用户名: 密码: 验证码:
无线Mesh网络安全关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线Mesh网络是一种与传统无线网络完全不同的新型无线网络技术。基于多跳路由、对等网络技术,无线Mesh网络具有大容量、高速率、覆盖范围广以及健壮、稳定等特性,成为非常适合于大面积开放区域的无线区域网络解决方案。无线Mesh网络的出现,代表着无线网络技术的又一大跨越,有着极为广阔的应用前景,近年来得到了学术界和工业界越来越多的关注。
     由于其内在的无线、多跳等性质,无线Mesh网络的安全问题十分突出。而这些安全性问题对于无线Mesh网络的普及应用具有重要的影响,研究无线Mesh网络的安全关键技术具有重要的理论和实践意义。无线Mesh网络从Ad hoc网络分离出来,并承袭了部分无线局域网技术。因此其面临的安全威胁既与上述两种网络技术类似,又存在很大差别,需要重新设计针对无线Mesh网络的安全机制。
     本文以建立一个安全、可靠的无线Mesh网络作为最终目标,深入分析了无线Mesh网络的安全架构及国内外研究现状。在此基础上,对保证无线Mesh网络安全通信的关键技术进行了研究,提出了多个新的观点和解决方案。
     为了保证无线链路及网络的可用性,本文设计了针对无线Mesh网络的自私行为检测机制、链路拥塞检测算法、隐终端/暴露终端检测算法。为了提高无线Mesh网络的安全性本文提出了入侵检测机制和身份认证机制。
     本论文的主要创新成果如下:
     (1)自私行为检测
     针对无线Mesh网络MAC层的单点自私行为和多节点协作自私行为建立了自私行为模型,提出一种针对“聪明”自私节点的检测机制和算法。分析了无线Mesh网络中的多节点协作自私行为的攻击特征,并且提出了相应的检测算法。上述算法可以很好的缓解无线Mesh网络中自私行为尤其是“聪明”节点的攻击行为对网络性能(公平性、吞吐率)造成的影响。
     (2)无线Mesh网络故障检测
     为了保证无线Mesh网络的可用性,需要诊断网络中可能出现的故障。无线Mesh网络由于网络的动态性、无线信道的开放性、网络拓扑以及MAC机制等问题造成链路拥塞、隐藏终端/暴露终端以及外部噪声干扰等故障,网络可用性也因此会受到影响。为此,本文分析并总结了无线Mesh网络中拥塞、隐终端/暴露终端以及噪声干扰三类故障产生的原因,提出了局部的前应分布式检测算法。该算法通过对网络拓扑、节点信噪比以及网络流进行统计分析与计算,得到网络当前状态,检测是否出现上述故障。根据网络拓扑给出了针对隐藏终端/暴露终端的解决算法。该算法在实验平台上得到了验证,是一个轻量级的有效检测算法。
     (3)跨层入侵检测
     当其它安全措施都没有阻止无线Mesh网络中恶意节点的攻击时,需要入侵检测技术检测发现恶意行为。但是无线入侵检测技术由于受限于网络特性,存在误报率较高等问题。本文提出了使用不同网络层数据作为审计数据进行检测的跨层入侵检测框架。在系统中针对不同的入侵行为,使用物理层、MAC层以及网络层的数据进行检测。并且将网络故障的检测结果同时输入的到检测引擎,降低由于网络故障导致的误报。
     (4)安全认证技术
     无线Mesh网络环境下使用IEEE 802.11i协议存在不安全的用户名/密码方式和切换延时过大的问题。无线Mesh网络支持无线终端在网络内部的切换,但是无线Mesh网络过长的认证过程限制了实时性应用。本文提出了基于数字证书的快速认证优化方案和基于预认证/预配置的安全快速切换协议。其中基于数字证书的认证以数字证书为基础,加强了认证的安全性和可靠性。快速认证优化方案通过减少客户端与认证服务器之间的通信次数,使得用户在切换接入点时,能够以较小的延时完成认证,完成接入过程。预认证/预配置机制使得客户端在进行切换之前可以获得相应的认证和网络配置信息,因此在切换过程中可以显著减少切换时间。
     (5)系统设计与实现
     现有针对无线Mesh网络安全领域的很多研究均以软件模拟进行测试,其有效性的验证具有一定的局限性,往往无法反映真实网络环境。为此,本文建立了无线Mesh网络的原型系统。平台中使用的路由器YH-WMR V1.0由我们自行设计制作并具有自主知识产权,可以作为移动客户端接入点与Mesh网络路由器,且具备安全增强功能。在安全无线Mesh路由器中实现了防火墙、MAC地址过滤、入侵检测、故障诊断、认证与授权等安全技术。通过实际测试表明,本文中提出的安全无线Mesh网络关键技术可以为提高无线Mesh网络的安全性和可靠性,进一步推进无线Mesh网络的发展具有重要的参考与指导意义。
Wireless Mesh Networks (WMNs) have emerged as a key technology for next generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. However, many technical issues still exist in this field.
