用户名: 密码: 验证码:
移动Ad Hoc网络入侵检测与主动响应机制研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动Ad Hoc网络作为一种新型的移动多跳无线网络,与传统的无线网络有着许多不同的特点。它既不依赖于任何固定的基站也不需要集中的管理,而是通过移动节点间的相互协作、自我组织,来实现网络连接和数据传递。对移动Ad Hoc网络的研究发源于军事领域,如战场上坦克之间和海面上舰艇之间的组网,但是由于其建网方式灵活、配置快捷方便,构造成本较低等优势,使得它逐渐推广于商业和民用环境之中,如会议数据交换、紧急援救、偏远地区等一些需要临时组网的应用环境。
     移动Ad Hoc网络研究领域中有许多需要解决的问题,如:路由协议、节省能量、网络安全等。本文针对移动Ad Hoc网络的安全问题,围绕着移动Ad Hoc网络的安全架构、DOS攻击模型、入侵检测、主动响应等问题进行了深入的研究。其主要内容和创新性结果如下:
     1、将免疫系统的原理引入到移动Ad Hoc网络安全设计之中,提出了一种基于免疫机制的安全架构。移动Ad Hoc网络是自组织、无中心的网络系统,集中控制的安全方案不再适用。本文借鉴人工免疫系统的思想,采用移动agent来模拟实现淋巴细胞的免疫识别和防护功能,设计了一个分布式的安全架构。通过多种功能的agent合作,实现了对整个网络的入侵检测和主动响应。同时该架构还具有学习机制、分布式、自适应等特点。
     2、提出了一种新的DOS攻击模型并设计了防御机制。移动Ad Hoc网络由于其动态拓扑、无线信道以及各种资源有限的特点,特别容易遭受拒绝服务(DOS)攻击。本文提出了移动Ad Hoc网络中一种新的DOS攻击方式—Ad Hoc Flooding攻击。该攻击主要针对移动Ad Hoc网络中的按需路由协议,如AODV、DSR等。Ad Hoc Flooding攻击是通过在网络中泛洪发送超量路由查询报文,大量地占用网络通信及节点资源,以至于阻塞节点正常的通信。在分析Ad Hoc Flooding攻击之后,提出了邻居阻止的防御策略,即当入侵者发送大量路由查询报文时,邻居节点降低对其报文的处理优先级,直至不再接
Mobile Ad Hoc Networks are the collection of wireless computer, communicating among themselves over possible multi-hop paths, without the help of any infrastructure, such as base stations or access points. Nodes in mobile Ad Hoc network collaboratively contribute to routing functionality by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range, hence practically all nodes may act as both hosts and routers. Mobile Ad Hoc networks require no centralized administration or fixed network infrastructure and can be quickly and inexpensively set up as needed. They can thus be used in scenarios where no infrastructure exists, such as military applications, emergent operations, personal electronic device networking, and civilian applications like an ad-hoc meeting or an ad-hoc classroom.With more and more application, security for mobile Ad Hoc networks becomes increasingly important. To secure mobile Ad Hoc networks, my dissertation will explore the security technologies in mobile Ad Hoc networks, including security architecture, DOS attack model, instruction detection, active response. The contributions of this dissertation can be summarized as following:1. Contrary to their wired counterpart, mobile Ad Hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well. We provide scalable, distributed security architecture for mobile Ad Hoc networks in this paper. The architecture integrates the ideas of immune system and a multi-agent architecture. Compared with traditional security system, the proposed security architecture is designed to be distributed, autonomy, adaptable, scalable.2. Mobile Ad Hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile Ad Hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in Ad Hoc networks. The new DOS attack, called Ad Hoc Flooding Attack(AHFA), can result in denial of service when used against on-demand routing protocols for mobile Ad Hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad Hoc Flooding Attack in mobile Ad Hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation
引文
[1] William Stallings, Wireless Communications and Networks, Prentice Hall, 2002
    [2] D. B. Johnson and D. A. Maltz, Protocols for Adaptive Wireless and Mobile Networking, IEEE Personal Communications Magazine, February 1996, pp. 34-41.
