期刊文献+
共找到975篇文章
< 1 2 49 >
每页显示 20 50 100
Distributed intrusion detection for mobile ad hoc networks 被引量:7
1
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
A quality of service routing protocol based on mobility prediction in mobile ad hoc networks 被引量:5
2
作者 王建新 邓曙光 +1 位作者 陈松乔 陈建二 《Journal of Central South University of Technology》 2003年第1期53-57,共5页
A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the ... A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the protocol as follows. (1) Each node just broadcasts its own information, so the packet is very small and can get to the destination in a very short time. (2) When another path is built for the same QoS requirements, the original path has higher priority. (3) The update messages are reduced by using mobility prediction. (4) Data packets carry the information of link change using piggyback, which is helpful for forecasting the link status more accurately. (5) When source node gets Resource Reserve and reconnect packets at the same time, it selects reconnect packet over Resource Reserve packet. The results of simulation show that the protocol has good network performance with low control overload, and efficiently supports transmitting multimedia with QoS requirements in mobile ad hoc networks. 展开更多
关键词 mobile ad hoc networks PREDICTION QoS ROUTING
在线阅读 下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
3
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc networkmanet).
在线阅读 下载PDF
Link reliability based hybrid routing for tactical mobile ad hoc network 被引量:2
4
作者 Xie Xiaochuan Wei Gang +2 位作者 Wu Keping Wang Gang Jia Shilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期259-267,共9页
Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network... Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network performance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol. 展开更多
关键词 tactical mobile ad hoc networks hybrid routing link reliability edge weight.
在线阅读 下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
5
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
在线阅读 下载PDF
Performance analysis of mobile ad hoc networks under flooding attacks 被引量:1
6
作者 Ping Yi Futai Zou +1 位作者 Yan Zou Zhiyang Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期334-339,共6页
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects o... Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 展开更多
关键词 mobile ad hoc network SECURITY flooding attack.
在线阅读 下载PDF
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
7
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile ad hoc networks threshold secret share certification authority.
在线阅读 下载PDF
Component based ant routing protocols analysis over mobile ad hoc networks 被引量:1
8
作者 曲大鹏 王兴伟 黄敏 《Journal of Central South University》 SCIE EI CAS 2013年第9期2378-2387,共10页
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.... To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized. 展开更多
关键词 routing protocol mobile ad hoc networks ant colony optimization route discovery route maintenance data forwarding
在线阅读 下载PDF
一种均衡流量的Mobile Ad Hoc网络能量路由选择方法 被引量:6
9
作者 余旭涛 毕光国 张在琛 《电子与信息学报》 EI CSCD 北大核心 2004年第12期1965-1971,共7页
由于Ad hoc网络是能量受限网络,因此如何提高Ad hoc网络的能量效率问题非常重要.该文提出了一种新的路由选择度量,该度量把节点链路层的拥塞度与节点当前剩余能量综合在一起考虑,使得网络中能量消耗和网络负荷能更加均匀地分布,提高了... 由于Ad hoc网络是能量受限网络,因此如何提高Ad hoc网络的能量效率问题非常重要.该文提出了一种新的路由选择度量,该度量把节点链路层的拥塞度与节点当前剩余能量综合在一起考虑,使得网络中能量消耗和网络负荷能更加均匀地分布,提高了网络的连通性,增加了网络的吞吐量.仿真结果表明,该度量对于不同规模的网络,其吞吐量均有不同程度的提高. 展开更多
关键词 移动自组织网络 能量 路由 度量 媒体接入控制
在线阅读 下载PDF
Flooding attack and defence in Ad hoc networks 被引量:5
10
作者 Yi Ping Hou Yafei +2 位作者 Zhong Yiping Zhang Shiyong Dai Zhoulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期410-416,共7页
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T... Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently. 展开更多
关键词 computer networks SECURITY mobile ad hoe networks routing protocol denial of service ad hoc flooding attack.
