用户名: 密码: 验证码:
无线网络攻击建模与检测关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线网络接入媒质的开放性带来很多安全方面的问题。对无线网络的安全问题研究主要集中在物理层、MAC层和网络层,内容包括:攻击方法的定义,攻击模型的建立,检测及防御措施等方面。如果能够对各种攻击建立准确的数学分析模型,以定量的方式对无线网络在受到各种攻击时的网络性能进行分析,无疑对网络对抗的研究是非常有益的。虽然有一些文献根据对抗手段建立了分析模型,但模型的准确性和实用性都不够。
     本论文的主要研究内容是建立无线网络在受到攻击时的分析模型和检测模型,试图从概率的角度分析无线网络在各种攻击下的性能变化,通过对网络外部可观测量的变换,提取表征网络受到攻击时的特征参量,建立对攻击行为的检测模型,估计攻击参数,这将对无线网络安全及应对措施的研究起到技术支撑作用。此外还对安全路由协议的攻击方法以及恶意节点隔离方法进行了研究。本论文的主要工作和创新点如下:
     (1)研究了随机干扰对无线网络性能的影响,以及对其进行检测的机制。(ⅰ)建立了存在干扰机时的IEEE802.11DCF无线网络二维马尔可夫性能分析模型;(ⅱ)给出了一个全新的无线网络干扰检测模型,通过测量无线网络信道连续空闲时隙数,估计出当前网络节点的数据包发送概率,并推测网络在没有受到干扰时理论上的成功发送概率,与实际测量结果比较来实现对干扰的检测;(ⅲ)通过NS2网络模拟对网络分析模型和干扰检测模型进行验证。
     (2)研究了智能干扰对无线网络性能的影响,以及对干扰进行检测的机制。(ⅰ)建立了基于MAC协议信息的智能干扰信道状态模式转换模型;(ⅱ)提出了基于对无线网络信道状态转换模式进行统计的方法来检测智能干扰的检测模型,并对智能干扰概率进行估计;(ⅲ)通过NS2网络模拟进行验证。
     (3)研究了采用回退窗口缩小的自私行为攻击,(ⅰ)对存在回退窗口缩小行为自私节点的无线网络建立了马尔可夫分析模型,得到自私节点和正常节点的数据包发送冲突概率,并利用模型得到的冲突概率计算自私节点在相邻两次成功发送之间的回退次数概率分布;(ⅱ)提出了回退次数主要分布在小于所选定的回退窗口值的范围内,因此对自私行为的检测通过在对回退次数小于标准规定的0-32之间的单个节点的分布与平均分布进行累积差值比较,超过门限即可判决自私节点的存在;(ⅲ)根据节点在相邻成功发送之间经历的回退次数概率密度函数的阶跃性,提出了对自私回退窗口参数估计方法;(ⅳ)通过NS2网络模拟对分析模型和检测模型进行验证。
     (4)研究了NAV扩展自私行为和DIFS缩小自私行为。(ⅰ)为NAV扩展自私行为建立了性能分析模型;(ⅱ)分析了自私节点因采用DIFS缩小行为而获得的回退次数减少的量化结果;(ⅲ)提出了通过统计网络中节点在信道开始空闲后不同时刻开始发送的概率,进行NAV扩展自私行为检测,并对NAV扩展参数进行估计;(ⅳ)给出了DIFS缩小行为的检测方法和参数估计方法;当网络节点选择回退值为0时,从网络信道空闲开始到信道占用之间的时间间隔就是该节点选择的DIFS时间,根据该值与标准规定是否偏离来检测DIFS缩小自私行为的存在,并估计所选择的缩小参数;(ⅴ)用NS2网络模拟的方法进行了验证。
     (5)提出了一种针对安全路由协议SAODV的抢先重放攻击方法;通过将受恶意节点影响的节点状态设置为非活动状态,来逐步实现对恶意节点隔离;证明了最多通过五次路由建立过程就能够对恶意节点完全隔离;处于非活动状态的节点不能够作为中继节点进行数据转发,但能够作为源节点或目的节点进行网络通信。
The opening character of wireless access medium lead many security issues. Research of wireless security focus on physical layer, MAC layer and network layer, and some of key points include:the definition of attack method, establishment of attack model, detection and defense mechanisms against attack. It's instructive to the research if we can establish an accurate model about various attack and quantitative analysis the performance of network. Although some analysis model have been proposed, the veracity and practicability of these models are not perfect.
