首页 | 本学科首页   官方微博 | 高级检索  
     检索      

战术移动自组网脆弱性分析与仿真
引用本文:王英,彭钦鹏,谭歆,张平安.战术移动自组网脆弱性分析与仿真[J].重庆邮电大学学报(自然科学版),2021,33(4):595-605.
作者姓名:王英  彭钦鹏  谭歆  张平安
作者单位:重庆邮电大学 计算机科学与技术学院,重庆400065;移动通信技术重庆市重点实验室,重庆400065;移动通信技术重庆市重点实验室,重庆400065
基金项目:重庆市“科技创新领军人才支持计划”(CSTCCXLJRC201710);重庆市基础科学与前沿技术研究项目(cstc2017jcyjBX0005)
摘    要:针对战术移动自组网协议的安全性、脆弱性等问题,分析并仿真出适用于战术移动自组网的攻击方案,增强对敌方战场通信电台的控制能力,造成敌方战场通信指挥系统性能衰减甚至瘫痪.该方案从战术移动自组网的介质访问控制(media access control,MAC)层、内联网层、传输层的协议特征分析,解析战术网络电台在MAC层信道竞争接入、内联网层拓扑更新和传输层传输控制协议(transmission control protocol,TCP)的3次握手机制下存在的协议漏洞,并在NS3网络仿真平台中分层构建不同的攻击模型.该模型在内联网层解决了传统移动自组网中路由黑洞攻击不适用于战术移动自组网的问题,同时在传输层重构了TCP半连接队列机制.对比了攻击前网络性能的变化,仿真结果表明,各层实施的攻击技术都能有效降低战术移动自组网的网络性能,验证了所建攻击模型的合理性.

关 键 词:战术移动自组网  协议分析  安全漏洞  攻击模型
收稿时间:2019/9/2 0:00:00
修稿时间:2021/4/11 0:00:00

Vulnerability analysis and simulation of tactical mobile Ad Hoc networks
WANG Ying,PENG Qinpeng,TAN Xin,ZHANG Pingan.Vulnerability analysis and simulation of tactical mobile Ad Hoc networks[J].Journal of Chongqing University of Posts and Telecommunications,2021,33(4):595-605.
Authors:WANG Ying  PENG Qinpeng  TAN Xin  ZHANG Pingan
Institution:College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China;Chongqing Key Laboratory of Communication Technology, Chongqing 400065, P. R. China
Abstract:Aiming at the security and vulnerability of the tactical mobile Ad Hoc networks protocol, a specific attack scheme is proposed to enhance the control ability of the enemy''s devices, causing the performance degradation or even paralysis of the battlefield communication command system. By analyzing the protocol characteristics of the MAC (media access control) layer, Intranet layer and transmission layer, this scheme analyzes the vulnerabilities of MAC layer channel competition access, Intranet layer routing topology updates and 3-way handshake of TCP protocol in transport layer. Different attack models are built in NS3 (Network Simulator 3). These attack models solve the problem that routing black hole attack in traditional mobile Ad Hoc networks are not applicable in Intranet layer and reconstruct TCP semi-connection queue mechanism in transport layer. The emulation results show that the attack implemented by each layer can effectively reduce the network performance of tactical mobile Ad Hoc networks, and verify the rationality of the attack model.
Keywords:tactical Ad Hoc mobile networks  protocol analysis  security weakness  attack model
本文献已被 万方数据 等数据库收录!
点击此处可从《重庆邮电大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆邮电大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号