文档库 最新最全的文档下载
当前位置:文档库 › 移动Ad+hoc网络的黑洞攻击研究

移动Ad+hoc网络的黑洞攻击研究

移动Ad hoc网络的黑洞攻击研究

作者:彭志楠, 叶丹霞, 范明钰

作者单位:电子科技大学,计算机科学与工程学院,成都,610054

刊名:

计算机应用研究

英文刊名:APPLICATION RESEARCH OF COMPUTERS

年,卷(期):2009,26(11)

被引用次数:1次

参考文献(18条)

1.IMAD A;HUBAUX J P;KNIGHTLY E W Denial of service resilience in Ad hoc networks 2004

2.AL-SHURMAN M;YOO S-M;PARK S Black hole attack in mobile Ad hoc networks 2003

3.YI S;NALDURG P;KRAVETS R A security-aware routing protocol for wireless Ad hoc networks 2002

4.HU Yin-chun;JOHNSON D B;PERRIG A SEAD:secure efficient distance vector routing for mobile wireless Ad hoc networks 2002

5.PAPADIMITRATOS P;HAAS Z J Secure routing for mobile Ad hoc networks 2002

6.DENG Hong-mei;LI Wei;AGRAWAL D P Routing security in wireless Ad hoc networks 2002(10)

7.ZAPATA M G Secure Ad hoc on demand distance vector(SAODV) routing 2002(03)

8.LI Huai-zhi;CHEN Zhen-liu;QIN Xiang-yang Secure routing in wired networks and wireless Ad hoc networks 2002

9.CAPKUNY S;BUTTYAN L;HUBAUX J P Self-organized publickey management for mobile Ad hoc networks

10.BUCHEGGER S;Le BOUDEC J Performance analysis of the CONFIDANT protocol cooperation of

nodes:fairness in dynamic Ad-hoc networks 2002

11.RAMASWAMY;HU Hui-rong;SREEKANTA-RADHYA M Prevention of cooperative black hole attack in wireless Ad hoc networks 2003

12.BASILE C;KALBARCZYK Z;IYER R K Inner-circle consistency for wireless Ad hoc networks 2007(01)

13.PATCHA A;MISHRA A Collaborative security architecture for black hole attack prevention in moible Ad hoc networks 2003

14.SUN Bo;GUAN Yong;CHEN Jian Detecting black hole attack in mobile Ad hoc networks 2003

15.AWERBUCH B;HOLMER D;NITA-ROTARU C An on-demand secure routing protocol resilient to Byzantine failures 2002

16.LUNDBERG J R Security in Ad hoc networks 2000

17.MARTI S;CRULI T;LAI K Mitigating routing misbehavior in mobile Ad hoc networks 2000

18.KARPIJOKI V Security in Ad hoc networks 2002

本文读者也读过(7条)

1.张毅.袁卫东.李亚华.王小非.ZHANG Yi.YUAN Wei-dong.LI Ya-hua.WANG Xiao-fei MANET环境中抵御"黑洞"攻击的路由算法[期刊论文]-计算机工程与应用2007,43(3)

2.蔡继文.易平.周雍恺.田野.柳宁.CAI Ji-wen.YI Ping.ZHOU Yong-kai.TIAN Ye.LIU Ning DSR协议下3种攻击的影响比较与仿真研究[期刊论文]-计算机工程2009,35(21)

3.何菲.赵泽茂.徐瑞.HE Fei.ZHAO Ze-mao.XU Rui无线自组织网络路由协议的漏洞攻击及对策[期刊论文]-杭州电子科技大学学报2009,29(6)

4.杨晖针对AODV黑洞路由攻击的RSA安全策略[学位论文]2008

5.李冰心.朱丽娜.袁卫东.LI Bing-xin.ZHU Lina.YUAN Wei-dong移动自组织网络环境下的威胁建模与仿真研究[期刊论文]-计算机科学2009,36(10)

6.张鹏.孙磊.崔勇.韩秀峰.ZHANG Peng.SUN Lei.CUI Yong.HAN Xiu-feng移动自组网安全技术研究[期刊论文]-计算机科学2009,36(7)

7.陈剑.曾凡平.CHEN Jian.ZENG Fan-ping虫洞攻击检测与防御技术[期刊论文]-计算机工程2008,34(7)

引证文献(2条)

1.沈明玉.刘俊龙移动Ad hoc网络中黑洞问题的研究[期刊论文]-合肥工业大学学报(自然科学版) 2011(1)

2.沈明玉.刘俊龙移动Ad hoc网络中黑洞问题的研究[期刊论文]-合肥工业大学学报(自然科学版) 2011(1)

本文链接:https://www.wendangku.net/doc/0d8155701.html,/Periodical_jsjyyyj200911002.aspx

相关文档
相关文档 最新文档