     The purpose of the thesis is to establish theoretic model and analysis attack effects in the view of probability about wireless network under random jamming, intelligent jamming and selfish behavior. Character parameters that depict attack behavior can be extracted through transformation of measured parameter, and detecting model can be established, and this work will plays important role to support the research of countermeasures of wireless attack. Methods to achieve rushing attack of SAODV and to separate malicious node are proposed.Contributions and innovations of the thesis as below:
     (1) Effects of random jamming on performance of wireless network and jamming detection methods are considered.(i) A MARKOV model with a jammer in the IEEE802.11DCF wireless network is established;(ii) a novel jamming detection model is proposed, of which through measure idle slots of wireless channel, packet sending probability of wireless node can be estimated, and the theoretic successful transmission probability that without jammer can be computed, and compare with the measured probability, the jammer can be detected;(iii) validation of the model is performed through NS2network simulator.
     (2) Effects of intelligent jamming on performance of wireless network and jamming detection methods are considered.(i) A state transition model of wireless channel under intelligent jamming is established;(ii) detection method based on channel state transition is proposed, and the probability of jamming can be estimated;(iii) validation of the model is performed through NS2network simulator.
     (3) Selfish behavior based on backoff window reduction is considered,(i) A MARKOV model on wireless network with backoff reduction selfish node is proposed, collision probabilities of selfish and normal node are computed, by which the probability of backoff slots between two successful transmission of the same node is obtained;(ii) The probability of backoff slots is mainly lies no more than backoff window, so compare the distribution of specific node to the average of network nodes that lies between0-32, the selfish behavior node can be detected,(iii) Based on the character that the curve of probability density of backoff slots appears steep, a method to estimate selfish parameter is proposed;(iv) validation is performed through NS2simulator.
     (4) Selfish behaviors base on NAV extension and DIFS reduction are considered.(i) A performance analytic model on NAV extension behavior is established;(ii) Quantification result of backoff value advantage by DIFS reduction is analyzed;(iii) A NAV extension selfish behavior detection method is proposed, which by compute the probability of different time slots that from the channel become idle state to transmit state, and the NAV extension parameter is estimated;(iv) A detection method on DIFS reduction and a parameter estimation method are proposed; when the backoff value equals zero, the interval from channel idle to channel busy is the DIFS time, so selfish behavior can be detected by checking the interval;(v) validation on the analytic model, detection model and parameter estimation are performed through NS2simulation.
     (5) A rushing replay attack on security routing protocol SAODV is proposed; The malicious node can be separated through set the affected node to inactive state; it is proved that the malicious node can be completely separated no more than five round; nodes that lies in the coverage of malicious node become inactive state, which cannot relay data, but can send data as a source node or receive data as a destination node.
引文
[1]任伟.“无线网络安全”.电子工业出版社,2011年9月.
    [2]Kaveh Pahlavan & Prashant Krishnamurthy著,刘剑,安晓波,李春生等译.无线网络通信原理与应用.清华大学出版社,2002.
    [3]郑少仁,王海涛,赵志峰,米志超,黎宁等. "Ad Hoc网络技术”.人民邮电出版社,2005年1月第一版
    [4]Giuseppe Bianchi. "Performance analysis of the IEEE 802.11 distributed coordination function". IEEE Journal on Selected Areas in Communications, Vol. 18, No.3.pages 535-547, March 2000.
    [5]M. Mondin;F. Mesiti;M. Laddomada;F. Daneshgaran."Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects". IEEE Transactions on Wireless Communications, Vol.7, No. 4.pagesl276-1286,April 2008.
    [6]Yu-seung Kim,Heejo Lee. "On Classifying and Evaluating the effect of Jamming Attacks", in Proc. ICOIN 2010.
    [7]Kemal Bicakci,Bulent Tavli. " Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks". Computer standards & Interfaces, pages 931-941,2009.
    [8]Qijun Gu,Peng Liu, Chao-Hsien Chu.'Tactical Bandwidth Exhaution in Ad Hoc Networks". Proceedings of the 2004 IEEE Workshop on Information Assurance and Security United States Military Academy,West Point,NY,10-11 June 2004.
    [9]John Bellardo and Stefan Savage."802.11 Denial-of-Service Attacks:Real Vulnerabilities and Pratical Solutions".Proceedings of USENIX Security Symposium03, August 2003.
    [10]F.Ferreri and M.Bernaschi,L.Valcamonici."Access points vulnerabilities to DOS attacks in 802.11 networks". IEEE Communications Society,WCNC 2004.
