999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Security of Ad Hoc Network

2007-06-19 13:56:20ZhouYajianYangYixian
ZTE Communications 2007年4期
關鍵詞:前景進展績效考核

Zhou Yajian Yang Yixian

(Beijing University of Posts and

Telecommunications, Beijing 100876, China)

Abstrac t:An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.

1 Introduction to Ad Hoc Network

T he Ad hoc network is a network where mobile nodes are all wirelessly connected.It is characterized by dynamics and limited bandwidth.The elements in an ad hoc network may be of a single type,or a mixture of severaltypes,like notebook Personal Computers(PC),Personal Digital Assistants(PDA)and mobile phones,for examples.Figure 1 illustrates a hybrid Ad hoc network.

In an ad hoc network,multihops may be required for routing from one node to another.Because there are no fixed routers in the network,each node,in addition to its basic function,has to act as a router to forward the packets of other nodes.With a completely distributed architecture,the network assigns all of its network management and organization-related tasks to each node.These characteristics give ad hoc networks unique advantages and a promising application prospect.On the other hand,they pose difficulties and challenges in the research and application of ad hoc networks,one of which is information security.

2 Security Threats in Ad Hoc Network

Due to the openness of their radio channels,wireless networks face some common security threats.The Ad hoc network,one type of wireless network,is challenged with these threats,too.All these threats can be classified into three main categories.The first category targets the network itself,with the purpose of disrupting the normal functions of the network.The attacks in this category include channel jamming,unauthorized access and traffic analysis.The second category attacks communication links aimed to damage confidentiality and integrity of end-to-end communication.These attacks include eavesdropping,message forgery,message replay,man-in-the-middle attack and session hijacking.The third category of attacks,such as power and timing attacks,aims at the mobile terminals to damage or illegally use them.For more information on these attacks,please consult the first listed reference at the end of this article.

Currently,the main techniques used to defend the network from the above threats include mutual authentication,access control,data confidentiality,data integrity,freshness check and non-repudiation[2].These security strategies work in different layers of the TCP/IPprotocol stack.

▲Figure 1. An Ad hoc network.

Unlike other wireless networks(e.g.,Wireless Local Area Network or WLAN),ad hoc networks face a new set of security threats due to their infrastructure-less nature,especially at the network layer.Since there is no guarantee that a path between two nodes would be free of malicious nodes attempting to harm the network operation by attacking the control or data plane,the security vulnerabilities of ad hoc networks are present not only in each single-hop wireless link,but also in each multi-hop forwarding path.

The network layer security threats against ad hoc networks falls into two categories[3]:control plane attacks and data plane attacks.To ensure that a packet is securely transmitted from one node to another,an ad hoc network needs to secure both the routing in the control plane and the forwarding operations in the data plane from any attacks.Accordingly,a complete solution to achieve this goal should cover three aspects:control-plane security,data-plane security,and key management.

3 Control Plane Security

The main approach used by the attacker to attack the control plane of an ad hoc network is to advertise false routing information,which damages the routing between nodes.It aims at the routing protocols being used by the network.Consequently,in the control plane security design,the critical fields(e.g.,hop count,source route)in the routing message are required to be authenticated in order to secure the routing of an ad hoc network.Currently,there are three popular message authentication primitives:keyed-Hash Message Authentication Code(HMAC),one-way key chain and digital signature.

3.1 Authentication, Authorization and Accounting (AAA)

Besides authentication,authorization is also needed to avoid allowing a malicious host to wreak havoc inside the network.This can be prevented by keeping controlof what hosts are allowed to do inside the ad hoc network.In ad hoc networks,individual mobile hosts are providing service to each other,which gives rise to accounting.

