999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Security of Ad Hoc Network

2007-06-19 13:56:20ZhouYajianYangYixian
ZTE Communications 2007年4期
關鍵詞:前景進展績效考核

Zhou Yajian Yang Yixian

(Beijing University of Posts and

Telecommunications, Beijing 100876, China)

Abstrac t:An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.

1 Introduction to Ad Hoc Network

T he Ad hoc network is a network where mobile nodes are all wirelessly connected.It is characterized by dynamics and limited bandwidth.The elements in an ad hoc network may be of a single type,or a mixture of severaltypes,like notebook Personal Computers(PC),Personal Digital Assistants(PDA)and mobile phones,for examples.Figure 1 illustrates a hybrid Ad hoc network.

In an ad hoc network,multihops may be required for routing from one node to another.Because there are no fixed routers in the network,each node,in addition to its basic function,has to act as a router to forward the packets of other nodes.With a completely distributed architecture,the network assigns all of its network management and organization-related tasks to each node.These characteristics give ad hoc networks unique advantages and a promising application prospect.On the other hand,they pose difficulties and challenges in the research and application of ad hoc networks,one of which is information security.

2 Security Threats in Ad Hoc Network

Due to the openness of their radio channels,wireless networks face some common security threats.The Ad hoc network,one type of wireless network,is challenged with these threats,too.All these threats can be classified into three main categories.The first category targets the network itself,with the purpose of disrupting the normal functions of the network.The attacks in this category include channel jamming,unauthorized access and traffic analysis.The second category attacks communication links aimed to damage confidentiality and integrity of end-to-end communication.These attacks include eavesdropping,message forgery,message replay,man-in-the-middle attack and session hijacking.The third category of attacks,such as power and timing attacks,aims at the mobile terminals to damage or illegally use them.For more information on these attacks,please consult the first listed reference at the end of this article.

Currently,the main techniques used to defend the network from the above threats include mutual authentication,access control,data confidentiality,data integrity,freshness check and non-repudiation[2].These security strategies work in different layers of the TCP/IPprotocol stack.

▲Figure 1. An Ad hoc network.

Unlike other wireless networks(e.g.,Wireless Local Area Network or WLAN),ad hoc networks face a new set of security threats due to their infrastructure-less nature,especially at the network layer.Since there is no guarantee that a path between two nodes would be free of malicious nodes attempting to harm the network operation by attacking the control or data plane,the security vulnerabilities of ad hoc networks are present not only in each single-hop wireless link,but also in each multi-hop forwarding path.

The network layer security threats against ad hoc networks falls into two categories[3]:control plane attacks and data plane attacks.To ensure that a packet is securely transmitted from one node to another,an ad hoc network needs to secure both the routing in the control plane and the forwarding operations in the data plane from any attacks.Accordingly,a complete solution to achieve this goal should cover three aspects:control-plane security,data-plane security,and key management.

3 Control Plane Security

The main approach used by the attacker to attack the control plane of an ad hoc network is to advertise false routing information,which damages the routing between nodes.It aims at the routing protocols being used by the network.Consequently,in the control plane security design,the critical fields(e.g.,hop count,source route)in the routing message are required to be authenticated in order to secure the routing of an ad hoc network.Currently,there are three popular message authentication primitives:keyed-Hash Message Authentication Code(HMAC),one-way key chain and digital signature.

3.1 Authentication, Authorization and Accounting (AAA)

Besides authentication,authorization is also needed to avoid allowing a malicious host to wreak havoc inside the network.This can be prevented by keeping controlof what hosts are allowed to do inside the ad hoc network.In ad hoc networks,individual mobile hosts are providing service to each other,which gives rise to accounting.