在线阅读 下载PDF
Relay movement control for maintaining connectivity in aeronautical ad hoc networks 被引量:2
11
作者 李杰 孙志强 +2 位作者 师博浩 宫二玲 谢红卫 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第4期850-858,共9页
As a new sort of mobile ad hoc network(MANET), aeronautical ad hoc network(AANET) has fleet-moving airborne nodes(ANs) and suffers from frequent network partitioning due to the rapid-changing topology. In this work, t... As a new sort of mobile ad hoc network(MANET), aeronautical ad hoc network(AANET) has fleet-moving airborne nodes(ANs) and suffers from frequent network partitioning due to the rapid-changing topology. In this work, the additional relay nodes(RNs) is employed to repair the network and maintain connectivity in AANET. As ANs move, RNs need to move as well in order to re-establish the topology as quickly as possible. The network model and problem definition are firstly given, and then an online approach for RNs' movement control is presented to make ANs achieve certain connectivity requirement during run time. By defining the minimum cost feasible moving matrix(MCFM), a fast algorithm is proposed for RNs' movement control problem. Simulations demonstrate that the proposed algorithm outperforms other control approaches in the highly-dynamic environment and is of great potential to be applied in AANET. 展开更多
关键词 aeronautical ad hoc network (AANET) mobile ad hoc networks topology control network connectivity movement control
在线阅读 下载PDF
Virtual reality mobility model for wireless ad hoc networks 被引量:1
12
作者 Yu Ziyue Gong Bo He Xingui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期819-826,共8页
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en... For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols. 展开更多
关键词 wireless ad hoc networks computer simulation network protocols mobility models
在线阅读 下载PDF
Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
13
作者 DiWu ZhishengLiu +1 位作者 YongxinFeng GuangxingWang 《计算机工程与应用》 CSCD 北大核心 2004年第29期122-125,共4页
There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The int... There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network. 展开更多
关键词 入侵检测 移动ad-hoc网络 数据挖掘 网络安全 聚类检测
在线阅读 下载PDF
移动ad hoc网络安全综述 被引量:63
14
作者 易平 蒋嶷川 +1 位作者 张世永 钟亦平 《电子学报》 EI CAS CSCD 北大核心 2005年第5期893-899,共7页
 移动adhoc网络是由移动节点自组织形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁.该文介绍了移动adhoc网络安全研究的最新研究进展.首先从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动adho...  移动adhoc网络是由移动节点自组织形成的网络,由于其动态拓扑、无线通信的特点,容易遭受各种安全威胁.该文介绍了移动adhoc网络安全研究的最新研究进展.首先从传输信道、移动节点、动态拓扑、安全机制、路由协议几方面,分析了移动adhoc网络的安全弱点,然后将移动adhoc网络安全方面的研究分为三个方向:密钥分配与管理、入侵检测、增强合作.对每个方向内一些典型安全方案也进行了分类论述,同时分析了各种方案的优点和缺点,并进行了综合比较.文中阐明了目前协议存在的一些问题并提出了相应的改进方法,最后指出了下一步研究方向. 展开更多
关键词 计算机网络 信息安全 移动 ad hoc 网络 密钥管理 入侵检测 增强合作
在线阅读 下载PDF
一个应用于移动Ad Hoc网络管理的簇生成算法 被引量:19
15
作者 冯永新 王光兴 +1 位作者 刘治国 姜月秋 《软件学报》 EI CSCD 北大核心 2003年第1期132-138,共7页
