CN101599961A - 针对最优链路状态路由协议的特定攻击及其防御方法 - Google Patents
针对最优链路状态路由协议的特定攻击及其防御方法 Download PDFInfo
- Publication number
- CN101599961A CN101599961A CNA2009100332256A CN200910033225A CN101599961A CN 101599961 A CN101599961 A CN 101599961A CN A2009100332256 A CNA2009100332256 A CN A2009100332256A CN 200910033225 A CN200910033225 A CN 200910033225A CN 101599961 A CN101599961 A CN 101599961A
- Authority
- CN
- China
- Prior art keywords
- node
- ansn
- message
- attack
- newly
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
英文术语 | 中文术语 |
T_last_addr | 目标节点前的最后一跳 |
T_seq | 拓扑序列号 |
main<Originator> | 源节点的主地址 |
T_dest_addr | 目标节点地址 |
T_time | 拓扑表项有效时间 |
MS<Originator> | 把源节点选为MPR的节点 |
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100332256A CN101599961B (zh) | 2009-06-10 | 2009-06-10 | 针对最优链路状态路由协议的特定攻击及其防御方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100332256A CN101599961B (zh) | 2009-06-10 | 2009-06-10 | 针对最优链路状态路由协议的特定攻击及其防御方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101599961A true CN101599961A (zh) | 2009-12-09 |
CN101599961B CN101599961B (zh) | 2012-05-09 |
Family
ID=41421208
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009100332256A Expired - Fee Related CN101599961B (zh) | 2009-06-10 | 2009-06-10 | 针对最优链路状态路由协议的特定攻击及其防御方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101599961B (zh) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834855A (zh) * | 2010-04-14 | 2010-09-15 | 杭州华三通信技术有限公司 | 一种防止序列号攻击的方法和设备 |
CN102098669A (zh) * | 2011-03-10 | 2011-06-15 | 南京邮电大学 | Ad Hoc网络中节点攻击的防御方案 |
CN102769845A (zh) * | 2012-06-15 | 2012-11-07 | 哈尔滨工程大学 | 无线传感器网络中基于特定3跳路径的虫洞检测方法 |
CN106102117A (zh) * | 2016-06-13 | 2016-11-09 | 西安交通大学 | 两跳有缓存网络中基于能量收割的安全传输方法 |
CN109617863A (zh) * | 2018-11-27 | 2019-04-12 | 杭州电子科技大学 | 一种基于博弈论的移动目标防御最优防御策略选取的方法 |
CN109769000A (zh) * | 2019-03-15 | 2019-05-17 | 江苏中利电子信息科技有限公司 | 基于olsr协议的网络节点定位信息的传输方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100471141C (zh) * | 2007-02-05 | 2009-03-18 | 南京邮电大学 | 无线传感器网络的混合入侵检测方法 |
CN101110762A (zh) * | 2007-08-22 | 2008-01-23 | 华中科技大学 | 一种Ad hoc网络安全路由方法 |
-
2009
- 2009-06-10 CN CN2009100332256A patent/CN101599961B/zh not_active Expired - Fee Related
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834855A (zh) * | 2010-04-14 | 2010-09-15 | 杭州华三通信技术有限公司 | 一种防止序列号攻击的方法和设备 |
CN101834855B (zh) * | 2010-04-14 | 2014-03-19 | 杭州华三通信技术有限公司 | 一种防止序列号攻击的方法和设备 |
CN102098669A (zh) * | 2011-03-10 | 2011-06-15 | 南京邮电大学 | Ad Hoc网络中节点攻击的防御方案 |
CN102098669B (zh) * | 2011-03-10 | 2013-05-29 | 南京邮电大学 | Ad Hoc网络中节点攻击的防御方法 |
CN102769845A (zh) * | 2012-06-15 | 2012-11-07 | 哈尔滨工程大学 | 无线传感器网络中基于特定3跳路径的虫洞检测方法 |
CN102769845B (zh) * | 2012-06-15 | 2015-02-25 | 哈尔滨工程大学 | 无线传感器网络中基于特定3跳路径的虫洞检测方法 |
CN106102117A (zh) * | 2016-06-13 | 2016-11-09 | 西安交通大学 | 两跳有缓存网络中基于能量收割的安全传输方法 |
CN106102117B (zh) * | 2016-06-13 | 2019-08-23 | 西安交通大学 | 两跳有缓存网络中基于能量收割的安全传输方法 |
CN109617863A (zh) * | 2018-11-27 | 2019-04-12 | 杭州电子科技大学 | 一种基于博弈论的移动目标防御最优防御策略选取的方法 |