    [11]Vikram Gupta,Srikanth Krishnamurthy and Michalis Faloutsos."Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks".Proc. MILCOM, Vol.2.pages1118_1123.2002.
    [12]Shahriar Mohammadi, Hossein Jadidoleslamy. "A Commarison of Link Layer Attacks on Wireless Sensor Networks", Intelnational journal on applications of graph theory in wirelesss Ad Hoc networks and sensor networks, Vol3. No.1, pages 35-56.March2011.
    [13]T.X.Brown, J.E.James, and A.Sethi. "Jamming and Sensing of Encrypted Wireless Ad Hoc Networks". in MobiHoc06, pages 22-25, Florence, Italy. May 2006.
    [14]Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood."The Feasibility of Lanching and Detecting jamming Attacks in Wireless Networks". MobiHoc'05, pages 46-57,Urbana-Champaign,Illinois,USA May 25-27,2005.
    [15]Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu. "Jamming ACK Attack to Wireless Networks and a Mitigation Approach".IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008.
    [16]Alejandro Proano, Loukas Lazos."Selective Jamming Attacks in Wireless Networks".2010 IEEE International Conference on Communications (ICC),2010.
    [17]Mithun Acharya, David Thuente."Intelligent Jamming Attacks, Counterattacks and (Counter) Attacks in 802.11b Wireless Networks". Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, August 2005.
    [18]Hussain, A.; Saqib, N.A. "Protocol aware shot-noise based radio frequency jamming method in 802.11 networks".2011 Eighth International Conference on Wireless and Optical Communications Networks (WOCN),2011.
    [19]Zhou, Mengchu;Kosinski, John;Su, Wei;Yu, Ming. "A new approach to detect radio jamming attacks in wireless networks".2010 International Conference on Networking, Sensing and Control (ICNSC),2010.
    [20]Pelechrinis, Konstantinos; Koufogiannakis, Christos; Krishnamurthy, Srikanth V. " On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks ".IEEE Transactions on Wireless Communications, VOL.9, No. 10, pages3258-3271,OCTOBER 2010.
    [21]RaviTeja Chinta, Tan F.Wong and John M.Shea."ENERGY-EFFEICIENT JAMMING ATTACK IN IEEE 802.11 MAC". IEEE Military communication conference 2009,IEEE Milcom 2009.
    [22]Mithun Acharya, Tanu Sharma, David Thuente, David Sizemore. "Intelligent Jamming in 802.11b Wireless Networks".OPNETWORK 2004, August 2004.
    [23]Xiaojuan Liao, Dong Hao, Kouich Sakurai. "A Taxonomy of game theoretic approaches against attacks in wireless Ad Hoc networks".SCIS 2011, The 2011 Symposium on Cryptography and Information Security. Kokura,Japan,Jan.25-28,2011.
    [24]Sagduyu, Y.E.; Berry, R.A.; Ephremides, A. "Jamming games in wireless networks with incomplete information".IEEE Communications Magazine, pages112-118,August 2011.
    [25]E.Bayraktaroglu,C.King,X.Liu,G.Noubir,R.Rajaraman,B.Thapa."On the Performance of IEEE 802.11 under Jamming". The 27th Conference on Computer Communications. IEEE INFOCOM 2008.
    [26]Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran."Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks". in Proceedings of IEEE INFOCOM 2007.
    [27]Abderrahim Benslimane, Abdelouahid El Yakoubi and Mohammed Bouhorma."Analysis of Jamming effects on IEEE802.11 Wireless Networks". IEEE International Conference on Communications, Pages 1-5.2011.
    [28]Aschenbruck, N.; Gerhards-Padilla, E.; Martini, P. "Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks".2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), pages213-220.2010.
    [29]Loukas Lazos and Marwan Krunz. " Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks".IEEE Network, pages30-34,January/February 2011.
    [30]Geethapriya Thamilarasu,Sumita Mishra and Ramalingam Sridhar."Improving Reliabilty of Jamming Attack Detection in Ad Hoc Networks".International Journal of Communication Networks and Information Security(IJCNIS) Vol.3 No.1. April 2011.
    [31]Alberto Lopez Toledo, Xiaodong Wang. "Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks".IEEE International Conference on Communications, ICC'08.2008.
    [32]Alberto Lopez Toledo, Xiaodong Wang. "Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks".IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,Vol.3, No.3, pages 347-358.SEPTEMBER 2008.
