【24h】

Enforcing Data Integrity in Very Large Ad Hoc Networks

机译:在大型Ad Hoc网络中加强数据完整性

获取原文
获取原文并翻译 | 示例

摘要

Ad hoc networks rely on nodes forwarding each other''s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belong to the same organization and share the same goal (in military scenarios, for example), it can generally be expected that all nodes can be trusted. However, as wireless technology becomes more commonplace, we can foresee the appearance of very large, heterogeneous networks where the intentions of neighboring nodes are unknown. Without any security measures in place, any node is capable of compromising the integrity of the data it forwards. Our goal in this paper is to ensure the integrity of the data being disseminated without resorting to complex and expensive solutions. We achive this by discouraging malicious behavior in two ways: a) enforcing integrity checks close to the source and b) refusing to communicate with obviously malicious nodes. We find that by having nodes sample their traffic for corrupted messages, malicious nodes can be identified with high accuracy, in effect transforming our collection of nodes into a self-policing network.
机译:Ad hoc网络依赖于节点相互转发数据包,从而成为确保网络性能的关键问题,即信任和合作。只要网络中的所有节点都属于同一组织并共享相同的目标(例如,在军事场景中),通常就可以期望所有节点都可以被信任。但是,随着无线技术变得越来越普遍,我们可以预见到大型的异构网络的出现,而相邻节点的意图是未知的。没有任何安全措施,任何节点都可能损害其转发数据的完整性。本文的目标是在不诉诸复杂且昂贵的解决方案的情况下确保所分发数据的完整性。我们通过两种方式阻止恶意行为来实现这一目标:a)强制在源头附近进行完整性检查,以及b)拒绝与显然是恶意节点的通信。我们发现,通过让节点对其损坏的消息进行流量采样,可以高精度地识别恶意节点,从而有效地将我们的节点集合转换为自我监管的网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号