[1]刘志远 杨植超.Ad hoc网络及其安全性分析[J].计算机技术与发展,2006,(01):231-233.
 LIU Zhi-yuan,YANG Zhi-chao.Ad hoc Network and Its Securing Analysis[J].,2006,(01):231-233.
点击复制

Ad hoc网络及其安全性分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年01期
页码:
231-233
栏目:
计算机安全
出版日期:
1900-01-01

文章信息/Info

Title:
Ad hoc Network and Its Securing Analysis
文章编号:
1005-3751(2006)01-0231-03
作者:
刘志远12 杨植超1
[1]黄石理工学院计算机学院[2]华中科技大学计算机学院
Author(s):
LIU Zhi-yuan YANG Zhi-chao
[1]School of Computer, Huangshi Institute of Technology[2]College of Computer Sol. & Techn., Huazhong Univ. of Sci. and Techn
关键词:
Adhoc网络安全策略路由协议
Keywords:
Ad hoc networksecurity mechanism routing protocol
分类号:
TP393.08
文献标志码:
A
摘要:
Ad hoc网络是一种特殊的多跳移动无线网络,具有广泛的应用场合。文中介绍了Ad hoc网络的产生、定义、特点和应用,然后在探讨Ad hoc网络的安全需求的基础上,分析了移动Ad hoc网络易于遭受的攻击,并集中讨论了移动Ad hoc网络的路由安全、密钥管理等关键问题。提出了按移动Ad hoc网络的安全需求进行分级,然后分别实现的解决策略
Abstract:
Ad hoc is a special multiple hop mobile wireless network which has broaden application fields. The paper firstly introduces the production, definition, characteristics and applications. Then, study the security goals to be achieved and the threats Ad hoc network faces. And focus primarily on the muting security and key management on Ad hoc network

相似文献/References:

