首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.  相似文献   

2.
Flooding attack and defence in Ad hoc networks   总被引:1,自引:2,他引:1  
1 .INTRODUCTIONMobile Ad hoc Network is an autonomous system ofmobile nodes connected by wirelesslinks .It has sever-al salient characteristics ,such as Dynamic topologies ,Bandwidth-constrained,variable capacity links , Ener-gy-constrained operation,Li mited physical security[1].Due tothesefeatures ,mobile ad hoc networks are par-ticularly vulnerable to denial of service attackslaunchedthrough compromised node.In this paper , we present a new attack,theAd hoc Flooding Attack, which re…  相似文献   

3.
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.  相似文献   

4.
1 .INTRODUCTIONA mobile ad hoc network ( MANET) is a multi-hopwireless network formed by a collection of mobilenodes without the intervention of fixedinfrastructure.Because an Ad hoc network is infrastructure-less andself-organized,it is used to provide i mpromptu com-munication facilities in harsh environments . Typicalapplication areas of mobile ad hoc networkinclude bat-tlefields ,emergency search,rescue sites and data ac-quisitionin remote areas . A mobile Ad hoc networkisalso usef…  相似文献   

5.
针对工业无线传感器网络中的干扰攻击问题,得出一种基于WirelessHART图路由的被干扰攻击节点路由恢复机制。通过干扰攻击检测方法获取被干扰攻击节点与干扰攻击区域,利用非协调跳频扩频技术生成被干扰攻击节点与周围节点的跳频序列,从而进行传统跳频扩频,对被干扰攻击节点进行再检测,结合路由代价与WirelessHART图路由算法将被干扰攻击节点恢复到网络中。仿真结果表明路由恢复机制能够帮助被干扰攻击节点消除干扰攻击影响,并在保证吞吐量的情况下成功加入到网络中。  相似文献   

6.
1 .INTRODUCTIONMobile ad hoc networks ( MANET) , also calledthe infrastructureless mobile network or self-or-ganized network,consists of a collection of mobilenodes sharing a wireless channel without any cen-tralized control or established communication back-bone .ad hoc networks have no fixed routers ;allnodes are capable of movement and can be connect-ed dynamically in an arbitrary manner . Usually ,these nodes act as both end systems and routers atthe same ti me . Nodes of these netwo…  相似文献   

7.
TDMA体制下的移动自组织网时隙同步方法   总被引:1,自引:0,他引:1  
在TDMA体制下的移动网状自组织网络中,为了解决网络时隙同步问题,提出了一种不依赖GPS授时的网络时隙互同步算法。各节点通过计算相邻节点的时隙偏差,通过加权计算并调整本节点的时隙位置,使网内各节点的时隙起始都调整到同一位置上,达到时隙的互同步。通过仿真和实验,分析并验证了移动自组织网络时隙互同步的收敛性能和抗干扰性能。  相似文献   

8.
1. INTRODUCTION Mobile ad hoc networks are wireless multi-hop networks where mobile nodes are self-organized, have highly dynamic topology, limited bandwidth and no support of fixed infrastructure[1]. These characteristics often cause ad hoc networks to be viewed as quite different from traditional networks. Routing a packet from a source to a destination in an ad hoc network is a challenging problem. The main source of the challenge comes from the fact that there are no base stations in …  相似文献   

9.
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.  相似文献   

10.
为了保证无线传感器网络(wireless sensor network,WSNs)内部节点入侵检测中具有较高的检测率和较低的误检率,提出了一种基于节点信任值的层簇式WSNs入侵检测方案。该方案通过分析WSNs中典型网络攻击特征,定义了节点的多种典型信任属性,并利用马氏距离判断节点信任属性是否异常来获知节点是否存在异常,最后利用贝塔分布理论和异常折扣因子相结合实现节点信任值的计算和更新,从而实现节点入侵检测判断。经仿真,结果表明该方案可实现常见入侵的检测,具有较高的检测率和较低的误检率。  相似文献   

11.
杨盘龙  田畅  于雍 《系统仿真学报》2005,17(7):1538-1542
战术互联网条件下的网络应用环境与民用网络相比,具有其特定的拓扑连接关系、移动方式和流量特征,而上述特点对于路由协议性能评估结果影响较大,针对应用背景结合路由协议评估体系,对自组织网络路由协议性能进行了仿真与评估,并得到如下结论:战术互联网环境下,移动性对路由协议的影响小于网络负载对协议性能的影响;同时,先应式路由协议比反应式路由协议更适合在网络负载较大的战术互联网环境中使用。  相似文献   

12.
为了降低现有ad hoc网络分布式时隙同步算法复杂度,基于研究多个体系统行为特征的Vicsek模型,提出一种采用平均加权的分布式时隙同步算法。各节点通过计算自身及其邻节点时隙起始时刻的算术平均调整时隙位置,最终达到所有节点时隙位置的统一,实现全网同步。对算法在不同网络连接下的收敛性进行逐一分析,并对网络节点随机分布时的算法收敛性进行仿真,结果表明,算法适用于各种连通性网络且收敛速度较快。  相似文献   

