Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)

来源 :上海交通大学学报(英文版) | 被引量 : 0次 | 上传用户:q520fang
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.
其他文献
The technique state to design counter-current extraction columns is based on the performance of pilot plant experiments. The modelling is then either with the e
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7
Objective To observe the therapeutic effect of non-surgical treatment on diabetic Chinese with chronic periodontitis. Methods Moderate to advanced chronic perio
The Wide-Sense Stationary Uncorrelated Scattering (WSSUS) model has long been viewed as a basic channel model to describe the fading dispersive channel. But non
An experiment is conducted to investigate the effects of lubricant10#, which contains extreme pressure additives T304 and T305, on the rolling contact fatigue (
A new early-late synchronizer is proposed to improve tracking speed. The performance of the traditional early-late synchronizer is analyzed in detail, the resul
An algorithm of auto-searching weld line for welding mobile robot is presented.Auto-searching weld line is that the robot can automatically recognize a weld gro
目的 :考察乳痛宁颗粒剂中当归、川芎、香附子挥发油的最佳提取工艺和 β-环糊精最佳包合工艺。 方法 :用单因素分析考察最佳提取工艺 ,以收油率作为评价提取工艺的指标 ;用
The study of multipoint blank holder force(BHF) control is carried out for hydroforming a complicated shape motorcycle fuel tank. By finite element method (FEM)
Anomaly detection of privileged processes is one of the most important means to safeguard the host and system security. The key problem for improving detection