However,ad hoc networks and general AAA systems do not fit well together[4].The basic problem here is that the general AAA model is a centralized trust model,whereas the ad hoc network structure is decentralized.There is a need for some other kinds of methods to achieve the AAA functionality.One approach to provide authentication and authorization functionality in ad hoc networks is to use trust management-based approaches such as PolicyMaker or Keynote,which are decentralized by nature and can provide the requested functionality in ad hoc networks quite easily.Also,other protocols such as Simple Authentication and Security Layer(SASL)or Internet Security Association and Key Management Protocol/Internet Key Exchange(ISAKMP/IKE)can be used to provide the authentication functionality.Ad hoc networks probably need decentralized models or some other approaches to provide the AAA functionality.

3.2 Distance Vector Routing

This type of routing protocol performs route computation on a per-destination network basis,and it maintains information about the second-to-the-last network with distance information from each neighbor to every destination in the network.To ensure the authenticity and integrity of the information,the routing message digital signature and sequence numbers are employed.Countermeasures work in these ways[4]:

(1)Routing Message Sequence Number A sequence number is included in each routing message,which is set to zero at the initialization of a newly booted router,and is increased after each message.On detection of a skipped or repeated sequence number,a reset of the session is forced by the reinitialization of the routing process.The size of this sequence number is made large enough to minimize the chance of cycling back to zero.

(2)Routing Message Digital Signature

Each routing message is digitally signed by the sender.This provides authenticity and some degree of integrity(protection from message modification but not from replay)of the routing dialog.Upon detection of corruption,the message is dropped.

3.3 Link State Routing

To secure the link state routing protocols such as Open Shortest Path First(OSPF),the main challenge is to prevent the forgery of non-existent links by the attacker.

3)執行情況檢查(C):在成本控制執行過程中,實時收集和掌握成本控制數據和信息,對成本控制執行情況進行動態分析和前景預測,對執行情況進行績效考核和激勵,動態和前瞻性地監控成本管理的進展,確保項目投資在成本控制總目標內進行。

Murphy and Badger[5]have proposed a digital signature scheme to protect the OSPFrouting protocol.The basic idea of this scheme is to add a digital signature to each OSPFLink State Advertisements(LSA)packet and use message digest(such as keyed MD5)to protect all exchanged messages.The originator of the LSA will sign the message,and the signature willstay with the data during the OSPFflooding process,thus protecting the message integrity and providing authentication for LSA data.

The key management and distribution also make use of a type of signed LSA.

4 Data Plane Security

The data plane security should ensure each node forwards packets in accordance with its routing table.Unlike the controlplane,the data plane cannot be protected simply by way of encryption because many attacks targeting the forwarding process cannot be prevented.For example,an attacker may drop any packets passing through the data plane,no matter how well the packets are protected;and the attacker can also replay previous packets or forward forged packets.Therefore,the security solution for the data plane takes a reactive approach.The core of the approach are a detection technique and a reaction scheme.

Assuming a shared medium,bidirectional links,the use of source routing(i.e.,packets carry the entire route that becomes known to all intermediate nodes),and no colluding malicious nodes exist,each node may choose the"best"route,which is comprised of well-behaved nodes(i.e.,nodes that do not have a history of avoiding forwarding packets along established routes).Nodes operating in the promiscuous mode overhear the transmissions of their successors and may verify whether or not the packet was forwarded to the downstream node,and check the integrity of the forwarded packet.Upon detection of a misbehaving node,a report is generated,and nodes update the rating of the reported misbehaving node.The rating of a node in a well-behaved route periodically rises while receiving a misbehavior alert dramatically decreases the node rating.When a new route is required,the source node calculates a path metric equal to the average rating of the nodes in each route response,and selects the route with the highest metric.

5 Security of Key Management

Like in other distributed systems,the security in Ad hoc networks largely depends on a proper key management system.The key management system often involves the following aspects[6]:

·Trust Model:The trust model is used to determine the types of trusted elements in the network.It varies with network environment and application.Besides,the trust relationship between different types of elements has direct impacts on the network's key management system.

·Key Creation and Distribution:The elements allowed to generate keys and the owners of the keys must be determined.At the same time,the key management service must ensure the generated keys are securely distributed to their owners,ensuring confidentiality,integrity and availability,through the key distribution process.Because the topology of an Ad hoc network frequently changes,adopting either a single Certificate Authority(CA)or hierarchy CAs has hidden security problems.In recent years,the threshold cryptography-based key management service has become an effective method for achieving distributed trust due to its efficient security performance.However,the service delay problem is stillnot solved in this service.