[1]印石林 姚放吾.一种基于Ad hoc网络的拥塞检测方法[J].计算机技术与发展,2010,(06):171.
 YIN Shi-lin,YAO Fang-wu.A Congestion Detecting Method Based on Ad hoc Network[J].,2010,(01):171.
[2]姚放吾 任娟娟.Ad Hoc网络中基于信任机制的安全ZRP协议分析[J].计算机技术与发展,2009,(06):160.
 YAO Fang-wu,REN Juan-juan.Analysis of Secure ZRP Protocol Based on Trust Integrated Architecture in Ad Hoc Network[J].,2009,(01):160.
[3]张志平 沈介文 吴小毛[].一种Adhoc方式异构组网支持的终端双模组网模型[J].计算机技术与发展,2009,(07):38.
 ZHANG Zhi-ping,SHEN Jie-wen,WU Xiao-mao.An Ad hoc Dual Mode Networking Model Supported by Heterogeneous Network[J].,2009,(01):38.
[4]张登银 姬广芹.Ad Hoc网络中基于DSR的节能路由协议研究[J].计算机技术与发展,2009,(08):15.
 ZHANG Deng-yin,JI Guang-qin.Research on DSR- Based Energy Routing Protocols for Ad Hoc Networks[J].,2009,(01):15.
[5]黄骥 周继鹏.GLFR:一种新的基于地理位置信息AdHoc网络路由算法[J].计算机技术与发展,2009,(10):145.
 HUANG ji ZHOU Ji-peng.A Novel Geographic Routing Applied in Ad Hoc Networks[J].,2009,(01):145.
[6]孙丽艳.基于激励机制的认知无线电自私行为研究[J].计算机技术与发展,2009,(10):170.
 SUN Li-yan.Study of Cognitive Radio' Selfish Behavior Based on Two- Stage Incentives Mechanism[J].,2009,(01):170.
[7]王建强 吴辰文 李晓军.基于NS-2的Adhoc网络QoS仿真与研究[J].计算机技术与发展,2009,(11):183.
 WANG Jian-qiang,WE Chen-wen,LI Xiao-jun.QoS Simulation and Research of Ad hoc Network[J].,2009,(01):183.
[8]李金鹏 吕光宏 王立平 薛强.移动Adhoc网络安全路由协议研究[J].计算机技术与发展,2008,(07):24.
 LI Jin-peng,LUE Guang-hong,WANG Li-ping,et al.Research of Secure Routing Protocols for Mobile Ad hoc Networks[J].,2008,(01):24.
[9]冯雪玲 于炯 马俊 曹宏庆.基于簇结构的移动Ad Hoc网络的认证协议[J].计算机技术与发展,2008,(09):127.
 FENG Xue-ling,YU Jiong,MA Jun,et al.Authentication Protocol in Hierarchical - Cluster - Based Mobile Ad Hoc Networks[J].,2008,(01):127.
[10]陆庆峰 毛羽刚 黎林坡 罗崇亮.嵌入式无线视频监控系统的设计与实现[J].计算机技术与发展,2010,(08):12.
 LU Qing-feng,MAO Yu-gang,LI Lin-po,et al.Wireless Video Surveillance System Embedded Design and Realization[J].,2010,(01):12.
[11]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
 SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(01):175.
[12]邵星 王汝传 徐小龙.一种基于Agent的Ad hoc网络路由算法[J].计算机技术与发展,2010,(04):21.
 SHAO Xing,WANG Ru-chuan,XU Xiao-long.A Kind of Agent- Based Network Routing Algorithm for Ad hoc Networks[J].,2010,(01):21.
[13]常莉 吴蒙 王立.Ad hoc网络中能量有效路由协议的性能研究[J].计算机技术与发展,2010,(04):47.
 CHANG Li,WU Meng,WANG Li.Investigating Performance of Energy Efficient Routing Protocols for Ad- hoc Networks[J].,2010,(01):47.
[14]张登银 吴品.Adhoc网络路由协议性能仿真分析[J].计算机技术与发展,2009,(07):66.
 ZHANG Deng-yin,WU Pin.Simulation and Analysis of Routing Protocols for Ad hoc Network[J].,2009,(01):66.
[15]何晖 于勇 侯迪 齐勇.一种具有移动特征的ad hoc网络电源感知路由协议[J].计算机技术与发展,2009,(08):11.
 HE Hui,YU Yong,HOU Di,et al.A Mobility Based Battery Aware Routing Protocol for ad hoc Networks[J].,2009,(01):11.
[16]张登银 沈邵帅.Ad Hoc网络路由协议仿真分析[J].计算机技术与发展,2009,(08):23.
 ZHANG Deng-yin,SI-IEN Shao-shuai.Simulation Analysis for Routing Protocols in Ad Hoc Network[J].,2009,(01):23.
[17]何昆鹏 李腊元.Ad Hoc网络中按需路由协议的仿真与性能分析[J].计算机技术与发展,2008,(03):81.
 HE Kun-peng,LI La-yulan.Simulation and Performance Analysis of on-Demand Routing Protocol in Ad Hoc Networks[J].,2008,(01):81.
[18]董明忠 杨明华 宗容 黄铭.一种Ad Hoc网络的MAC层分层节量控制机制[J].计算机技术与发展,2007,(08):173.
 DONG Ming-zhong,YANG Ming-hua,ZONG Rong,et al.An MAC Stratified Energy Control Mechanism on Ad Hoc Network[J].,2007,(01):173.
[19]刘卫彪 张修如 朱光辉.一种基于节点位置信息的Ad Hoc网络路由算法[J].计算机技术与发展,2007,(10):158.
 LIU Wei-biao,ZHANG Xiu-ru,ZHU Guang-hui.A Position- Based DSR Algorithm for Ad Hoc Networks[J].,2007,(01):158.
[20]鲍晶.无线Ad Hoc网络技术探讨[J].计算机技术与发展,2006,(07):201.
 BAO Jing.Discussion of Wireless Ad Hoc Network[J].,2006,(01):201.

备注/Memo

备注/Memo:
刘志远(1972-),男。湖北鄂州人.博士研究生,从事公钥密码,网络安全和电子商务安全方面的研究;杨植超,教授
更新日期/Last Update: 1900-01-01