     The emergence of Wireless Mesh Networks facilitates another major leap with a very broad application prospects, and it has get more and more attention from academia and industry in recent years.
     WMNs, however, suffers from security, due to its multi-hop and Wireless transmission character. These security issues have highly impact for the popularization of WMNs. The research of security technologies in Wireless Mesh Networks has important theoretical and practical significance. WMNs originate from the Ad hoc network, and inherit the WLAN technology. Therefore, the security threats it faces are similar with the above two network technologies. There are also significant differences, so security mechanisms of Wireless Mesh Network are needed to be re-designed.
     In this thesis, our object is to construct a safe, reliable Wireless Mesh Network. Based on in-depth analysis of the Wireless Mesh Network security framework and research status, we propose a number of new ideas and solutions on the security of the Wireless Mesh Network.
     In order to ensure the availability of networks, we design a selfish behavior detection mechanism, a link congestion detection algorithm and a hidden terminal/exposed terminal detection algorithm for WMNs. In order to improve the secure level of Wireless Mesh Networks, this thesis presents the intrusion detection mechanisms and authentication mechanisms.
     The main contributions of this thesis are as follows:
     (1) Selfish behavior detection in Wireless Mesh Network We establish of single node and multi-node collaboration selfish behavior model in the MAC layer for Wireless Mesh Networks. The detection mechanisms and algorithms can detect "smart" selfish behavior. We analyze the characteristics of multi-node collaboration selfish behavior in the Wireless Mesh Network, and propose a detection algorithm, based on the cluster. The algorithm can greatly alleviate the impact on network performance (fairness, throughput) of selfish behavior.
     (2) Fault detection in Wireless Mesh Network
     We need to detect network faults to improve the availability of WMNs. There are faults, including link congestion, hidden terminal/exposed terminal, and external noise interference. Faults can be caused by many reasons, including open wireless medium, network topology and MAC mechanisms and so on. Therefore, we analyze and summarize the reason of link congestion, hidden terminal / exposed terminal and the noise. The local distributed detection algorithms are proposed. The network topology, signal to noise ratio, and network flow are used for statistical analysis and calculation to detect the network faults.
     (3) Cross-layer intrusion detection in Wireless Mesh Network
     When the other security measures can’t prevent malicious attacks in the Wireless Mesh Networks, the intrusion detection technology is needed to detect the attacks. However, there are high false positives rate and other issues. In this thesis, the data in different layers are used as the audit to detect in the cross-layer intrusion detection system. In the system, the data from physical layer, MAC layer and network layer is used for different attacks. To reduce false positives rate that is caused due to network faults, we import the results of fault detection in IDS.
     (4) The authentication technology in Wireless Mesh Network
     The mobile clients can roam in Wireless Mesh Networks. But certification process is too long for real-time application in Wireless Mesh Networks. There exists a tradeoff problem of insecurity and excessive handoff delay with IEEE 802.11i protocol using username / password method in Wireless Mesh Network. This thesis presents a digital certificate-based fast optimization authentication solution which is based on pre-certification / pre-configured security fast handoff protocol. Fast authentication optimization solution allows users to handoff between the access points, and ensures clients to access the network with the smaller delay. Pre-Certification / Pre-configuration mechanism allows clients to get the information about network configuration and certification.