CN109769000A (zh) * | 2019-03-15 | 2019-05-17 | 江苏中利电子信息科技有限公司 | 基于olsr协议的网络节点定位信息的传输方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101599961B (zh) | 2012-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101599961B (zh) | 针对最优链路状态路由协议的特定攻击及其防御方法 | |
CN107612914B (zh) | 一种基于参考节点策略的Ad Hoc网络安全信任方法 | |
Su et al. | Mitigation of black-hole nodes in mobile ad hoc networks | |
Wadhaj et al. | Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL) | |
Jaiswal et al. | A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network | |
Kshirsagar et al. | Blackhole attack detection and prevention by real time monitoring | |
CN108521648B (zh) | 一种基于历史信息的方向性天线自适应邻居发现的方法 | |
Kamaleshwar et al. | [Retracted] Self‐Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN | |
Li et al. | A study and simulation research of blackhole attack on mobile adhoc network | |
CN101986741B (zh) | Manet中基于节点信誉划分虚拟子网的方法 | |
CN103701771A (zh) | 一种用于检测物联网Sybil攻击新方法 | |
Narayanan et al. | Secure AODV to combat black hole attack in MANET | |
CN104104495A (zh) | 一种基于动态路径列表的无线传感器网络智能选路同步器 | |
Desai et al. | Performance evaluation of OLSR protocol in MANET under the influence of routing attack | |
Lee et al. | An efficient neighbor knowledge based broadcasting for mobile ad hoc networks | |
CN103812776A (zh) | 扩展6LoWPAN域的信息处理方法及系统 | |
Singh et al. | Guard against cooperative black hole attack in Mobile Ad-Hoc Network | |
Singh et al. | DETECTION AND REMOVAL OF MALICIOUS NODE IN AD-HOC NETWORK USING DSR ROUTING ALGORITHM AND CBDS METHOD | |
Clausen et al. | Router and link admittance control in the optimized link state routing protocol version 2 (olsrv2) | |
Chavda et al. | Comparative Analysis Of Detection and Prevention techniques of black hole attack In aodv Routing protocol of MANET | |
Yadav et al. | A review on black hole attack in MANETs | |
Chuachan et al. | A novel challenge & response scheme against selective forwarding attacks in MANETs | |
Ying et al. | Sink Privacy Protection with Minimum Network Traffic in WSNs. | |
Alagumuthukrishnan et al. | Monitoring the Misbehaving Nodes in MANET using Audit-Based Misbehaviour Detection (AMD) Method | |
Nandhini et al. | Detecting and preventing malicious nodes using cooperative bait detection scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20091209 Assignee: Jiangsu Nanyou IOT Technology Park Ltd. Assignor: Nanjing Post & Telecommunication Univ. Contract record no.: 2016320000219 Denomination of invention: Target attack and defense method specific to optimized link state routing protocol Granted publication date: 20120509 License type: Common License Record date: 20161121 |
|
LICC | Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model | ||
EC01 | Cancellation of recordation of patent licensing contract | ||
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: Jiangsu Nanyou IOT Technology Park Ltd. Assignor: Nanjing Post & Telecommunication Univ. Contract record no.: 2016320000219 Date of cancellation: 20180116 |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120509 Termination date: 20170610 |