预览加载中,请您耐心等待几秒...
1/10
2/10
3/10
4/10
5/10
6/10
7/10
8/10
9/10
10/10

亲,该文档总共35页,到这已经超出免费预览范围,如果喜欢就直接下载吧~

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

移动无线自组网中路由算法的安全性研究主动攻击被动攻击Active-n-m资源耗费攻击路由破坏攻击分布式密钥管理自组织密钥管理基于口令的密钥管理复活的鸭子分布式轻负荷认证模型SRPARIADNESEADSAR激励机制分布式协作入侵检测Watchdog&PathraterCONFIDANTCORE游戏理论性能比较三、未来的研究方向参考文献[6]J.Hubaux,L.Buttyan,andS.Capkun.TheQuestforSecurityinMobileAdHocNetworks.InProceedingoftheACMSymposiumonMobileAdHocNetworkingandComputing(MobiHOC),2001.[7]N.AsokanandP.Ginzboorg.KeyAgreementinAd-hocNetworks.ComputerCommunications23,2000.[8]FrankStajanoandRossAnderson.TheResurrectingDuckling.LectureNotesinComputerScience,Springer-Verlag,1999.[9]F.Stajano.TheResurrectingDuckling--whatnext?The8thInternationalWorkshoponSecurityProtocols,LNCS2133,Springler-Verlag,2000.[10]Weimerskirch,Andr6,andGillesThonet"ADistributedLight-WeightAuthenticationModelforAd-hocNetworks,"v.2288ofLNCS,2002.[11]PanagiotisPapadimitratosandZygmuntJ.HaasSecureRoutingforMobileAdhocNetworksSCSCommunicationNetworksandDistributedSystemsModelingandSimulationConference(CNDS2002),SanAntonio,TX,January27-31,2002.[12]Yih-ChunHu,AdrianPerrig,andDavidB.Johnson.Ariadne:ASecureOn-DemandRoutingProtocolforAdHocNetworks.TechnicalReportTechnicalReportTR01-383,DepartmentofComputerScience,RiceUniversity,December2001.[13]Yih-ChunHu,DavidB.Johnson,andAdrianPerrig.SEAD:SecureEfficientDistanceVectorRoutingforMobileWirelessAdHocNetworks.InProceedingsofthe4thIEEEWorkshoponMobileComputingSystems&Applications(WMCSA2002),IEEE,Calicoon,NY,June2002.[14]S.Yi,P.Naldurg,andR.Kravets.Security-awareadhocroutingforwirelessnetworks.InProc.ACMMobihoc,2001.[15]LeventeButty´anandJean-PierreHubaux.EnforcingServiceAvailabilityinMobileAd-HocWANs.InProceedingsofIEEE/ACMWorkshoponMobileAdHocNetworkingandComputing(Mobi-HOC),Boston,MA,USA,August2000.[16]LeventeButty´anandJean-PierreHubaux.StimulatingCooperationinSelf-OrganizingMobileAdHocNetworks.TechnicalReportDSC/2001/046,EPFL-DI-ICA,August2001.[17]YongguangZhangandWenkeLee.IntrusionDetectioninWirelessAd-HocNetworks.InProceedingsofMOBICOM2000,pages275–283,2000.[18]MGLB00]SergioMarti,T.J.Giuli,KevinLai,andMaryBa