首页 | 本学科首页   官方微博 | 高级检索  
     

Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
引用本文:季晓君 田畅 张毓森. Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)[J]. 上海交通大学学报(英文版), 2006, 11(2): 188-191,196
作者姓名:季晓君 田畅 张毓森
作者单位:[1]Inst. of Command Automation, PLA Univ. of Science & Technology, Nanjing 210007, China [2]Inst. of Communication Eng. , PLA Univ. of Science & Technology, Nanjing 210007, China
摘    要:Introduction Mobileadhocnetwork(MANET)isaself-organizing,multi-hopwirelessnetwork.Commu-nicationsinadhocnetworkdonotrequireexis-tenceofacentralbasestationorafixednetwork infrastructure.Self-organizingandinfrastruc-turelessnessmakeadhocnetworkeasytobeap-pliedtothoseemergencyenvironmentswherethere isnotbasestationsoraccesspoints.However,on theotherhand,theyalsoopenthenetworktovari-oussecurityattacks.Amongthoseattacksthat havebeendiscoveredsofarinMANET,worm-hole[1]isoneofthemostseriousattack…

关 键 词:虫眼腐蚀 通信网络 网络安全 恢复方法
文章编号:1007-1172(2006)02-0188-04
收稿时间:2005-10-10

Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
JI Xiao-jun,TIAN Chang,ZHANG Yu-sen. Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)[J]. Journal of Shanghai Jiaotong university, 2006, 11(2): 188-191,196
Authors:JI Xiao-jun  TIAN Chang  ZHANG Yu-sen
Abstract:Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.
Keywords:mobile ad hoc network (MANET)  security  wormhole attack  recovery
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号