移动Ad hoc网络(mobile Ad hoc network,简称MANET)作为一种新型移动无线通信网,与其他通信网络相比独有的特性增加了网络管理的难度.目前对MANET网络管理的研究处于起步阶段,一些标准尚未制定,而且像存在单向链路和节点的相对移动性这... 移动Ad hoc网络(mobile Ad hoc network,简称MANET)作为一种新型移动无线通信网,与其他通信网络相比独有的特性增加了网络管理的难度.目前对MANET网络管理的研究处于起步阶段,一些标准尚未制定,而且像存在单向链路和节点的相对移动性这类问题也在研究中被忽视.为此,提出了一个利用令牌机制与最小节点标识相结合,适用于层次性管理结构的基于图的MANET簇生成算法,以及对MIB(management information base)的建议性改进.算法充分考虑了网络存在的单向链路和节点的相对移动性,提高了网络管理的灵活性和可扩展性,为MANET的网络管理提出了一种新方法. 展开更多
关键词 移动adhoc网络 簇生成算法 网络管理 移动通信网 无线网络接口
在线阅读 下载PDF
按需式ad hoc移动网络路由协议的研究进展 被引量:39
16
作者 臧婉瑜 于勐 +1 位作者 谢立 孙钟秀 《计算机学报》 EI CSCD 北大核心 2002年第10期1009-1017,共9页
Ad hoc移动网络是一种完全由移动主机构成的网络 .网络拓扑易变 ,带宽、能源有限是 ad hoc移动网络的主要特点 .针对这些特点 ,目前设计的 ad hoc路由协议大多采用按需查找方式 .该文介绍了这方面研究的最新进展 ,对几种典型的按需路由... Ad hoc移动网络是一种完全由移动主机构成的网络 .网络拓扑易变 ,带宽、能源有限是 ad hoc移动网络的主要特点 .针对这些特点 ,目前设计的 ad hoc路由协议大多采用按需查找方式 .该文介绍了这方面研究的最新进展 ,对几种典型的按需路由协议进行了说明、分析和综合比较 .文中分析了目前协议存在的一些问题并提出了相应的改进方法 .最后指出了下一步研究方向 . 展开更多
关键词 按需式ad hoc移动网络 路由协议 移动通信 预先路由 网络拓扑结构
在线阅读 下载PDF
基于节点空闲度的自适应移动Ad Hoc网络路由协议 被引量:23
17
作者 郭嘉丰 张信明 +1 位作者 谢飞 陈国良 《软件学报》 EI CSCD 北大核心 2005年第5期960-969,共10页
节点可以自由、自主地进入网络拓扑并且无须基础网络设施的特性,使得移动Ad hoc网络被广泛应用于诸如灾难救援、战场等多种环境中.传统的Ad hoc路由协议主要是基于“最短路径”来考虑,会在网络中形成局部的“热点区域”而影响网络的性能... 节点可以自由、自主地进入网络拓扑并且无须基础网络设施的特性,使得移动Ad hoc网络被广泛应用于诸如灾难救援、战场等多种环境中.传统的Ad hoc路由协议主要是基于“最短路径”来考虑,会在网络中形成局部的“热点区域”而影响网络的性能.对此,提出了一个新的参数“节点空闲度(leisure degree)”,用来体现节点当前的传输状态.基于这个参数,联合了介质访问控制(medium access control,简称MAC)层和网络层来进行跨层设计,提出了一种新的基于“节点空闲度”的自适应路由协议LDAR(leisure degree adaptive routing),采用启发式的路由选择机制,有效地实现了拥塞控制和负载分担,提高了移动Ad hoc网络的性能.通过模拟实验,结果显示了LDAR协议在静态网络和动态网络的环境下,都有比DSR协议更好的性能. 展开更多
关键词 跨层设计 启发式 自适应 路由协议 移动ad hoc网络
在线阅读 下载PDF
移动AdHoc网络路由协议性能仿真研究 被引量:14
18
作者 张勖 程胜 +1 位作者 冯美玉 丁炜 《计算机工程》 EI CAS CSCD 北大核心 2005年第5期60-62,84,共4页
移动adhoc网络路由协议主要分为表驱动和按需驱动两大类。不同于以往对某一协议的性能仿真,通过在通用环境中对两类典型协议(adhoc按需距离向量协议、动态源路由协议和无线路由协议)的性能进行横向间的比较和分析,得出了各类协议在不同... 移动adhoc网络路由协议主要分为表驱动和按需驱动两大类。不同于以往对某一协议的性能仿真,通过在通用环境中对两类典型协议(adhoc按需距离向量协议、动态源路由协议和无线路由协议)的性能进行横向间的比较和分析,得出了各类协议在不同规模的移动adhoc网络中的适用性定量结果及彼此间差别。 展开更多
关键词 移动ad hoc网络 路由协议 性能分析
在线阅读 下载PDF
移动adhoc网络中DOS攻击及其防御机制 被引量:15
19
作者 易平 钟亦平 张世永 《计算机研究与发展》 EI CSCD 北大核心 2005年第4期697-704,共8页
移动adhoc网络由于其动态拓扑、无线信道以及各种资源有限的特点,特别容易遭受拒绝服务(DOS)攻击.提出了移动adhoc网络中一种新的DOS攻击模型———adhocflooding攻击及其防御策略.该攻击主要针对移动adhoc网络中的按需路由协议,如AODV,... 移动adhoc网络由于其动态拓扑、无线信道以及各种资源有限的特点,特别容易遭受拒绝服务(DOS)攻击.提出了移动adhoc网络中一种新的DOS攻击模型———adhocflooding攻击及其防御策略.该攻击主要针对移动adhoc网络中的按需路由协议,如AODV,DSR等.adhocflooding攻击是通过在网络中泛洪发送超量路由查询报文及数据报文,大量地占用网络通信及节点资源,以至于阻塞节点正常的通信.分析adhocflooding攻击之后,提出了两种防御策略:其一是邻居阻止,即当入侵者发送大量路由查询报文时,邻居节点降低对其报文的处理优先级,直至不再接收其报文.其二是路径删除,即目标节点将入侵者发送攻击报文的路径删除,以阻止其继续发送攻击报文.模拟实验证实,通过这两种方法的结合,能够有效地阻止网络中的adhocflooding攻击行为. 展开更多
关键词 移动ad hoc网络 路由协议 网络安全 拒绝服务 ad hoc flooding攻击
在线阅读 下载PDF
移动Ad hoc网络路由协议安全研究 被引量:6
20
作者 易平 蒋嶷川 +1 位作者 钟亦平 张世永 《计算机科学》 CSCD 北大核心 2005年第6期37-40,64,共5页
移动ad hoc网络是一种完全由移动主机构成的网络,其主要特点为网络拓扑易变,带宽、能源有限。这些特点使得适应于固定网络的安全策略在移动ad hoc网络上不能很好地发挥作用,需要设计一些针对其特点的解决方案.该文介绍了针对移动ad hoc... 移动ad hoc网络是一种完全由移动主机构成的网络,其主要特点为网络拓扑易变,带宽、能源有限。这些特点使得适应于固定网络的安全策略在移动ad hoc网络上不能很好地发挥作用,需要设计一些针对其特点的解决方案.该文介绍了针对移动ad hoc网络路由协议安全方面的最新研究进展,首先介绍了移动ad hoc网络的安全弱点和攻击类型,其后时一些典型方案进行了说明,分析了各种方案的优点和缺点,并进行了综合比较。文中分析了目前协议存在的一些问题并提出了相应的改进方法,最后指出了下一步研究方向。 展开更多
关键词 hoc网络 移动ad 安全研究 路由协议 移动ad 网络拓扑 主要特点 安全策略 固定网络 解决方案 研究进展 协议安全 网络路由 攻击类型 综合比较 改进方法 研究方向 主机构 带宽
在线阅读 下载PDF
上一页 1 2 49 下一页 到第
使用帮助 返回顶部