     (5) System design and implementation
     To verify the validity of our work in real environment, we build a prototype system of WMNs. Platform uses a router YH-WMR V1.0 which is designed with our own independent intellectual property rights. Intrusion detection system, fault detection, authentication and authority are implemented in the wireless mesh router. The practical test results demonstrate that the proposed security technologies in Wireless Mesh Network can improve the security and reliability.
引文
[1]方旭明.移动Ad hoc网络研究与发展现状[J].数据通信.2003,(4):15-23.
    [2]方旭明.下一代无线因特网技术:无线Mesh网络.北京:人民邮电出版社, 2006.5:11~14,171~177,187~194.
    [3]方旭明,何蓉等.短距离无线移动通信网络.人民邮电出版社,2004:7.
    [4]姜红旗,康凯,林孝康.拓展宽带接入的无线Mesh网技术[J].电信科学, 2005, 1: 24-31.
    [5] T. Fowler. Mesh Networks for Broadband Access. IEEE Review. 2001. 47(1): 17-22.
    [6] K. Tabata, Y. Kishi, S. Konishi, and S. Nomoto. A Study on the Autonomous Network Synchronization Scheme for Mesh Wireless Network. 14th IEEE 2003 International Symposium on Personal,Indoor and Mobile Radio Communications Proceedings,Beijing,China,2003.Piscataway, NJ, USA.IEEE: 829-833.
    [7] K. Rayner. Mesh Wireless Networking. Communications Engineer. 2003. 1(5): 44-47.
    [8]傲丹,方旭明,马忠建.无线网格网关键技术及其应用.电讯技术.2005,45(2): 16—22.
    [9]文凯.走近无线Mesh网络.计算机世界报.2005.06.27.
    [10] Akyildiz I F, Wang X, Wang W. Wireless Mesh networks: a survey[J]. 2005, 47(4): 445-487.
    [11] A. Raniwala, T. Chiueh: Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network. INFOCOM 2005: 2223-2234.
    [12] R, Brunno, M. Conti and E. Gregori.Mesh Networks: Commodity Multi-hop Ad hoc Networks.IEEE communications Magaizine. 2005, 43(3):123—131.
    [13] P. Whitehead. Mesh Networks: A New Architecture for Broadband Wireless Access Systems. Radio and Wireless Conference, Denvor, CO, USA, 2000. Piscataway, IEEE press:43-46.
    [14]曹利.基于802.1x协议的无线网认证技术安全分析和研究.计算机安全.2006.(10):4—12
    [15] Xudong Wang, Azman Osman Lim: IEEE 802.11s wireless mesh networks: Framework and challenges. Ad Hoc Networks 6(6): 970-984 (2008)
    [16] Divya, Sanjeev Kumar: Security Challenges in Multihop Wireless Mesh Networks-A Survey. ISDF 2009: 92-101
    [17] Andre Egners, Ulrike Meyer: Wireless Mesh Network security: State of affairs. LCN 2010: 997-1004
    [18] Fabio Martignon, Stefano Paris, Antonio Capone: Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks. Computer Networks 53(12): 2192-2207 (2009)
    [19] Muhammad Shoaib Siddiqui,, Choong Seon Hong,"Security Issues in Wireless Mesh Networks," mue, pp. 717-722, 2007 International Conference on Multimedia andUbiquitous Engineering (MUE'07), 2007
    [20] Loukas Lazos, Marwan Krunz: Selective jamming/dropping insider attacks in wireless mesh networks. IEEE Network 25(1): 30-34 (2011)
    [21] A. Gerkis and J. Purcell“A Survey of Wireless Mesh Networking Security Technology”and Threats SANS 2006
    [22] Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu: Jamming ACK Attack to Wireless Networks and a Mitigation Approach. GLOBECOM 2008: 4966-4970
    [23] Xiaojiang Du, Hsiao-Hwa Chen, Security in wireless sensor networks [J], IEEE Wireless Communications, Issue Date, Aug. 2008 Volume: 15 Issue:4, On page(s): 60– 66
    [24] Alexander W. Dent: A survey of certificateless encryption schemes and security models. Int. J. Inf. Sec. 7(5): 349-377 (2008)
    [25] Caroline Fontaine, Fabien Galand: A Survey of Homomorphic Encryption for Nonspecialists. EURASIP J. Information Security 2007: (2007)
    [26] Steffen Peter, Dirk Westhoff, Claude Castelluccia: A Survey on the Encryption of Convergecast Traffic with In-Network Processing. IEEE Trans. Dependable Sec. Comput. 7(1): 20-34 (2010)
    [27] RatanGuha,ZeeshanFurqan,Shahabuddin Muhammad . A Multi-agent Approach Toward the Security Analysis of the 802.11 Handshake Protoeol [Al. Proeeedings of 2nd Intemational Symposium on Wireless Pervasive Computing[C].IEEE,2007.413-418.