    [33]Ali Hamieh, Jalel Ben-Othman."Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution".IEEE International Conference on Communications, ICC '09.2009.
    [34]Mi Kyung Han and Lili Qiu. "Greedy Receivers in IEEE802.11 Hotpots:Impacts and Detection". IEEE Transactions on Dependable and Secure Computing, Vol.7, NO.4, pages410-423, October-December 2010
    [35]Anmol Sheth, Christian Doer, Dirk Grunwald, Richard Han, Douglas Sicker."MOJO:A Distributed Physical Layer Anomaly Detection System for 802.11 WLANs". MobiSys'06, Uppsala,Sweden, June 19-22,2006.
    [36]Pelechrinis, K.; Broustis, I.; Krishnamurthy, S. V.; Gkantsidis, C. " A Measurement-Driven Anti-Jamming System for 802.11 Networks".IEEE/ACM Transactions on Networking, Vol.19, No.4, pages 1208-1222,AUGUST 2011.
    [37]Periyanayagi, S.; Sumathy, V.; Kulandaivel, R. "A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based on SI".2011 International Conference on Process Automation, Control and Computing (PACC),2011.
    [38]Xin Liu, Guevara Noubir, Ravi Sundaram, SanTan. "SPREAD:Foiling Smart Jammers using Multi-layer Agility". IEEE INFOCOM, mini-conference,2007.
    [39]W. Xu, K. Ma, W. Trappe, and Y. Zhang."Jamming Sensor Networks:Attacks and Defense Strategies". IEEE Network, May/June 2006.
    [40]V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein. "Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks". IEEE INFOCOM, mini-conference,2007.
    [41]R.Negi and A.Rajeswaran."DoS analysis of reservation based MAC protocols". IEEE International Conference on Communications,ICC'05,2005.
    [42]T.X.Brown, J.E.James, and A.Sethi. "Jamming and Sensing of Encrypted Wireless Ad Hoc Networks". MobiHoc06, Florence, Italy.22-25 May,2006.
    [43]G.Lin and G.Noubir."On Link Layer Denial of Service in Data Wireless LANs".Wireless Communications and Mobile Computing, May 2003.
    [44]W. Xu, W. Trappe, and Y. Zhang."Anti-jamming Timing Channels for Wireless Networks". ACM WiSec 2008.
    [45]W.Xu et al. "Channel Surfing and Spatial Retreats:Defenses Against Wireless Denial of Service". Proc.2004 ACM Wksp. Wireless Security, pages.80-89.2004,
    [46]Lei Guang and Chadi Assi, Abderrahim Benslimane." MAC layer misbehavior in wireless networks:challenges and solutions". IEEE Wireless Communications, pages6-14,Augest 2008.
    [47]Chunfeng Liu,Yantai Shu, Wucheng Yang, Oliver W.W.Yang."Throughput Modeling and Analysis of IEEE 802.11 DCF with Selfish Node".IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008.2008.
    [48]Hollick, M.; Schmitt, J.; Seipl, C.; Steinmetz, R. " On the effect of node misbehavior in Ad Hoc networks".2004 IEEE International Conference on Communications, Vol.6, pages 3759_3763,20-24 June 2004.
    [49]Zhuo Lu, Cliff Wang,Wenye Wang. "On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks".2010 IEEE International Conference on Communications (ICC),2010.
    [50]Tinnirello, Ilenia;Neglia, Giovanni;Giarre, Laura. "Performance Analysis of Selfish Access Strategies on WiFi Infrastructure Networks".IEEE Global Telecommunications Conference,2009. GLOBECOM 2009.
    [51]Cagalj, M.; Ganeriwal, S.; Aad, I.; Hubaux, J.-P. " On selfish behavior in CSMA/CA networks". INFOCOM 2005.24th Proceedings IEEE Annual Joint Conference of the IEEE Computer and Communications Societies. pages2513-2524,13-17 March 2005.
    [52]Mario Cagalj, Saurabh Ganeriwal, Imad Aad. "On Cheating in CSMA/CA Ad Hoc Networks".TechnicalReport IC/2004/27, EPFL-DI-ICA, March 2004.
    [53]Chen, Lin; Leneutre, Jean. "Selfishness, Not Always A Nightmare:Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks".27th International Conference on Distributed Computing Systems,2007. ICDCS '07. 25-27 June 2007.