    [3] E. Ayanoglu, K. Y. Eng, and M. J. Karol, Wireless ATM: Limits, Challenges, and Proposals, IEEE Personal Communications Magazine, August 1996, pp. 18-34.
    [4] J. Jubin and JD Tornow, The DARPA Packet Radio Network Protocols, in Proceedings of the IEEE, Special Issue on Packet Radio Networks, vol. 75, no.1, January 1987, pp. 21-32.
    [5] S. Corson, J. Macker, Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, January 1999
    [6] David A. Beyer. Accomplishments of the DARPA Survivable Adaptive Networks SUP, AN Program. In Proceedings of the IEEE M1LCOM Conference, 1990.
    [7] Barry M. Leiner, Robert Ruth, and Ambatipudi R. Sastry, Goals and Challenges of the DARPA GloMo Program. IEEE Personal Communications, Vol.3, No.6, 1996, pp.34-43
    [8] The Joint Tactical Radio System, http://jtrs.army.mil/
    [9] http://www.ieee802.org/11/
    [10] MANET working group, http://www.ietf.org/html.charters/manet-charter.html
    [11] Finke, C. R., TPRS Quarterly Report, Texas Packet Radio Society, Feb. 1992
    [12] Z. D. Chen, H. T. Kung, and D.Vlah. Ad Hoc Relay Wireless Networks over Moving Vehicles on Highways. ACM Symposium on MobiHoc, California, USA, Oct 2001.
    [13] George N and Rahim T. On the Relaying capability of Next—Generation GSM Cellular Networks. IEEE Personal Commun Mag, Feb 2001: 40-47.
    [14] B Ljubica, B Levente, C Srdjan, et al. Self-organization in mobile Ad Hoc network: the approach of terminodes. IEEE Communication Magazine, 2001, 39(6): 166-174.
    [15] C. L. Fullmer and J. J. Garcia-Luna-Aceves, Solutions to hidden terminal problems in wireless networks, Proceeding ACM SIGCOM'97, Cannes, France, 1997: 39-49
    [16] B. Lichun and J. J. Garcia-Luna-Aceves, Collision-free topology-dependent channel access scheduling, MILCOM2000, Los Angeles, California, 2000: 507-511
    [17] E. M. Royer, S. J.ee and C. E. Perkins. The Elects of MAC Protocols on Ad Hoc Communication, IEEE Wireless Communication and Networking Conference (WCNC 2000), Chicago, USA, Sept. 2000
    [18] P. Kam, MACA--A new channel access method for packet radio, ARRL/CRRL Amateur 9th computer networking conference, April 1990: 134-140
    [19] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A Media Access Protocol for Wireless LAN, in proceeding of ACM SIGCOMM'94, 1994: 212-225
    [20] Chane L. Fullmer and JJ Garcia-Luna-Aceves. Floor Acquisition Multiple Access (FAMA) For Packet-Radio Networks, In Proceedings of the ACM SIGCOMM'95, Sep 1995: 262-273
    [21] Z. J. Haas, J. Deng, Dual Busy Tone Multiple Aecess(DBTMA)-Performanee Evaluation, IEEE Semiannual Vehicular Technology Conference (VTC'99), Houston, TX, May 1999
    [22] X. Hong, K. Xu and M. Gerla, Scalable routing protocols for mobile Ad Hoc networks, IEEE Network, 16 (4), 2002: 11-21
    [23] M. Mauve, J. Widmer, and H. Hartenstein, A Survey on Position-Based Routing in Mobile Ad Hoc Networks, IEEE Network, vol. 1, no. 6, Dec. 2001, pp.30-39
    [24] Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva, A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols, Proceedings of the Fourth Annual ACM/IEEE International conference on Mobile computing and networking (MobiCom'98), Dallas, USA, October 25-30, 1998
    [25] E. M. Royer and C. -K. Toh, A Review of Current Routing Protocols for Ad-Hoc Mobile Networks, IEEE Personal Communications, vol. 6, no. 2, April 1999, pp.46-55