    [28] RaPhael Frallk. Authentieation in Wireless Mesh Networks[D]. Luxembourg: University of LuXembourg,2006.
    [29] XiaodongLin, RongxingLu,Pin Han Ho, Xuemin (Sherman) Shenand Zhen fu Cao. A Novel Compromise Resilient Authentication System for Wireless Mesh Networks[A]. Proeeedings of IEEE WCNC,07[C]. IEEE,2007.3544-3549.
    [30] Yanchao Zhang, Yuguang Fang. A secure authentication and billing arehitecture for wireless mesh networks[J]. Wireless Network,2007,(13):663-678.
    [31] LakshmiSanthanam, DeePtiNandiraju, Nagesh Nandirajuand DhannaP. Agrawal. Active Cache Based Defense against DoS Attacks in Wireless Mesh Network[A]. Proeeedings of 2nd Iniemational Symposium on Wireless Pervasive Computing[C]. IEEE,2007.419-424.
    [32] Guangsong Li. An Ideniity-Based Security Arehitecture for Wireless Mesh Networks[A]. IFIP Intemational Conferenceon Network and parallel Computing-Whrkshops[C]. IEEE,2007.223-226.
    [33] Yanchao Zhang, YuguangFang·ARSA: An Attack Resilient Security Architecture for Multihop Wireless Mesh Networks[J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,2006,24(10):1916-1928.
    [34] PatriekTague, Radha Poovendran. Modeling adaptive node capture attacks in multihop wireless networks[J], AdHoeNetworks,2007,(5):801-814.
    [35] Ed Wilson Tavares Ferreira, Ruy de Oliveira, Gilberto Arantes Carrijo, Bharat K. Bhargava: Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach. ICDCS Workshops 2009: 451-454
    [36] Xia Wang, Johnny S. Wong, Fred Stanley, Samik Basu: Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. SAINT 2009: 9-15
    [37] Zonghua Zhang, Farid Na?t-Abdesselam, Pin-Han Ho, Xiaodong Lin: RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC 2008: 2621-2626
    [38] D. Butcher, X. Li, Jinhua Guo: Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man, and Cybernetics, Part C 37(6): 1152-1162 (2007)
    [39] G. Padmavathi, D. Shanmugapriya: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks CoRR abs/0909.0576: (2009)
    [40] Lili Qiu, Paramvir Bahl, Ananth Rao, and Lidong Zhou. Troubleshooting Wireless Mesh Networks. In SIGCOMM, 2006.
    [41] Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell: A modular correctness proof of IEEE 802.11i and TLS. ACM Conference on Computer and Communications Security 2005: 2-15
    [42] P. Kyasanur and N. Vaidya.“Selfish MAC layer misbehavior in wireless networks”. IEEE Transactions on Mobile C
    [43] Alberto López Toledo, Xiaodong Wang: Robust Detection of Selfish Misbehavior in Wireless Networks. IEEE Journal on Selected Areas in Communications 25(6): 1124-1134 (2007)
    [44] Sintayehu Dehnie, Stefano Tomasin: Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ. IEEE Transactions on Wireless Communications 9(7): 2328-2337 (2010)
    [45] Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy, "Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks," IEEE Transactions on Mobile Computing, 08 Jun. 2011.
    [46] Jaydip Sen: An Efficient Algorithm for Detection of Selfish Packet DroppingNodes in Wireless Mesh Networks CoRR abs/1104.0991: (2011)
    [47] I. Aad, J. P. Hubaux, and E. W. Knightly. Denial of service resilience in ad hoc networks. In Proceedings of ACM MobiCom, September 2004.
    [48] V. Gupta, S. Krishnamurthy, and M. Faloutsous. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. of MILCOM, 2002.