·Key Storage:The key storage involves the methods used in key management services to store the secret keys.

6 Conclusions

Unlike other wireless networks like WLAN,the Ad hoc network dose not have any reliable infrastructure;so,its security issues focus on how to ensure the distributed network protocols to be securely operated,and how to establish trust relationships between peer nodes.Addressing these issues largely depends on a secure route and a robust key management mechanism.The routing security problem is often solved with message authentication technologies in the control plane.However,the key management mechanism is relatively complicated because it has to manage the required key information in a self-organizing way.

Therefore,the threshold cryptography-based key management service is probably a good solution for this problem.

猜你喜歡
前景進展績效考核
Micro-SPECT/CT應用進展
我國旅游房地產開發前景的探討
法德軸心的重啟及前景
離岸央票:需求與前景
中國外匯(2019年11期)2019-08-27 02:06:32
國企改革視角下績效考核的具體方法
績效考核分配的實踐與思考
公立醫院績效考核實施探討
消費導刊(2017年24期)2018-01-31 01:29:20
量子糾纏的來歷及應用前景
太空探索(2016年10期)2016-07-10 12:07:01
寄生胎的診治進展
我國土壤污染防治進展
河南科技(2014年22期)2014-02-27 14:18:22
主站蜘蛛池模板: 久久情精品国产品免费| 国产老女人精品免费视频| 毛片免费高清免费| 青青草原国产| 91毛片网| 国产亚洲美日韩AV中文字幕无码成人| 99re精彩视频| av无码久久精品| 综合天天色| 欧美一级特黄aaaaaa在线看片| 国产高颜值露脸在线观看| 91视频首页| 手机在线免费不卡一区二| 无码内射在线| 欧美国产日韩在线播放| 久久青青草原亚洲av无码| 老司机久久精品视频| 成人毛片免费在线观看| 亚洲男人的天堂网| 毛片免费视频| a欧美在线| 久久久久九九精品影院| 亚洲男人的天堂视频| 国产精品性| 欧美天堂在线| 啪啪啪亚洲无码| 亚洲欧美激情另类| 99久久精彩视频| 亚洲av综合网| 欧美www在线观看| 内射人妻无码色AV天堂| 亚洲天堂首页| 久久久黄色片| 欧美午夜小视频| 亚洲国产综合精品中文第一| 国产精品尤物铁牛tv| 超碰91免费人妻| 欧美日韩另类国产| 久草青青在线视频| 亚洲αv毛片| 真实国产乱子伦视频| 国产午夜不卡| 狠狠亚洲婷婷综合色香| 欧美一区二区福利视频| 日本免费福利视频| 亚洲AV人人澡人人双人| 国产91丝袜在线播放动漫 | 国产www网站| 久久精品人人做人人爽97| av性天堂网| 露脸国产精品自产在线播| 国产福利在线免费| 亚洲无码视频一区二区三区| av一区二区三区在线观看| 熟妇无码人妻| 国产精品男人的天堂| 国产在线观看精品| 91九色国产porny| 一级毛片免费播放视频| 国产在线无码一区二区三区| 国产欧美日韩视频怡春院| 欧美特黄一级大黄录像| 国产精品永久在线| 亚洲成人一区二区三区| 欧美黄网在线| 91美女视频在线| 亚洲无码精彩视频在线观看| 欧美国产日韩在线播放| 呦视频在线一区二区三区| 久久国产精品无码hdav| 不卡视频国产| 一区二区影院| 欧美精品1区| 一区二区影院| 国产人人干| 国产精品jizz在线观看软件| 午夜啪啪福利| 亚洲精品自产拍在线观看APP| 欧美区一区二区三| 91久久大香线蕉| 54pao国产成人免费视频| 精品福利一区二区免费视频|