    [54]Kukielka, J.;Targon, V.;Banchs, A.;Serrano, P. "Detecting selfish configurations in 802.11 WLANs ".IEEE Communications Letters, Vol.14, No.2, pages 142-144,FEBRUARY 2010.
    [55]Jaydip Sen. "An Efiicient Algorithm for Detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks".2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM),2010.
    [56]Khairul Azmi Abu Bakar and James Irvine. "A Scheme for Detecting Selfish Nodes in MANETs using OMNET++".2010 Sixth International Conference on Wireless and Mobile Communications, pages 410-414.2010.
    [57]Maheshwari, Ritesh;Das, Samir R.;Paul, Utpal. "Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring".2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),2010.
    [58]Raya, M.; Aad, I.; Hubaux, J.-P.; El Fawal, A. "DOMINO:Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots". IEEE Transactions on Mobile Computing, Vol5,No.12, Pages1691-1705, December 2006.
    [59]Toledo, A. L.; Wang, X. " A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF". IEEE International Conference on Communications,2007. pages 1564-1569, ICC '07.24-28 June 2007.
    [60]Beyah, R.;Corbett, C.;Venkatarama, A. " A Wired-Side Approach to MAC Misbehavior Detection".2010 IEEE International Conference on Communications (ICC),2010.
    [61]Baras, J. S.;Radosavac, S.;Cardenas, A. A. "Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments ". IEEE/ACM Transactions on Networking,2009, Vol.17, No.2. pages 605-617. APRIL 2009.
    [62]Svetlana Radosavac,John S.Baras, Iordanis Koutsopoulos."A Framework for MAC Protocol Misbehavior Detection in Wireless Networks".WiSE'05,September 2,2005, pages 33-42.Cologne,Germany,2005.
    [63]Toledo, A.L.; Wang, X. "Robust Detection of Selfish Misbehavior in Wireless Networks".IEEE Journal on Selected Areas in Communications, Vol.25, No.6. pagesl 124-1134,August 2007.
    [64]M.Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hyeong-Ah Choi. "Detecting Node Misbehavior in Ad Hoc Networks".Proceedings of ICC 2007, June 2007.
    [65]Y. Rong; S.-K. Lee; H.-A. Choi. "Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis".25th IEEE International Conference on Computer Communications. Proceedings INFOCOM 2006. pages1-13,April2006.
    [66]Kukielka, J.;Targon, V.;Banchs, A.;Serrano, P. "Detecting selfish configurations in 802.11 WLANs ".IEEE Communications Letters, Vol.14, No.2, pages142-144,FEBRURY 2010.
    [67]P. Kyasanur and N. Vaidya."Selfish MAC Layer Misbehavior in Wireless Networks". IEEE Trans. Mobile Computing,Vol5, No.5,pages502-516.Sept. 2005.
    [68]Lei Guang, Chadi Assi, Abderrahim Benslimane. "Modeling and Analysis of Predictable Random Backoff in Selfish Environments".MSWiM'06 Terromolinos,Malaga Spain. October 2-6,2006.
    [69]A. Benslimane;C.M. Assi;Lei Guang. "Enhancing IEEE 802.11 Random Backoff in Selfish Environments".IEEE Transactions on Vehicular Technology, Vol.57, No.3, pages1806-1822.May 2008.
    [70]Lei Guang; Assi, C. "Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks". IEEE International Conference on Wireless and Mobile Computing, Networking and Communications,2006. (WiMob'2006), pages 116-123,June 19-21,2006.
    [71]Hollick, M.; Schmitt, J.; Seipl, C.; Steinmetz, R. "On the effect of node misbehavior in Ad Hoc networks".2004 IEEE International Conference on Communications, Vol.6, pages3759_3763,20-24 June 2004.
    [72]V. Gupta, S. Krishnamurthy, and M. Faloutsous. "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks". Proc. MILCOM,2002.
    [73]Peng Ning, Kun Sun. "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols". Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages: 60-67. June 2003.
    [74]K. Sanzgiri et al. "A Secure Routing Protocol for Ad Hoc Networks". Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP'02), Pages 78-87.IEEE Press,2002.
    [75]M. Guerrero Zapata and N. Asokan. "Securing Ad Hoc Routing Protocols" USA, Proceedings of the 1st ACM workshop on Wireless security, Pages 1-10.ACM Press,2002.
    [76]Hongmei Deng; Wei Li; Agrawal, D.P. "Routing security in wireless Ad Hoc networks". IEEE Communications Magazine, Vol.40,No.10, pages 70-75,2002.
