• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Huaping, Hu Guangming, Dong Pan, Chen Xin. Survey of Security Technology for Large Scale MANET[J]. Journal of Computer Research and Development, 2007, 44(4): 545-552.
Citation: Hu Huaping, Hu Guangming, Dong Pan, Chen Xin. Survey of Security Technology for Large Scale MANET[J]. Journal of Computer Research and Development, 2007, 44(4): 545-552.

Survey of Security Technology for Large Scale MANET

More Information
  • Published Date: April 14, 2007
  • Mobile ad-hoc networks (MANET) have great martial value and wide business application prospect. In MANET, owing to many new characteristics such as central-less control and multi-hop communication, the security situation is more rigorous than that in the traditional network. Especially, when the number of nodes increase, the difficulty of building network, network avalability and network security will be influenced badly. In this paper the current state of MANET research is first surveyed and then the state of the key technologies involved with large scale MANET security, such as security model and scheme, secure clustering, group key management and so on, is discussed in detail. Finally, the main research directions of large scale MANET security technology are presented, which are the security networking technology, the MANET protocol security proving technology, the key management technology, the model simulation and security evaluation technology.
  • Related Articles

    [1]Li Shunyong, Zhang Miaomiao, Cao Fuyuan. A MD fuzzy k-modes Algorithm for Clustering Categorical Matrix-Object Data[J]. Journal of Computer Research and Development, 2019, 56(6): 1325-1337. DOI: 10.7544/issn1000-1239.2019.20180737
    [2]Wang Yanhui, Xiao Xuemei, Jia Limin. Dynamic and Comprehensive Evaluation Mothod for Interoperability Trust Based on Fuzzy Variable Weighting[J]. Journal of Computer Research and Development, 2012, 49(6): 1235-1242.
    [3]Mu Chengpo, Huang Houkuan, Tian Shengfeng. Hierarchical Online Risk Assessment for Intrusion Scenarios[J]. Journal of Computer Research and Development, 2010, 47(10): 1724-1732.
    [4]Xu Jiaqing, Peng Xin, and Zhao Wenyun. Program Clustering for Comprehension Based on Fuzzy Formal Concept Analysis[J]. Journal of Computer Research and Development, 2009, 46(9): 1556-1566.
    [5]Zhai Junhai, Wang Xizhao, Zhang Sufang. Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral[J]. Journal of Computer Research and Development, 2009, 46(3): 470-477.
    [6]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [7]Mu Chengpo, Huang Houkuan, Tian Shengfeng, Li Xiangjun. A Survey of Intrusion Response Decision-Making Techniques of Automated Intrusion Response Systems[J]. Journal of Computer Research and Development, 2008, 45(8): 1290-1298.
    [8]Bao Xuhua, Dai Yingxia, Lian Yifeng, and Zhu Pengfei. The Correlation Determine Algorithm for Implied Restriction[J]. Journal of Computer Research and Development, 2007, 44(12): 2028-2035.
    [9]Zhang Xiaoning and Feng Dengguo. Intrusion Detection for Ad Hoc Routing Based on Fuzzy Behavior Analysis[J]. Journal of Computer Research and Development, 2006, 43(4): 621-626.
    [10]Mu Chengpo, Huang Houkuan, and Tian Shengfeng. A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J]. Journal of Computer Research and Development, 2006, 43(1): 1-8.

Catalog

    Article views (763) PDF downloads (667) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return