• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Wei, Long Xiang, Gao Xiaopeng, and Bai Yuebin. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2007, 44(8): 1371-1377.
Citation: Chen Wei, Long Xiang, Gao Xiaopeng, and Bai Yuebin. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2007, 44(8): 1371-1377.

A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks

More Information
  • Published Date: August 14, 2007
  • Mobile ad hoc networks (MANETs) are typical distribution networks, which have unique characteristics and constraints such as none centralized control, dynamically changed network topology, and limited bandwidth. For the absence of fixed network infrastructure, MANETs are vulnerable to various types of denial of service (DoS) attacks. The gray hole attack is a kind of DoS attacks. In this attack, an adversary silently drops some or all of the data packets sent to it for further forwarding even when no congestion occurs. Firstly, related works, DSR protocol, aggregate signature algorithm and network model are introduced. Secondly, a scheme based on aggregate signature is proposed to trace packet dropping nodes. The proposal consists of three related algorithms: the creating proof algorithm, the checkup algorithm and the diagnosis algorithm. The first is for creating proof, the second is for checking up source route nodes, and the last is for locating the malicious nodes. Finally, the efficiency of the proposal is analyzed. The simulation results using ns-2 show that in a moderately changing network, most of the malicious nodes could be detected, the routing packet overhead is low, and the packet delivery rate is improved after abandoning routes containing bad nodes.
  • Related Articles

    [1]Liu Lei, Shi Zhiguo, Su Haoru, and Li Hong. Image Segmentation Based on Higher Order Markov Random Field[J]. Journal of Computer Research and Development, 2013, 50(9): 1933-1942.
    [2]Du Yi, Zhang Ting, Lu Detang, Li Daolun. An Interpolation Method Using an Improved Markov Model[J]. Journal of Computer Research and Development, 2012, 49(3): 565-571.
    [3]Dong Yongquan, Li Qingzhong, Ding Yanhui, Peng Zhaohui. Constrained Conditional Random Fields for Semantic Annotation of Web Data[J]. Journal of Computer Research and Development, 2012, 49(2): 361-371.
    [4]Chen Yarui and Liao Shizhong. A Normalized Structure Selection Algorithm Based on Coupling for Gaussian Mean Fields[J]. Journal of Computer Research and Development, 2010, 47(9): 1497-1503.
    [5]Li Guochen, Wang Ruibo, Li Jihong. Automatic Labeling of Chinese Functional Chunks Based on Conditional Random Fields Model[J]. Journal of Computer Research and Development, 2010, 47(2): 336-343.
    [6]Wang Wenhui, Feng Qianjin, Chen Wufan. Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model[J]. Journal of Computer Research and Development, 2009, 46(3): 521-527.
    [7]Ge Hongwei and Liang Yanchun. A Multiple Sequence Alignment Algorithm Based on a Hidden Markov Model and Immune Particle Swarm Optimization[J]. Journal of Computer Research and Development, 2006, 43(8): 1330-1336.
    [8]Huang Chenrong, Zhang Zhengjun, Wu Huizhong. A Multi-Scale Images Edge Detection Model Based on Gap Statistic of Order Wilcoxon Rank Sum[J]. Journal of Computer Research and Development, 2005, 42(12): 2111-2117.
    [9]Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
    [10]Tang Min, Wang Yuanquan, Pheng Ann Heng, Xia Deshen. Tracking Cardiac MRI Tag by Markov Random Field Theory[J]. Journal of Computer Research and Development, 2005, 42(10): 1740-1745.

Catalog

    Article views (819) PDF downloads (599) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return