However,ad hoc networks and general AAA systems do not fit well together[4].The basic problem here is that the general AAA model is a centralized trust model,whereas the ad hoc network structure is decentralized.There is a need for some other kinds of methods to achieve the AAA functionality.One approach to provide authentication and authorization functionality in ad hoc networks is to use trust management-based approaches such as PolicyMaker or Keynote,which are decentralized by nature and can provide the requested functionality in ad hoc networks quite easily.Also,other protocols such as Simple Authentication and Security Layer(SASL)or Internet Security Association and Key Management Protocol/Internet Key Exchange(ISAKMP/IKE)can be used to provide the authentication functionality.Ad hoc networks probably need decentralized models or some other approaches to provide the AAA functionality.

3.2 Distance Vector Routing

This type of routing protocol performs route computation on a per-destination network basis,and it maintains information about the second-to-the-last network with distance information from each neighbor to every destination in the network.To ensure the authenticity and integrity of the information,the routing message digital signature and sequence numbers are employed.Countermeasures work in these ways[4]:

(1)Routing Message Sequence Number A sequence number is included in each routing message,which is set to zero at the initialization of a newly booted router,and is increased after each message.On detection of a skipped or repeated sequence number,a reset of the session is forced by the reinitialization of the routing process.The size of this sequence number is made large enough to minimize the chance of cycling back to zero.

(2)Routing Message Digital Signature

Each routing message is digitally signed by the sender.This provides authenticity and some degree of integrity(protection from message modification but not from replay)of the routing dialog.Upon detection of corruption,the message is dropped.

3.3 Link State Routing

To secure the link state routing protocols such as Open Shortest Path First(OSPF),the main challenge is to prevent the forgery of non-existent links by the attacker.

3)執行情況檢查(C):在成本控制執行過程中,實時收集和掌握成本控制數據和信息,對成本控制執行情況進行動態分析和前景預測,對執行情況進行績效考核和激勵,動態和前瞻性地監控成本管理的進展,確保項目投資在成本控制總目標內進行。

Murphy and Badger[5]have proposed a digital signature scheme to protect the OSPFrouting protocol.The basic idea of this scheme is to add a digital signature to each OSPFLink State Advertisements(LSA)packet and use message digest(such as keyed MD5)to protect all exchanged messages.The originator of the LSA will sign the message,and the signature willstay with the data during the OSPFflooding process,thus protecting the message integrity and providing authentication for LSA data.

The key management and distribution also make use of a type of signed LSA.

4 Data Plane Security

The data plane security should ensure each node forwards packets in accordance with its routing table.Unlike the controlplane,the data plane cannot be protected simply by way of encryption because many attacks targeting the forwarding process cannot be prevented.For example,an attacker may drop any packets passing through the data plane,no matter how well the packets are protected;and the attacker can also replay previous packets or forward forged packets.Therefore,the security solution for the data plane takes a reactive approach.The core of the approach are a detection technique and a reaction scheme.

Assuming a shared medium,bidirectional links,the use of source routing(i.e.,packets carry the entire route that becomes known to all intermediate nodes),and no colluding malicious nodes exist,each node may choose the"best"route,which is comprised of well-behaved nodes(i.e.,nodes that do not have a history of avoiding forwarding packets along established routes).Nodes operating in the promiscuous mode overhear the transmissions of their successors and may verify whether or not the packet was forwarded to the downstream node,and check the integrity of the forwarded packet.Upon detection of a misbehaving node,a report is generated,and nodes update the rating of the reported misbehaving node.The rating of a node in a well-behaved route periodically rises while receiving a misbehavior alert dramatically decreases the node rating.When a new route is required,the source node calculates a path metric equal to the average rating of the nodes in each route response,and selects the route with the highest metric.

5 Security of Key Management

Like in other distributed systems,the security in Ad hoc networks largely depends on a proper key management system.The key management system often involves the following aspects[6]:

·Trust Model:The trust model is used to determine the types of trusted elements in the network.It varies with network environment and application.Besides,the trust relationship between different types of elements has direct impacts on the network's key management system.

·Key Creation and Distribution:The elements allowed to generate keys and the owners of the keys must be determined.At the same time,the key management service must ensure the generated keys are securely distributed to their owners,ensuring confidentiality,integrity and availability,through the key distribution process.Because the topology of an Ad hoc network frequently changes,adopting either a single Certificate Authority(CA)or hierarchy CAs has hidden security problems.In recent years,the threshold cryptography-based key management service has become an effective method for achieving distributed trust due to its efficient security performance.However,the service delay problem is stillnot solved in this service.

