{"title":"无线自组织网络的AODV协议的安全性增强","authors":"S. Bhargava, D. Agrawal","doi":"10.1109/VTC.2001.957123","DOIUrl":null,"url":null,"abstract":"Ad hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of ad hoc networks are in military, tactical and other security-sensitive operations, where the environment is hostile. Hence, security is a critical issue. Due to the nature of ad hoc networks, conventional security measures cannot be used. New security techniques are essential for a high-survivability network. The performance of the protocol may be severely affected in the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have identified certain misbehaviors caused by a malicious node to a reactive routing protocol, specifically the ad hoc on-demand distance vector (AODV) protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the network.","PeriodicalId":129008,"journal":{"name":"IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"141","resultStr":"{\"title\":\"Security enhancements in AODV protocol for wireless ad hoc networks\",\"authors\":\"S. Bhargava, D. Agrawal\",\"doi\":\"10.1109/VTC.2001.957123\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of ad hoc networks are in military, tactical and other security-sensitive operations, where the environment is hostile. Hence, security is a critical issue. Due to the nature of ad hoc networks, conventional security measures cannot be used. New security techniques are essential for a high-survivability network. The performance of the protocol may be severely affected in the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have identified certain misbehaviors caused by a malicious node to a reactive routing protocol, specifically the ad hoc on-demand distance vector (AODV) protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the network.\",\"PeriodicalId\":129008,\"journal\":{\"name\":\"IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"141\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VTC.2001.957123\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VTC.2001.957123","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security enhancements in AODV protocol for wireless ad hoc networks
Ad hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of ad hoc networks are in military, tactical and other security-sensitive operations, where the environment is hostile. Hence, security is a critical issue. Due to the nature of ad hoc networks, conventional security measures cannot be used. New security techniques are essential for a high-survivability network. The performance of the protocol may be severely affected in the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have identified certain misbehaviors caused by a malicious node to a reactive routing protocol, specifically the ad hoc on-demand distance vector (AODV) protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the network.