    [77]Yih-Chun, Hu.; Perrig, A. " A survey of secure wireless Ad Hoc routing".IEEE Security and Privacy, Vol.2, No.3, Pages 28-39, May-June,2004.
    [78]Djenouri, D.; Khelladi, L.; Badache, A.N. "A survey of security issues in mobile Ad Hoc and sensor networks". IEEE Communications Surveys & Tutorials, Vol.7,No.4,pages 2-28,Fourth Quarter 2005.
    [79]Manel Guerrero. "Secure Ad Hoc on-demand distance vector(SAODV) routing". INTERNET-DRAFT draft-guerreromanet-saodv-00.txt.August 2001.
    [80]Yih-Chun Hu,A. Perrig, and D.B.Johnson. "Rushing attacks and defense in wireless Ad Hoc network routing protocols". in Wise'03:proceedings of the 2003 ACM workshop on wireless security, pages 30-40.NY:ACM Press,2003.
    [81]Yih-Chun Hu. " Enabling Secure High-Performance Wireless Ad Hoc Networking".Doctor Thesis,Carnegie Mellon University,2003.
    [82]Syverson, P. "A taxonomy of replay attacks ". Proceedings Computer Security Foundations Workshop Ⅶ,1994. pages 187-191,CSFW 7.14-16 June 1994.
    [83]Mohammad Taqi Soleimani, Abdorasoul Ghasemi. "Secure AODV against maliciously packet dropping".2011 The 7th International Conference on Networked Computing (INC), pages 5-10.2011.
    [84]Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen. "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks".2011 IEEE International Conference on Communications (ICC), 2011.
    [85]Singh, Jagpreet;Bansal, Munish;Bala, Anu. "Performance Analysis of MANET under Blackhole Attack".First International Conference on Networks and Communications,2009. NETCOM'09.
    [86]Abdelhaq, M.; Serhan, S.; Alsaqour, R.; Hassan, R. "A local intrusion detection routing security over MANET network".2011 International Conference on Electrical Engineering and Informatics (ICEEI),2011.
    [87]Mishra, A.; Nadkarni, K.; Patcha, A. "Intrusion detection in wireless Ad Hoc networks". IEEE Wireless Communications, pages 48-60,Feb.2004.
    [88]S. Bhargava and D. P. Agrawal."Security Enhancementsin AODV Protocol for Wireless Ad Hoc Networks". VTC2001 Fall, Vol.4, pages 2143-2147,Oct.7-11, 2001.
    [89]Khalil, I.; Bagchi, S.; Nina-Rotaru, C. "DICAS:Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks".First International Conference on Security and Privacy for Emerging Areas in Communications Networks,2005. pages 89-100,SecureComm 2005.05-09 Sept.2005.
    [90]C.E Perkins, E.M. Royer, and S. Das. "Ad Hoc On-demand Distance Vector (AODV)".RFC 3561, July 2003.
    [91]Mattbew S.Gast. "802.11无线网络权威指南(第二版影印版)”.东南大学出版社,2006年4月.
    [92]寇晓蕤,罗军勇,蔡延荣.“网络协议分析”.机械工业出版社,2009.7第一版.
    [93]Michael Gregg,Stephen Watkins, George Mays等著,陈师译.“堆栈攻击-八层网络安全防御”.人民邮电出版社,2008年11月第一版.
    [94]于宏毅.“无线移动自组织网”.人民邮电出版社,2005.
    [95]杨义先、钮心忻.“无线通信安全技术”.北京邮电大学出版社,2005.
    [96]杨义先、钮心忻.“网络安全理论与技术”。人民邮电出版社,2003.
    [97]王育民、刘建伟.“通信网的安全—理论与技术”.西安电子科技大学出版社,1999.
    [98]胡建伟,汤建龙,杨绍全.“网络对抗原理”.西安电子科技大学出版社,2004.
    [99]周希元.“信息网络对抗技术概论”.中国电子学会电子对抗分会计算机网络对抗专业委员会第二届学术研讨会论文集,pages 312-321.2006.
    [100]Randall K.Nichols & Panos C.Lekkas著,姚兰,惠俊红,郑家玲,张鸿燕,刘景伟译.“无线安全—模型、威胁和解决方案”.人民邮电出版社,2004.
    [101]Andrew S.Tanenbaum著,熊贵喜,王小虎译.“计算机网络(第三版)”,清华大学出版社,2001年8月

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700