • 1[1]CH IAN GCC,Wu H K,Liu W,et al.Routing in Cluster Multi-hop[A].Mobile Wireless Networks with Fading,Proc.IEEE SICON'97[C].1997:197-211
  • 2[2]Murthy,Garcia-Luna-Aceves.An efficient routing protocol for wireless network[A].ACM/Bltzer Mobile Networks and Applications[C].1996; (2):183-197
  • 3[3]Toh C K.A Novel Distributed Routing Protocol to Support Ad Hoc Mobile Computing[A].Proc.1996 IEEE 15th Annual International Phoenix Conference Computer and Communication[C],1996:480286
  • 4[4]PERK IN S C E,BHA GWA T P.Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computer[A].The ACM SIGCOMM Conf on Communications Architectures[C],London,1994
  • 5[5]JOHNSON DAV ID B,MAL TZ DAV ID A,HU Yihchun.The dynamic source routing protocol for mobile Ad hoc networks (DSR)[S].IETF working group INTERNET-DRAFT 24 February 2003
  • 6[6]MURTHYS,CARCLA Lunn Aceves J J.An efficient routing protocol for wireless network[A].ACM/Baltzer Mobile Networks and Applications (Special Issue on Routing in Mobile Communications Networks)[C],1996' (2):1832197
  • 7[1]Optimized Link State Routing Protocol(OLSR).RFC-3626,2003.
  • 8[2]Hazy Sighted Link State Routing Protocol,BBN Technical Memorandum No.1301,2006.

共引文献7

同被引文献6

  • 1李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 2蒋凌云,王汝传,王峰,蔡小华.DDoS攻击快速在线检测器的设计与实现[J].北京邮电大学学报,2007,30(3):122-125. 被引量:4
  • 3JUELS Ari, BRAINARD John. Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks [C]// Proceedings of the 1999 Network and Distributed System Security Symposium. Reston, VA, USA: [s.n.], 1999: 151-165.
  • 4CHEN Shigang, TANG Yong. Stateful DDoS Attacks and Targeted Filtering[J]. Journal of Network and Computer Applications, 2007(30) : 827-828.
  • 5SUN Xin, TORRES Ruben, RAO Sanjay G. On the Feasibility of Exploiting P2P Systems to Launch DDoS Attacks[J]. Peer-to-Peer Networking and Applications, 2010, 3(1): 36-51.
  • 6孟翀,孙力娟,王汝传,黄海平.IEEE802.11DCF/PCF机制仿真与分析[J].信息安全与通信保密,2009(8):240-242. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部