节点文献

移动ad hoc网络的安全研究

Research on Security in Mobile Ad Hoc Networks

【作者】 朱晓妍

【导师】 王育民;

【作者基本信息】 西安电子科技大学 , 通信与信息系统, 2004, 硕士

【摘要】 移动ad hoc网络是由一组无线移动节点组成的集合,这些移动节点可以在没有任何网络基础设施和集中化管理的情况下互相通信。移动ad hoc网络是一个有实际应用价值的研究领域。但是,由于其自身的开放媒质、动态拓扑、分布式协作和受限能力等特点,移动ad hoc网络极其容易受到攻击。对其安全性的研究还处于起步阶段。 本论文讨论了移动ad hoc网络的基本概念、特点、安全需求及安全威胁;分析了当前在移动ad hoc网络安全方面的研究现状;然后就移动ad hoc网络的密钥管理、路由安全和入侵检测等方面做了具体的研究。 本论文所做的主要工作如下: 1.给出了一种分布式认证的具体实现方法,并阐述了其私钥分量产生、发现和清除Byzantine节点、私钥分量动态刷新的具体过程。该方法将网络的安全风险分散化,能在一定程度上解决安全的密钥管理及认证的问题,其安全性依赖于RSA体制的安全性。 2.针对移动ad hoc网络AODV协议中所存在的黑洞攻击,提出了一种增强安全性的解决方案,该方案能在一定程度上解决黑洞问题并可防止假冒目的节点攻击。 3.给出了一种为移动ad hoc网络设计的新的入侵检测和响应结构。该模型是分布式的,比较适用于ad hoc网络。

【Abstract】 A mobile ad hoc network(MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. MANET is an emerging research area with practical applications. However, wireless MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Research on security in MANET is still in its infancy.This paper introduces the foundational conception, features, security requirements and security threats of mobile ad hoc networks; provides a state-of-the-art view of security in ad hoc networks; then discusses in detail the security aspects of key management, routing, intrusion detection.The main contributions of this paper include:1. A material realization method for distributed authentication is given, and the process of the generation of private key shares, detection and elimination Byzantine nodes and dynamically refreshing the private key shares. The method may decentralize the security threats and solve some key management and secure authentication problems to some extent.2. A security enhancement scheme is proposed to encounter the black hole attacks in AODV protocol. This scheme may solve the black hole problem and prevent personating the destination node to some degree.3. A new intrusion detection and response architecture for mobile ad hoc networks is presented. This model is distributed and relatively applicable to ad hoc networks.

  • 【分类号】TN929.5
  • 【被引频次】4
  • 【下载频次】514
节点文献中: 

本文链接的文献网络图示:

本文的引文网络