    [49] P. Kyasanur and N.H. Vaidya,“Detection and Handling of MAC Layer Misbehavior in Wireless Networks,”Proc. 2003 Int'l Conf. Dependable Systems and Networks, pp. 173-182, 2003.
    [50] L. Guang and C. Assi. Mitigating smart selfish MAC misbehavior in Ad hoc networks. In Proc. IEEE WiMob, June 2006.
    [51] Djenouri D, Khelladi L and Badache AN.“A Survey of Security Issues in Mobile Ad hoc and Sensor Networks,”Communications Surveys & Tutorials, IEEE, Vol. 7, No. 4. (2005), pp. 2-28.
    [52] M. Raya, J.-P. Hubaux, and I. Aad,“DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots,”in Proc. MobiSys 2004, Boston, MA, Jun. 2004, pp. 84–97.
    [53] M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux,“On selfish behavior in CSMA/CA networks,”in Proc. IEEE INFOCOM 2005, Miami, FL, Mar. 2005, pp. 2513–1514.
    [54] J. Konorski,“A Game-Theoretic Study of CSMA/CA Under a Backoff Attack”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 6, DECEMBER 2006, pp.1167-1177.
    [55] Svetlana Radosavac, John S. Baras“A Framework for MAC Protocol Misbehavior Detection in Wireless Networks”WiSE’05, page: 33– 42. September 2, 2005, Cologne, Germany.
    [56] Jaydip Sen, Kaustav Goswami: An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks CoRR abs/1011.1793: (2010)
    [57] Jaydip Sen: A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network CoRR abs/1012.2520: (2010)
    [58] Furong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang: Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. ATC 2008: 279-288
    [59] J. Bellardo and S. Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, in Proc. USENIX Security Symp., Washington DC, Aug. 2003, pp. 15–28.
    [60] A. Mishra, K. Nadkarni, and A. Patcha,“Intrusion Detection in Wireless Ad hoc Networks,”IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, February 2004.
    [61] Tao Zhou,Hongwei Sun,Xmguang Tian,et al.Modeling A Self-learning Detection Engine Automatically for IDS.Proceeding of the 2003 IEEE International Conference on Robotics,Intelligent Systems and Signal Processing,Changsha,China,2005.10, 462-66.
    [62] Rupinder Gill, Jason Smith, Andrew Clark: Specification-Based Intrusion Detection in WLANs. ACSAC 2006: 141-152.
    [63] Vivek Sharma: Intrusion detection in infrastructure wireless LANs. Bell Labs Technical Journal 8(4): 115-119 (2004)
    [64] Guanlin Chen, Hui Yao, Zebing Wang. An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition, icfn, pp.168-172, 2010 Second International Conference on Future Networks, 2010
    [65] Y. Zhang, W. Lee, and Y. Huang,“Intrusion Detection Techniques for Mobile Wireless Networks,”ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
    [66] F. R. Yu, H.Tang, F. Wang, V. C.M. Leung, Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks, in the 2009 IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-09), Vancouver, Canada, August 29-31, 2009
    [67] Daxin Tian, Yanheng Liu, Yang Xiang: Large-scale network intrusion detection based on distributed learning algorithm. Int. J. Inf. Sec. 8(1): 25-35 (2009)
    [68] Jaydip Sen: An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks CoRR abs/1101.0241 (2011)
    [69] Komal Sudan, Ashish Mishra, Hamdy Soliman: Using Wireless Sensor Networks and Artificial Neural Networks for Implementing a Border Intrusion Detection System. ICWN 2010:478-482
    [70] Khalil El-Khatib: Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems. IEEE Trans. Parallel Distrib. Syst. (TPDS) 21(8):1143-1149 (2010)
    [71] Alexandros G. Fragkiadakis, Vasilios A. Siris, Nikos Petroulakis: Anomaly-Based Intrusion Detection Algorithms for Wireless Networks. WWIC 2010:192-203
    [72] Guisong Liu, Zhang Yi, Shangming Yang: A hierarchical intrusion detection model based on the PCA neural networks. Neurocomputing 70(7-9): 1561-1568 (2007)
    [73] Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki: A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks CoRR abs/1004.0587: (2010)
    [74] Shaochun,Qingfeng Song, Xiaochun Cheng,et al.A Safe Mobile Agent system for Distributed Intrusion Detection . Proceedings of the Second IEEEInternational Conference on Machine Learning and Cybernetics, Xi’an, 2005.11, 2009~2015.