    [26] G. Pei, M. Gerla, and T.-W. Chen, Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks, Proceeding in IEEE Internationl Conference on Communications (ICC2000), New Orleans, USA, June 2000
    [27] C. E Perkins, P Bhagwat, Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers, The ACM SIGCOMM Conference on Communications Architectures, London, 1994
    [28] T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC3626, October, 2003
    [29] R. Ogier, F. Templin, M. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), RFC3648, February, 2004
    [30] David B. Johnson, David A. Maltz, Yih-Chun Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), INTER.NET-DRAFT, draft-ietf-manet-dsr-10.txt, 19 July 2004
    [31] C. Perkins, E. Belding-Royer, S. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, RFC3561, July 2003
    [32] G. Pei et al., A Wireless Hierarchical Routing Protocol with Group Mobility, IEEE Wireless Communications and Networking Conference (WCNC'99), New Orleans, USA, Sept. 1999.
    [33] C. -C. Chiang and M. Gerla, Routing and Multicast in Multihop, Mobile Wireless Networks, Proceedings of IEEE International Conference on Universal Personal Communications (1CUPC'97), San Diego, USA, Oct. 1997.
    [34] M. Gerla, X. Hong, and G. Pei, Landmark Routing for Large Ad Hoc Wireless Networks, Proceedings of IEEE Global Communications Conference (GLOBECOM 2000), San Francisco, USA, Nov. 2000.
    [35] Z. J. Haas and M. R. Pearlman, The Performance of Query Control Schemes for the Zone Routing Protocol, The IEEE/ACM Transactions on Networking, vol. 9, no. 4, Aug.2001, pp. 427-38.
    [36] J. C. Navas and T. Imielinski, Geographic Addressing and Routing, In Proceeding 3th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'97), Budapest, Hungary, Sept.26-30, 1997.
    [37] S. Basagni et al., A Distance Routing Effect Algorithm for Mobility (DREAM), In Prodeeding 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), Dallas, USA, Oct. 1998, pp. 76-84.
    [38] Y.-B. Ko and N. H. Vaidya, Location-aided Routing(LAR) in Mobile Ad Hoc Networks, In Prodeeding 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), Dallas, USA, Oct. 1998, pp. 66-75.
    [39] B. Karp and H. T. Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, In Prodeeding 6th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom2000), Boston, USA, 2000, pp. 243-54.
    [40] J. Gomez-Castellanos, A. T. Campbell, M. Naghshineh, C. Bisdikian PARO: Supporting Transmission Power Controlled Routing in Wireless Ad Hoc Networks, ACM/Kluwer Journal on Wireless Networks (WINET), Vol. 9, No. 5, September 2003, pp 443-460
    [41] S. Singh and CS Raghavendra, PAMAS-Power Aware Multi-Access protocol with Signalling for Ad Hoc Networks, ACM Computer Communication Review, July 1998, pp5-26
    [42] C. Cordeiro, H. Gossain, and D. Agrawal, Multicast over Wireless Mobile Ad Hoc Networks: Present and Future Directions, IEEE Network Magazine, January/February 2003, vol. 17, no. 1, pp. 52-59
    [43] C. W. Wu, Y. C. Tay, and C.-K. Toh, Ad Hoc Multicast Routing Protocol Utilizing Increasing id-numberS (AMRIS) Functional Specification, Internet draft, Nov. 1998. http://www.ietf.org/proceedings/99nov/I-D/draft-ietf-manet-amris-spec-00.txt
    [44] E. M. Royer and C. E. Perkins, Multicast Operation of the Ad Hoc On-Demand Distance Vector Routing Protocol, in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM'99), Aug. 1999, pp. 207-18.
