用户名: 密码: 验证码:
基于NTVR的MANET恶意节点检测技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近几年来,通信设备的快速扩张和移动通信的迅速发展使得MANET (Mobile Ad-hoc NETworks)网络得到了越来越多的关注。MANET网络是由大量通过无线连接的移动节点组成的自组织系统。网络中每个节点不仅是一个终端系统,而且还是转发数据的路由。网络中节点能够自由移动并且能够自组织成为一个网络。MANET网络有几个非常重要的特征,例如动态拓扑、带宽限制、可变性能连接、有限能源等。由于这些特征,MANET网络极易受到来自于破坏节点的各种各样的攻击。恶意节点不可信的无线连接极易导致网络阻塞,而且通过不停的发送数据会造成设备瘫痪。
     由于计算能力和电池能力有限,移动设备必须在安全性和设备消耗之间进行选择。本文借助于信任度的概念,从MANET网络中节点的告警入手,提出了适用于MANET网络的信任模型,并可以隔离恶意节点。本文在对MANET网络中的各种攻击行为进行了广泛的研究之后,对恶意节点的行为进行了一个完整的总结,对每种安全问题进行了分析,并对恶意行为做了分类,同时还分析了针对某些攻击的安全防御和检测策略。对网络节点的告警技术进行了研究,从业务视角出发,分析影响网络通信的关键性能指标。介绍告警系统的相关结构,在不增加设备的基础上,通过探针来收集信息,给出MANET节点关键性能指标的计算方式。在对节点综合信任度进行等级划分之后,节点在路由过程中优先选择信任度高的路径,减少了恶意节点的活动量,可以将恶意节点排除出网络。特别地,考虑了时间对于节点信任的影响,随着时间的推移,没有交互的正常节点和恶意节点的信任都会随着时间的推移趋于中立。
In recent years, due to the rapid expansion of communications equipment and the mobile communications, researchers have paid a lot of attention to mobile ad-hoc networks (MANET). A MANET is a self-organizing system which is composed of a large number of mobile nodes connected by wireless. Each node in the MANET is not only a terminal system, but also a route for forwarding packets. The nodes are free to move about and self-organization into a network. A MANET has several significant features, such as dynamic topology, bandwidth restrictions, variable performance link, limited energy, etc. Due to these features, a MANET is vulnerable to a variety of attacks from a compromised node. The malicious node which has unsafe wireless connection can easily lead to network jamming, and will cause the equipment paralysis.
     Due to the limited, computing power and battery capacity, the node must trade-off between security and resource consumption of the device. In this paper, the concept of trust is introduced to MANET. With the help of the monitoring system for MANET, the MANET trust model is proposed. The model is capable isolating the malicious node. By the research of the various attacks to the MANET, the behavior of malicious nodes in security issues is summarized, and the malicious behavior is classified. Moreover, the security defense and detection strategies aim at specific attacks are analyzed. Alarm technology on MANET node is researched. On the business perspective, the key performance indicators that affect network communication are analyzed. The structure of the alarm system is introduced. The system collects information by using the probe without additional equipment. The MANET node key performance indicators are calculated by health model. Applying the concept of node trust value rank, the nodes select the path of trust and high priority. The activity of malicious nodes is reduced in this way. Finally, the malicious node can be excluded from the MANET. In particular, the influence of the time for node trust is considered. With the passage of time, the normal node and the malicious node which have no interaction with other node tend to be neutral.
引文
[1]Buchegger, Le Boudec. Self-policing mobile ad-hoc networks by reputation. IEEE Commun. Mag.43 (7) (2005) P101.
