دانلود مقاله ISI انگلیسی شماره 70265
عنوان فارسی مقاله

یک طرح شناسایی مهاجمان کنترل خود کار استفاده جدید در شبکه های مش بی سیم مبتنی بر برنامه نویسی شبکه

کد مقاله سال انتشار مقاله انگلیسی ترجمه فارسی تعداد کلمات
70265 2015 14 صفحه PDF سفارش دهید محاسبه نشده
خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.
عنوان انگلیسی
SPAIS: A novel Self-checking Pollution Attackers Identification Scheme in network coding-based wireless mesh networks
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Computer Networks, Volume 91, 14 November 2015, Pages 376–389

کلمات کلیدی
برنامه نویسی شبکه؛ حمله آلودگی؛ شبکه های مش بی سیم؛ شناسایی
پیش نمایش مقاله
پیش نمایش مقاله یک طرح شناسایی مهاجمان کنترل خود کار استفاده جدید در شبکه های مش بی سیم مبتنی بر برنامه نویسی شبکه

چکیده انگلیسی

Pollution attacks refer to ones where attackers modify and inject corrupted data packets into the wireless network with network coding to disrupt the decoding process. In the context of network coding, the epidemic effect of pollution attacks can degrade network throughput significantly because of the mixing nature of network coding. To address this issue, a number of schemes to identify malicious nodes have been developed in the past. Nonetheless, these schemes have their limitations and cannot effectively deal with pollution attacks. In this paper, we propose a novel light-weight Self-checking Pollution Attackers Identification Scheme (SPAIS), which can identify the pollution attackers effectively and efficiently. By making full use of the broadcast nature of wireless media and the insight that a well-behaved node can monitor its downstream neighboring nodes locally by cooperating with other nodes, SPAIS hierarchically organizes the network as levels such that the nodes in the same level can monitor their downstream level nodes cooperatively. Through the combination of theoretical analysis and extensive simulations, our experimental data demonstrates that SPAIS can more effectively identify pollution attackers with a lower cost in comparison with the existing candidate schemes. For example, even if the quality of network connections is not in good condition and the malicious nodes send only one corrupted packet, the pollution attackers can be identified with a high probability.

خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.