期刊文献+

无线自组网的安全问题综述 被引量:6

Survey on security issues in wireless self-organizing network
下载PDF
导出
摘要 无中心、自组织和资源受限等特点给无线自组网的安全性带来了新的问题和挑战。通过介绍无线自组网面临的安全问题特殊之处,给出了无线自组网的安全目标和策略。在此基础上,系统归纳和分析了可用于增强无线自组网安全性的各种措施和机制,介绍一种多重安全防御方案,并展望了今后研究工作的方向。 Wireless self-organizing network(WSON)which is acentric,self-organizing and resource-limited brings new problems and challenges in security.In this paper the special security problems in wireless self-organizing network are introduced.Then security objects and policies of WSON are explained.Based on the above elaboration,various countermeasures and relevant schemes used for enhancing security of wireless self-organizing network are summed up and analyzed in detail.In addition,a multiple security defense scheme is presented.Finally a brief prospect of future works is concluded.
出处 《桂林电子科技大学学报》 2011年第2期87-92,共6页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61072043)
关键词 无线自组网 安全策略 密钥管理 访问控制 入侵容忍 wireless self-organizing network security policies key management access control intrusion tolerance
  • 相关文献

参考文献16

  • 1LIMA M,SANTOS A,PUJOLLE G. A Survey of Survivability in Mobile Ad Hoc Networks[J]. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2009,11(1): 66-77.
  • 2YANG H, LUO H. Security in mobile Ad Hoc networks: challenges and solutions[J]. IEEE Wireless Communications Magazine, 2004,11(1):38-47.
  • 3MAAKI S. Security Fundamentals in Ad Hoe Networking. Proeeedings of the Helsinki University of Technology[M]. Seminar on Internetworking-Ad Hoe Networks, Spring, 2000 : 70-77.
  • 4SMITH B, MURPHY S. Securing distance-vector routing protocols[C]//Proceedings of Network and Distributed System Security. Los Alamitos, CA, 1999 : 85-92.
  • 5XUE Y, NAHRSTEDT K. Providing fault-tolerant ad hoc routing service in adversarial environmentsl[J]. Wireless Personal Communications, 2004,29(3) :367-388.
  • 6RAMANUJAN R, KUDIG S. Techniques for Intrusion Resistant Ad Hoc Routing Algorithms TIARA[M]. CA, USA:DISCEX03, 2003: 98-100.
  • 7PAPADIMITRATOS P, HAAS Z. Secure data transmission in mobile Ad Hoe networks[C]//Proc. 2003 ACM workshop on wireless security. NY, USA,2003: 41-50.
  • 8JOSHI D, NAMUDURI K. Secure, redundant, and fully distributed key management scheme for mobile ad hoe networks: an analysis[J]. Journal of Wireless Communications and Networking, 2005(4) :579-589.
  • 9BOUDRIGA N, OBAIDAT M. Fault and Intrusion Tolerance in Wireless Ad Hoc Networks [M]. Washington USA: WCNC05, 2005: 2281-2286.
  • 10JACOBS S, CORSON M S. MANET authentication architecture[R], draft-jacobs-imep-auth-arch-01, txt, 1999.

二级参考文献56

  • 1刘亚杰,窦文华.基于网络编码的P2P流媒体[J].计算机工程与科学,2006,28(9):33-34. 被引量:10
  • 2马冠骏,许胤龙,林明宏,宣颖.基于网络编码的P2P内容分发性能分析[J].中国科学技术大学学报,2006,36(11):1237-1240. 被引量:14
  • 3R Ahlswede, N Cai, S Y R Li, et al. Network information flow [J]. IEEE Trans on Information Theory, 2000, 46(4) : 1204-1216.
  • 4R K Ahuja, T L Magnanti, J B Orlin. Network Flows: Theory, Algorithms, and Applications [ M]. Englewood Cliffs, NJ: Prentice Hall, 1993.
  • 5J S Park, D S Lun, F Soldo, et al. Performance of network coding in ad hoe networks [C]. The 25th Military Communications Conf (MILCOM 2006), Washington D C, 2006.
  • 6D Wang, Q Zhang, J C Liu. Partial network coding: Theory and application in cominuous sensor data collection [C]. The 14th IEEE Int'l Workshop on Quality of Service (IWQoS 2006), New Haven, CT, USA, 2006.
  • 7M Wang, B C Li. How practical is network coding? [C]. The 14th IEEE Int'l Workshop on Quality of Service (IWQoS 2006), New Haven, CT, 2006.
  • 8A G Dimakis, P B Godfrey, M Wainwright, et al. Network coding for distributed storage systems [C]. The 26th Annual IEEE Conf on Computer Communications (INFOCOM 2007), Anchorage, AK, USA, 2007.
  • 9T Ho, B Leong, R Koetter, et al. Byzantine modification detection in multicast networks using randomized network coding [C]. The 2004 IEEE Int'l Symp on Information Theory (ISIT'04), Chicago, IL, USA, 2004.
  • 10C Fragouli, J-Y L Boudec, J Widmer. Network coding: An instant primer [J]. ACM SIGCOMM Computer Communication Review, 2006, 36(1): 63-68.

共引文献46

同被引文献37

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部