Đang chuẩn bị liên kết để tải về tài liệu:
Wireless Mesh Networks 2010 Part 14

Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG

Tham khảo tài liệu 'wireless mesh networks 2010 part 14', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | Secure Routing in Wireless Mesh Networks 249 is the first of its kind that encompasses both high performance and security as goals in multicast routing and considers attacks on both path establishment and data delivery phases. As mentioned in Section 2.3 wireless networks are also subject to attacks such as rushing attacks and wormhole attacks. Defenses against these attacks have been extensively studied in Hu et al. 2003b Hu et al. 2003a Eriksson et al. 2006 Hu et al. 2004 . RAP Hu et al. 2003a prevents the rushing attack by waiting for several flood requests and then randomly selecting one to forward rather than always forwarding only the first one. Techniques to defend against wormhole attacks include packet leashes Hu et al. 2003b which restricts the maximum transmission distance by using time or location information. Truelink Eriksson et al. 2006 which uses MAC level acknowledgments to infer whether a link exists between two nodes and the work in Hu et al. 2004 that relies on directional antennas are two mechanisms for defense against the wormhole attack. In the following sub-sections some of the well-known security protocols for routing in WMNs are presented. These protocols are extensions of base routing protocols like AODV DSR etc. and use cryptographic mechanisms for ensuring node authentication message integrity and message confidentiality. 4.1 Authenticated Routing for Ad Hoc Networks ARAN Authenticated routing for ad hoc networks ARAN protocol Sanzgiri et al. 2002 is an on-demand routing protocol that makes use of cryptographic certificates to offer routing security. It takes care of authentication message integrity and non-repudiation but expects a small amount of prior security coordination among the nodes. In Sanzgiri et al. 2002 vulnerabilities and attacks specific to AODV and DSR protocols are discussed and the two protocols are comapred with the ARAN protocol. During the route discovery process of ARAN the source node brodcasts route_request RREQ

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.