    [45] L. Jiand, M. Scott Corson, A Lightweight Adaptive Multicast Algorithm, Proceedings of IEEE Global Communications Conference(GLOBECOM 1998), pp. 1036-42.
    [46] K. Chen and K. Nahrstedt, Effective Location-Guided Tree Construction Algorithms for Small Group Multicast in MANET, The 21st Annual Joint Conference of the IEEE Computer and Communications (INFOCOMM2002), New York, USA, June, 2002, pp. 1180-89.
    [47] M. Gerla, S.-J. Lee, and W. Su. On-Demand Multicast Routing Protocol (ODMRP) for Ad Hoc Networks, Internet draft, draft-ietf-manet-odmrp-02.txt, 2000
    [48] J. J. Garcia-Luna-Aceves and E. L. Madruga, The Core-Assisted Mesh Protocol, IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Vol. 17, No. 8, Aug. 1999, pp. 1380-94.
    [49] C.-C. Chiang, M. Gerla, and L. Zhang, Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks, ACM-Baltzer Journal of Cluster Computing: Special Issue on Mobile Computing, vol. 1, no. 2, 1998, pp. 187-196
    [50] E. Bommaiah et al., AMRoute: Adhoc Multicast Routing Protocol, Internet draft, Aug. 1998.
    [51] P. Sinha, R. Sivakumar, and V. Bharghavan, MCEDAR: Multicast Core-Extraction Distributed Ad Hoc Routing, IEEE Wireless Communications and Networking Conference(WCNC1999), Sept. 1999, pp. 1313-1317.
    [52] R. Sivakumar, P. Sinha, V. Bharghavan, CEDAR: a core-extraction distributed Ad Hoc routing algorithm, IEEE Journal on Selected Areas in Communications, 1999, vol. 17, no. 8, pp. 1454-1465
    [53] S. Chen, K. Nahrstedt, Distributed quality-of-service routing in Ad Hoc networks, IEEE Journal on Selected Areas in Communications, 1999, vol. 17, no. 8, pp. 1488-1505.
    [54] R. Lin, J.S. Liu, Qos routing in Ad Hoc wireless networks, IEEE Journal on Selected Areas in Communications, 1999.vol. 17, no. 8, pp. 1426-1438
    [55] C. E. Perkins, E. M. Royer, S. R. Das, Quality of Service for Ad Hoc On-Demand Distance Vector Routing, Internet draft, 14 October 2003, http://people.nokia.net/charliep/txt/aodvid/qos.txt
    [56] R. Lin, On-demand Qos routing in multihop mobile networks, Proc.INFOCOM'2001, vol. 3, pp. 1735-1744, 2001.
    [57] W. Chen, N. Jain, and S. Singh, ANMP Ad Hoc network management protocol, IEEE Journal On Selected Areas In Communications, 17(8), 1999
    [58] The INSIGNIA QOS Framework, http://comet.columbia.edu/insignia/overview.html
    [59] The Rice University Monarch Project, http://www.monarch.cs.cmu.edu/[60] The Wireless Networks Laboratory at Cornell University, http://people.ece.cornell.edu/~haas/wnl/
    [61] The Mobile Computing and Multimedia Laboratory University of Maryland, College Park, http://www.cs.umd.edu/proj ects/mcml/index.html
    [62] The Mobile Computing Group at Stanford University, http://mosquitonet.stanford.edu/index.html
    [63] The UCLA Wireless Adaptive Mobility Laboratory, http://www.cs.ucla.edu/NRL/wireless/
    [64] The Illinois Mobile Environments Laboratory, http://timely.crhc.uiuc.edu/index.html
    [65] Wireless Information Network Laboratory, http://www.winlab.rutgers.edu/pub/Index.html

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700