    [2]Marjan Kuchaki Rafsanjani, Ali Movaghar. Identifying Monitoring Nodes in MANET by Detecting Unauthorized and Malicious Nodes. ITSim 2008. Aug 2008. P1-7
    [3]Somasundaram, Marimuthu. A Multipath Reliable Routing for detection and isolation of malicious nodes in MANET. Computing, Communication and Networking,2008. P1-8
    [4]Schroth Christoph, Strassberger Markus, Eigner Robert, Eichler, Stephan. A Framework for Network Utility Maximization in VANETs. In:Proceedings of the 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET): ACM SIGMOBILE,2006.-3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET).-Los Angeles, USA, P2
    [5]Kosch Timo, Adler Christian, Eichler Stephan, Schroth Christoph, Strassberger Markus. The Scalability Problem of Vehicular Ad Hoc Networks and How to Solve it. In:IEEE Wireless Communications Magazine 13 (2006), Nr.5, S. 6.P22-28
    [6]Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. Das. A novel caching scheme for improving Internet-based mobile ad hoc networks performance. Ad Hoc Networks. Volume 4, Issue 2. March 2006. P225-239
    [7]Scott Corson, Joseph Macker, Gregory Cirincione. Internet-based Mobile Ad Hoc Networking. PREPRINT:IEEE Internet Computing Magazine. Volume 3, Issue 4. Aug 1999. P63-70
    [8]Sunho Lim, WangChien Lee, Guohong Cao, Chita R. Das. Cache invalidation strategies for internet-based mobile ad hoc networks. Computer Communications. Volume 30, Issue 8. June 2007, P1854-1869
    [9]Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. Das. A novel caching scheme for improving Internet-based mobile ad hoc networks performance. Ad Hoc Networks. Volume 4, Issue 2. March 2006. P225-239
    [10]孟器宇.战场环境下的移动自组织网络拓扑控制研究[学位论文].重庆大学.2011
    [11]韩芝侠.基于无线传感器网络的农业信息采集系统路由设计研究.微型机与应用.2011年第20期.2011.P61-64
    [12]Jinsung Byun, Insung Hong, Byeongkwan Kang, Sehyun Park. Implementation of an Adaptive Intelligent Home Energy Management System Using a Wireless Ad-Hoc and Sensor Network in Pervasive Environments. Computer Communications and Networks.2011. P1-6
    [13]Woong Hee Kim, Sunyoung Lee, Jongwoon Hwang. Real-time Energy Monitoring and Controlling System based on ZigBee Sensor Networks. Procedia Computer Science. May 2011. P794-797
    [14]Karri, Khilar. Routing misbehavior detection and reaction in MANETs. Industrial and Information Systems.2010. P80-85
    [15]盛燕.无线传感器网络恶意节点识别技术研究[学位论文].哈尔滨工程大学.2008
    [16]Wei Gong, Zhiyang You, Danning Chen, Xibin Zhao, Ming Gu, Kwok-Yan Lam. Trust Based Malicious Nodes Detection in MANET. In:E-Business and Information System Security.2009. P1-4
    [17]Ebinger, Bissmeyer. TEREC:Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs. In:Communication Networks and Services Research Conference,2009. CNSR'09. Seventh Annual.11-13 May 2009. P378-385
    [18]Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede. Low-cost elliptic curve cryptography for wireless sensor networks. In:Buttyan et al. P6-17
    [19]Erik-Oliver Blay and Martina Zitterbart. Towards acceptable publie-key encryption in sensor networks. In:Soraya Kouadri Mostefaoui and Zakaria Maamar, editors, IWUC, P88-93
    [20]Leif Uhsadel, Axel Poschmann, and Christof Paar. Enabling full-size public-key algorithms on 8-bit sensor nodes. In:Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, ESAS, volume 4572 of Lecture Notes in Computer Science. Springer,2007. P73-86
    [21]BA Makin, DA Padha. A Trust-Based Secure Data Aggregation Protocol for Wireless Sensor Networks. The IUP Journal of Information Technology.2010
    [22]Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.. Trust-based on-demand multipath routing in mobile ad hoc networks. Information Security. Volume 4, Issue 4. 2010. P212-232
    [23]Royer and Toh. A Review of Current Routing Pro-tocols for Ad hoc Mobile Wireless Networks. IEEE Pers. Com-mun. Volumn 2. Apr.1999. P46-55.
