- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Chap7_2_MANET_Security Wireless Networks and Security 无线网络与 及安全 .ppt
1
Chapter 7.2
Mobile Ad Hoc Networks - Security
Dr. Du
dxj2005@
Chap 7.2 - Dr. Du
2
Security Requirements in MANETs
Availability
Authorization and Key Management
Data Confidentiality
Data Integrity
Non-repudiation
Chap 7.2 - Dr. Du
3
Security Solution Constraints
Lightweight
Decentralized
Reactive
Fault-tolerant
Chap 7.2 - Dr. Du
4
Challenges
No infrastructure
Peer-to-peer architecture with multi-hop routing
Mobile device physical vulnerability
Stringent resource constraints
Wireless medium
Node mobility
Chap 7.2 - Dr. Du
5
Threats
Attacks
External attacks
Internal attacks
Passive attacks
Active attacks
Misbehavior
Chap 7.2 - Dr. Du
8
MANET Routing Protocols
Topology-based approaches
Proactive routing (table driven)
Reactive routing (on demand)
Hybrid routing
Position-based approaches
Chap 7.2 - Dr. Du
9
Routing Protocol Attacks
Attacks using modification
Redirection by modifying route sequence number
Redirection by modifying hop count
Source route modification
Tunneling
D. Djenouri, L. Khelladi and A.N. Badache. “A Survey of Security Issues in Mobile
Ad Hoc and Sensor Networks”, Communications Surveys Tutorials, IEEE
Chap 7.2 - Dr. Du
10
Routing Protocol Attacks
Attacks using fabrication
Falsifying route errors
Broadcast falsified routes
Spoofing attacks
Rushing attacks
Directed against on-demand routing protocols
The attacker hurries route request packet to the next node to increase the probability of being included in a route
Chap 7.2 - Dr. Du
11
Data Forwarding Security
Threats
Eavesdropping (passive attacks)
cryptography can help to prevent but how to detect eavesdropping is still an open research topic
Dropping data packets (similar to selfishness)
Selfish behavior on data forwarding
Drops other nodes’ packets to preserve its resources, e.g. battery power
Chap 7.2 - Dr. Du
12
Link Layer Security
IEEE 802.11 MAC
Vulnerable to DoS attacks
Attacks can exploit its binary exponential backoff scheme to launch DoS
A security extension to 802.11 was prop
您可能关注的文档
- CHAP08_Cost-Benefit Analysis 公共金融与 及公共政策课件.ppt
- Chap08股票估价 公司理财教材.ppt
- CHAP09 Political Economy 公共金融与 及公共政策课件.ppt
- chap09 Satellite Communications 无线网络通信 英文教材.ppt
- CHAP09Introduction to Economic Fluctuations培训资料.ppt
- Chap1 传输线的基本理论 微波技术 知识基础 课件 PPT.ppt
- chap10 煤的分类 煤化学教材.ppt
- chap10 Cellular Wireless Networks 无线网络通信 英文教材.ppt
- CHAP10Aggregate Demand I教材课程.ppt
- CHAP10_State and Local Government Expenditures 公共金融与 及公共政策课件.ppt
- Chap7数据库 计算机科学基础教材.ppt
- chap7社交礼仪文书写作 应用文写作 幻灯片课件.ppt
- chap7(不完全竞争市场) 现代经济学微观部分教材.ppt
- chap7(垄断竞争市场) 现代经济学微观部分教材.ppt
- chap7(寡头市场) 现代经济学微观部分教材.ppt
- chap7:通用操作系统的保护-B 西安电子科技大学计算机安全基础教材.ppt
- chap8 煤的化学性质 煤化学教材.ppt
- chap8 8、仪器驱动器设计 虚拟仪器设计 教程文件.ppt
- Chap8MemoryManagement存储相关管理 《操作系统概念》课件.ppt
- Chap8Short-lived and Long-lived Assets财务报表分析教材.ppt
原创力文档


文档评论(0)