    [75] Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet: MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches. PAISI 2010: 73-76
    [76] S. Marti, T. J. Giuli, K. Lai, and M. Baker,“Mitigating Routing Misbehavior in Mobile Ad hoc Net-works,”Proceedings of the 6th Annual International Conference onMobile Computing and Networking (MobiCom’00), pp. 255-265, August 2000.
    [77] D. B. Johnson, and D. A.Maltz,“The Dynamic Source Routing Protocol forMobile Ad hoc Networks (Internet-Draft),”Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.
    [78] S. Buchegger and J. Le Boudec,“Performance Analysis of the CONFIDANT Protocol (CooperationOf Nodes - Fairness In Dynamic Ad-hoc NeTworks),”Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc’02), pp. 226-336, June 2002.
    [79] P. Michiardi and R. Molva,“A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms inMobile Ad hoc Networks,”Modeling and Optimization inMobile, Ad hoc andWireless Networks (WiOpt’03), March 2003.
    [80] S. Bansal andM. Baker,“Observation-Based Cooperation Enforcement in Ad hoc Networks,”Research Report cs.NI/0307012, Stanford University, 2003.
    [81] Y. Huang andW. Lee,“A Cooperative Intrusion Detection System for Ad hoc Networks,”Proceedings of the ACM Workshop on Security in Ad hoc and Sensor Networks (SASN’03), pp. 135-147, October 2003.
    [82] G. Thamilarasu, R. Sridhar, CIDS: cross-layer intrusion detection system for mobile ad hoc networks, International Journal of Mobile Network Design and Innovation, Issue: Volume 3, Number 1 / 2009 pp. 10 - 20
    [83] S. Bose; A. Kannan, Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks, ICSCN '08, 182-188.
    [84] M. Shao, S. Zhu, G. Cao, T. La Porta, cross-layer dropping attack in video streaming over ad hoc networks, SecureComm '08, ACM New York, NY, USA.
    [85] O. Leon, J. Hernandez-Serrano, M. Soriano, A new cross-layer attack to TCP in cognitive radio networks, IWCLD’09, 1-5.
    [86] Abderrezak Rachedi and Abderrahim Benslimane“Toward a cross-layer monitoring process for mobile Ad hoc networks”, SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. (2008)
    [87] William S. Hortos, "Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks", Proc. SPIE 6773, 677303 (2007)
    [88] Ambuj Tewari and Utkarsh Srivastava A Distributed Monitoring System forTroubleshooting wireless Networks BTech Reports , 2002.
    [89] Atul Adya Paramvir Bahl, Ranveer Chandra, Lili Qiu Architecture and Techniques for Diagnosing Faults in IEEE 802.11 Infrastructure Networks MobiCom’04, Sept. 26-Oct. 1, 2004, Philadelphia, Pennsylvania, USA.
    [90] Jinran Chen , Shubha Kher , Arun Somani, Distributed fault detection of wireless sensor networks, Proceedings of the 2006 workshop on Dependability issues in wireless Ad hoc networks and sensor networks, September 26-26, 2006, Los Angeles, CA, USA.
    [91] S. Felis, J. Quittek and L. Eggert: Measurement-Based Wireless LAN Troubleshooting, Proc. First Workshop on Wireless Network Measurements (WiNMee 2005), Riva del Garda, Trentino, Italy, April 3, 2005.
    [92] Yu-Chung Cheng, John ellardo, and Peter Benko. Jigsaw:Solving the Puzzle of Enterprise 802.11 Networks. In SIGCOMM,2006.
    [93] Ratul Mahajan, Maya Rodrig, David Wetherall, and John Zahorjan. Analyzing theMAC Level Behavior ofWirelessNetworks in the Wild. In SIGCOMM, 2006.
    [94] Dhruv Gupta, Prasant Mohapatra, Chen-Nee Chuah.“Diagnosing Failures in Wireless Networks using Fault Signatures”, In ICC2010.