    [24]Papadimitratos, PanosHaas, Z. J. Secure Routing for Mobile Ad Hoc Networks. In:Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS).2002. P193-204
    [25]Laurent Eschenauer, Virgil D. Gligor. A Key-Management Scheme for Distributed Sensor Networks. In:Proceedings of the 9th ACM conference on Computer and communications security.2002. P41-47
    [26]Sencun Zhu, Sanjeev Setia, Sushil Jajodia. LEAP:Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. Journal ACM Transactions on Sensor Networks (TOSN). Volume 2 Issue 4. November 2006. P500-528
    [27]Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy. Poster Abstract:Secure Locations:Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks. Proceeding SenSys'03 Proceedings of the 1st international conference on Embedded networked sensor systems.2003. P324-325
    [28]Manikandan, Sathyasheela. Detection of malicious nodes in MANETs. Communication Control and Computing Technologies.2010. P788-793
    [29]Wenjia Li, Joshi, A., Finin, T.. Policy-Based Malicious Peer Detection in Ad Hoc Networks. Computational Science and Engineering. Volume 3.2009. P76-82
    [30]Chandrakant, Joshi, Shenoy, Venugopal, Patnaik. Stopping communication of malicious nodes in MANETs using authorized tokens. Parallel Distributed and Grid Computing.2010. P175-179
    [31]James Newsome, Elaine Shi, Dawn Song, Adrian Perrig. The Sybil Attack in Sensor Networks:Analysis & Defenses. In:Proceedings of the 3rd international symposium on Information processing in sensor networks.2004. P259-268
    [32]Yih-Chun Hu, Adrian Perrig and David B. Johnson. Wormhole attacks in wireless networks. Selected Areas in Communications. Feb.2006. P370-380
    [33]Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter. Detection of denial-of-message attacks on sensor network broadcasts. Security and Privacy. 2005. P64-78
    [34]Qi Dong, Donggang Liu, Peng Ning. Pre-authentication filters:providing dos resistance for signature-based broadcast authentication in sensor networks. Proceedings of the first ACM conference on Wireless network security. P2-12
    [35]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini. A Randomized, Efficient, and Distributed Protocolfor the Detection of Node Replication Attacks in Wireless Sensor Networks. Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing.2007. P80-89
    [36]Woungang I., Dhurandher, Peddi, Obaidat. Detecting blackhole attacks on DSR-based mobile ad hoc networks. Computer, Information and Telecommunication Systems.2012. P1-5
    [37]Karjee, J. Majitar, Banerjee. Tracing the Abnormal Behavior of Malicious Nodes in MANET. Wireless Communications, Networking and Mobile Computing. 2008. P1-7
    [38]Qing Zhang, Ting Yu and Peng Ning. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Transactions on Information and System Security (TISSEC). Volume 11 Issue 3. March 2008. P225-239
    [39]Moreira, Venda, Silva, Marcelino, Pereira. Sensor-Mobile application to monitor a WSN. Information Systems and Technologies.2011. P1-6
    [40]Vijayan, Mareeswari, Ramakrishna. Energy based Trust solution for Detecting Selfish Nodes in MANET using Fuzzy logic. International journal of research and reviews in computer science. Volumn 2.2011. P647-652
    [41]Ditipriya Sinha, Uma Bhattacharya, Rituparna Chaki. A CRT based Encryption Methodology for Secure Communication in MANET. International Journal of Computer Applications. Volume 39.2012. P20-25
    [42]Junhai Luo,Xue Liu, Mingyu Fan. A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks. Volume 53, Issue 14. Sep 2009. P2396-2407
    [43]Xia H., Jia Z., Ju, L., Zhu, Y.. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. Wireless Sensor Systems. Volume 1, Issue 4.2011. P248-266
    [44]Ebinger, Darmstadt, Bissmeyer. TEREC:Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs. Communication Networks and Services Research Conference.2009. P378-385

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700