13.
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.  相似文献   

14.
付彬  李仁发  肖雄仁 《系统仿真学报》2006,18(3):633-637,648
根据采用蓝牙技术的无线ad hoc网络的特点,提出了一种分布式的环型蓝牙网络拓扑形成协议。协议采用合并的思想,将节点快速姐奴成一个环型网络,且新节点可以随时加入网络.协议具有拓扑形成过程延迟低、控制开销小的特点,控制开销复杂度为O(N),且形成了平均微微网个数少、每节点度数低的蓝牙网络,网络中最多包含‘(N-2)/(k-1)’+1个微微网,至少包含‘N/k’个微微网,节点最大度数为2。基于NS2的仿真实验评估了协议的性能,实验结果验证了协议形成了具较佳性能的环型蓝牙网络。  相似文献   

15.
尹浩  秦泽民  王杉 《系统仿真学报》2007,19(21):5071-5074
移动自组织网络路由协议多是基于双向链路提出,而单向链路在战场环境下普遍存在,严重影响着网络性能。分析了应用于反应式路由协议的几种解决单向链路的技术,提出了黑名单混合反转路径搜索的路由方法,仿真实验表明该策略显著提高了分组递交率,相对于纯粹黑名单和反转路径搜索方法有着明显的优势。  相似文献   

16.
无线传感器网络(wireless sensor networks, WSNs)由大量微小的传感器节点组成,分簇的网络架构能较好地处理大规模网络的自组织问题,因而成为WSNs提升性能和扩展性的标准方法。在拓扑发现、地理路由和目标追踪等应用中,重叠分簇能更好地满足要求,同时,辨别出WSNs的边界节点是重要的任务。与先前的基于节点的边界搜寻算法不同,提出了一种应对节点随机分布情况的自组织分簇算法。建立了重叠分簇,进而对重叠分簇进行分簇的边界融合,最后形成整个WSNs网络边界。仿真结果表明,该算法能够生成更为均衡的分簇,显著提高网络生存周期,并能有效的实现网络边界节点的搜索。  相似文献   

17.
Reliable adaptive multicast protocol in wireless Ad hoc networks   总被引:1,自引:0,他引:1  
1.INTRODUCTIONA wireless ad hoc networkis a multi-hop wireless net-workformed by a collection of mobile nodes withoutthe intervention of fixed infrastructure.Because awireless ad hoc networkis infrastructureless and self-organized,it is used to provide i mpromptu communi-cationfacilities in harsh environments.Typical appli-cation areas of wireless ad hoc networkinclude battle-fields,emergency search,rescue sites and data acqui-sitionin remote areas.A wireless ad-hoc network isalso useful …  相似文献   

18.
广播是移动自组织网络(mobile ad hoc network, MANET)传递信息和建立路由的重要操作。为解决广播过程中的链路冗余和广播风暴问题,提出一种基于贪婪蚁群算法(greedy ant colony algorithm, GACA)的广播策略。首先,结合路由节点的数据包总传输距离、链路数目和链路质量建立目标函数。然后,通过GACA达到目标函数的最小值并规划出最优信息广播路由。最后,转发节点根据路径要求转发信息。仿真实验表明,该策略能够合理地利用网络资源、减少信息冗余以及避免广播风暴的发生。  相似文献   

19.
给出了有效的应用于无线Ad Hoc网络的分布式节能广播算法。在确定转播结点时,该算法让那些拥有较多未覆盖邻结点和较大新增覆盖面积的结点进行转播,选取尽可能少的邻结点为转播结点,以减小广播分组在网络中的重复。所提广播算法的分布式设计解决了其他节能广播算法中存在的开销太大的问题,使其更加适用于无线Ad Hoc网络的特殊环境。通过大量的仿真对广播算法的性能进行分析,结果表明与其他算法相比,所提算法能够大幅降低转播冗余、有效增加网络寿命。  相似文献   

20.
能量有效的无线传感器网络可信路由协议   总被引:1,自引:0,他引:1  
如何更有效地利用节点有限的资源是无线传感器网络研究的热点之一。提出的能量有效的可信路由协议(energy efficient reliable routing protocol, EERRP),采用了一种能量均衡策略,使网络中的能量均衡消耗,将网络生命周期最大化。同时,EERRP引入了信誉评价机制,通过节点在数据传输过程中对其他节点行为的监测以及信誉传播,使数据在通信过程中能够尽可能地避开问题节点到达目的节点,达到可信数据传输的目的。通过在NS仿真平台对EERRP进行测试与验证,并将其与传统路由协议进行比较,证明EERRP在网络能量有效性和数据可信传输方面具有明显优势。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号