·Key Storage:The key storage involves the methods used in key management services to store the secret keys.

6 Conclusions

Unlike other wireless networks like WLAN,the Ad hoc network dose not have any reliable infrastructure;so,its security issues focus on how to ensure the distributed network protocols to be securely operated,and how to establish trust relationships between peer nodes.Addressing these issues largely depends on a secure route and a robust key management mechanism.The routing security problem is often solved with message authentication technologies in the control plane.However,the key management mechanism is relatively complicated because it has to manage the required key information in a self-organizing way.

Therefore,the threshold cryptography-based key management service is probably a good solution for this problem.

猜你喜歡
前景進展績效考核
Micro-SPECT/CT應用進展
我國旅游房地產開發前景的探討
法德軸心的重啟及前景
離岸央票:需求與前景
中國外匯(2019年11期)2019-08-27 02:06:32
國企改革視角下績效考核的具體方法
績效考核分配的實踐與思考
公立醫院績效考核實施探討
消費導刊(2017年24期)2018-01-31 01:29:20
量子糾纏的來歷及應用前景
太空探索(2016年10期)2016-07-10 12:07:01
寄生胎的診治進展
我國土壤污染防治進展
河南科技(2014年22期)2014-02-27 14:18:22
主站蜘蛛池模板: 在线观看国产精品第一区免费| 国产精品永久不卡免费视频| 青青青伊人色综合久久| 国产成人亚洲无码淙合青草| 亚洲欧美一区在线| 五月婷婷激情四射| 高清无码不卡视频| 国产精品视频系列专区| 亚洲色无码专线精品观看| 2022国产无码在线| 日日碰狠狠添天天爽| 亚洲精品无码专区在线观看| 99re在线免费视频| 国产精品人成在线播放| 色综合综合网| 亚洲国产亚综合在线区| 日本妇乱子伦视频| 免费在线成人网| 亚洲天堂免费| 亚洲手机在线| 国产青榴视频在线观看网站| 老色鬼久久亚洲AV综合| 国产亚洲欧美在线人成aaaa| 国产a网站| 欧美啪啪一区| 狂欢视频在线观看不卡| 国产丝袜第一页| 久久久亚洲色| 日韩欧美在线观看| 婷婷综合色| 欧美一区二区三区欧美日韩亚洲| 国产综合精品一区二区| 天天色天天综合网| 91精品人妻一区二区| 综合色亚洲| 久久中文电影| 88av在线| 免费A∨中文乱码专区| 国产视频 第一页| 无码福利日韩神码福利片| 午夜福利视频一区| 广东一级毛片| 国产成人8x视频一区二区| 国产一级精品毛片基地| 成人综合网址| a欧美在线| 伊人91在线| 免费国产小视频在线观看| 亚洲日本韩在线观看| 好吊色国产欧美日韩免费观看| 欧美成人第一页| 91精品在线视频观看| 亚洲乱码在线视频| 四虎在线高清无码| 丁香五月激情图片| 国产丝袜91| 久久窝窝国产精品午夜看片| www.av男人.com| 成人国产精品网站在线看| 国产一级毛片在线| www.日韩三级| 91网址在线播放| 91高清在线视频| 午夜小视频在线| 国产原创第一页在线观看| 国产成人综合在线观看| 欧美一级高清片久久99| 亚洲人成网站色7777| 日韩精品成人在线| 全午夜免费一级毛片| 亚洲综合激情另类专区| 五月天久久婷婷| 日本在线欧美在线| 国产一在线观看| 欧美精品在线观看视频| 久久青草视频| 五月婷婷欧美| 亚洲人免费视频| 在线人成精品免费视频| 色哟哟精品无码网站在线播放视频| 97国内精品久久久久不卡| 在线色综合|