    [95] Anmol Sheth, Christian Doerr, Dirk Grunwald, Richard Han, and Dougla Sicker. Mojo: A Distributed Physical Layer Anamoly Detection System for 802.11 WLANs. In MOBISYS, 2006.
    [96] Vivek Shrivastava, Nabeel Ahmed, Shravan Rayanchu Suman Banerjee, Srinivasan Keshav, Konstantina Papagiannaki, Arunesh Mishra. CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path. MobiCom’09, September 20–25, 2009, Beijing, China.
    [97] K. Naidu, D. Panigrahi, and R. Rastogi,“Detecting anomalies using end-to-end path measurements,”in 27th IEEE International Conference on Computer Communications (INFOCOM), April 2008.
    [98] B. Wang, W. Wei, W. Zeng, and K. Pattipati, Fault localization using passive end-to-end measurement and sequential testing for wireless sensor networks, in 6th Annual IEEE Communications Society on Sensor and Ad hoc Communications and Networks (SECON), 2009.
    [99] JonEdney, WilliamA. Arbaugh.无线局域网安全实务——WPA与802.11i.北京:人民邮电出版社, 2006
    [100]韩旭东.802.11i技术点点通.计算机世界, 2004.6
    [101] LAN/MAN standers Committee of the IEEE Computer Society. Std 802.11i. 2004.7
    [102] Chen Cheng, Jiang Ming. Wireless LAN Security and IEEE 802.11i. IEEE Wireless Communications, 2005,12:27-36
    [103] LAN/MAN standers Committee of the IEEE Computer Society. IEEE Std 802.1X-2004: Port-Based Network Access Control. 2004.12
    [104] Akhlaq M, Aslam B, Khan MA, Jafri MN. Comparative analysis of IEEE 802.1X authentication methods. Proceedings of the 11th WSEAS International Conference on Communications, 2007.7
    [105] A. Mishra and W. A. Arbaugh. An initial security analysis of the IEEE 802.1X standard. Technical Report CS-TR-4328, UMIACS-TR-2002-10, University of Maryland, 2002.2
    [106]张利华,杨秀青. Kerberos协议的安全性增强方案.计算机工程与设计, 2009(9)
    [107]唐枫,钟珞.基于Kerberos的移动Ad-hoc网络安全认证方案.计算机工程, 2006(14)
    [108] Feilong TANG, Minyi GUO, Minglu LI, et al. Secure Routing for Wireless Mesh Sensor Networks in Pervasive Environments [J]. International Journal of Intelligent Control and Systems. 2007, 12(4): 293-306.
    [109] Y. Wu, J. Zhu, S. Kong, P. Yi, Experimental Analysis of Secure Authentication Protocols for WLAN-Based Mesh Networks, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
    [110] Q. Zhai, J. Ying, J. Li, P. Yi, N. Liu, Securing Wireless Mesh Network with MSA-Based Proactive Defense Mechanism, WiCOM 2010, 1-4.
    [111] YANG Chao,MA Jianfeng, Yao Zhonghui, et al. A Method for Routing MN in Wireless Mesh Network and the Communication System: China, WO2007048309(A1)[P], 2007.
    [112]王兴建,胡爱群,黄玉划.基于多跳双向认证的802.16 Mesh网络SA管理机制[J].中国工程科学.2006, 8(9): 69-73.
    [113] L. Guang and C. Assi. Modeling and Analysis of Predictable Random Backoff in Selfish Environments, MSWiM’06, October 2–6, 2006, Terromolinos, Malaga Spain, pp.86-90
    [114] http://en.wikipedia.org/wiki/Hidden_node_problem.
    [115] Tung CH, Chen YQ, Chen ZM, Tsai SR. Implementation of security mechanism for adhoc wireless networks based on X.509 and IEEE 802.1X. IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2006(1): 562-563.
    [116]袁素春,王育民,李纲. OpenSSL程序设计.计算机安全, 2005.6
    [117]杨凌凤. FreeRADIUS EAP-TLS的应用.电脑与电信, 2007.11
    [118] Fabian Hugelshofer, Paul Smith, David Hutchison, Nicholas J.P. Race. OpenLIDS: A Lightweight Intrusion Detection System for Wireless Mesh Networks. MobiCom’09, September 20–25, 2009, Beijing, China.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700