[1]郭华娟[],曹晓梅][],朱杰[]. 基于信誉推荐的Ad Hoc网络虫洞防御方案[J].计算机技术与发展,2016,26(08):83-87.
 GUO Hua-juan[],CAO Xiao-mei[][],ZHU Jie[]. A Wormhole Defense Method for Ad Hoc Network Based on Credibility Recommendation[J].,2016,26(08):83-87.
点击复制

 基于信誉推荐的Ad Hoc网络虫洞防御方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年08期
页码:
83-87
栏目:
安全与防范
出版日期:
2016-08-10

文章信息/Info

Title:
 A Wormhole Defense Method for Ad Hoc Network Based on Credibility Recommendation
文章编号:
1673-629X(2016)08-0083-05
作者:
 郭华娟[1] 曹晓梅1][2]朱杰[1]
 1.南京邮电大学 计算机与软件学院;2.江苏省无线传感网高技术研究重点实验室
Author(s):
 GUO Hua-juan[1]CAO Xiao-mei[1][2]ZHU Jie[1]
关键词:
 Ad Hoc网络虫洞攻击信誉聚类算法推荐值
Keywords:
 Ad Hoc networkwormhole attacktrustaggregating algorithmrecommended value
分类号:
TP31
文献标志码:
A
摘要:
 虫洞攻击是一种针对Ad Hoc网络路由协议的典型恶意攻击。两个恶意节点进行合谋协同攻击,从而吸引大量数据包达到控制网络和紊乱路由机制的目的。为了解决这一问题,提出信誉推荐算法—CRPFA ( Credibility Recommended Path Flow Algorithm),主要以三个步骤实现虫洞的防御,包括信誉计算、节点聚类、节点推荐,构建了新虫洞防御方法。该算法既不需要额外的硬件设备,也不需要定位恶意节点具体位置,且有效地克服了节点的自私性、欺骗性,保证了数据包的安全传输。仿真结果表明,该算法在传输距离、节点密度得到保证的情况下,能够高效地防止恶意节点参加路由选择,保证了数据包的有效传递。与CERep机制的仿真结果进行对比,结果进一步验证了该方法的可行性和有效性。
Abstract:
 The wormhole attack is a typical malicious attacks against Ad Hoc routing protocols. Two malicious nodes are conspiring to co-ordinated attack,attracting a large number of data packets to achieve the objective of controlling network and disordering routing mecha-nism. In order to solve this problem,a CRPFA ( Credibility Recommended Path Flow Algorithm) is proposed which mainly divides into three steps to achieve the defense of the wormhole,including credit calculation,node aggregation and recommendation,construction of the new wormhole defense. This algorithm does not need additional hardware devices,also not need to locate malicious node location,and ef-fectively overcomes the selfish and deceptive node,ensuring the safety of data packet transmission. The simulation results show that on the condition of guaranteeing in the transmission distance and the density of nodes,the algorithm proposed can efficiently prevent malicious nodes to participate in the routing and ensure effective transmission of the data packets. Compared with the CERep mechanism,the results show that the feasibility and validity of the method is further verified.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(08):47.

更新日期/Last Update: 2016-09-29