• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Huaping, Hu Guangming, Dong Pan, Chen Xin. Survey of Security Technology for Large Scale MANET[J]. Journal of Computer Research and Development, 2007, 44(4): 545-552.
Citation: Hu Huaping, Hu Guangming, Dong Pan, Chen Xin. Survey of Security Technology for Large Scale MANET[J]. Journal of Computer Research and Development, 2007, 44(4): 545-552.

Survey of Security Technology for Large Scale MANET

More Information
  • Published Date: April 14, 2007
  • Mobile ad-hoc networks (MANET) have great martial value and wide business application prospect. In MANET, owing to many new characteristics such as central-less control and multi-hop communication, the security situation is more rigorous than that in the traditional network. Especially, when the number of nodes increase, the difficulty of building network, network avalability and network security will be influenced badly. In this paper the current state of MANET research is first surveyed and then the state of the key technologies involved with large scale MANET security, such as security model and scheme, secure clustering, group key management and so on, is discussed in detail. Finally, the main research directions of large scale MANET security technology are presented, which are the security networking technology, the MANET protocol security proving technology, the key management technology, the model simulation and security evaluation technology.
  • Related Articles

    [1]Xue Kaiping, Chen Ke, Ni Dan, Zhang Hong, Hong Peilin. Survey of MPTCP-Based Multipath Transmission Optimization[J]. Journal of Computer Research and Development, 2016, 53(11): 2512-2529. DOI: 10.7544/issn1000-1239.2016.20150589
    [2]Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin. Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems[J]. Journal of Computer Research and Development, 2015, 52(7): 1604-1619. DOI: 10.7544/issn1000-1239.2015.20140244
    [3]Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108.
    [4]Cai Hongyun, Tian Junfeng, Li Zhen, and He Lihui. Trust Model Based on Trust Area and Evaluation Credibility[J]. Journal of Computer Research and Development, 2011, 48(11): 2131-2138.
    [5]Li Zhoujun, Chen Shikun. Survey on QBF Evaluation Algorithms[J]. Journal of Computer Research and Development, 2011, 48(5): 811-822.
    [6]Luo Qing, Lin Yaping. Heuristic Traversal Path Algorithm Based on Linear Aggregation in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2010, 47(11): 1919-1927.
    [7]Luo Hao and Zeng Huaxin. Design and Implementation of a Distributed Multi-Point Concurrent Test System[J]. Journal of Computer Research and Development, 2009, 46(6): 920-926.
    [8]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [9]Wu Zhendong and Li Shanping. A Topology Control Algorithm Based on Link Reliability and Multi-Path for Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(2): 216-222.
    [10]Chi Lihua, Liu jie, and Hu Qingfeng. Evaluation and Test for Scalability of Numerical Parallel Computation[J]. Journal of Computer Research and Development, 2005, 42(6): 1073-1078.

Catalog

    Article views (763) PDF downloads (667) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return