1) active black hole attack
主动型黑洞攻击
1.
This paper compares several attack models aiming at mobile Ad Hoc network\'s prosperity of routing vulnerable,and presents a classification that divides black hole attacks into two specific types,such as passive black hole attacks and active black hole attacks under Dynamic Source Routing(DSR) protocol.
在NS2网络仿真平台上实现包括RREQ洪泛攻击、被动型黑洞攻击和主动型黑洞攻击在内的3种攻击模式。
2) passive black hole attack
被动型黑洞攻击
1.
This paper compares several attack models aiming at mobile Ad Hoc network\'s prosperity of routing vulnerable,and presents a classification that divides black hole attacks into two specific types,such as passive black hole attacks and active black hole attacks under Dynamic Source Routing(DSR) protocol.
在NS2网络仿真平台上实现包括RREQ洪泛攻击、被动型黑洞攻击和主动型黑洞攻击在内的3种攻击模式。
3) black hole attack
黑洞攻击
1.
The black hole attack of AODV routing protocols was simulated with NS-2.
33分析并仿真了AODV路由协议的黑洞攻击;结合已存在的黑洞防御方案,给出了一种新的解决方案;最后提出了一种新的对无线自组织网络造成威胁的攻击方法。
4) active attack
主动攻击
1.
Securing schemes of steganography against active attacks;
抗主动攻击的隐秘通信方案
2.
The actuality of overseas active attack mine and the development trend of mine in the future are introduced,the important status and wide development space of mine are illuminated sufficiently.
本文主要介绍了国外主动攻击水雷的现状以及未来水雷武器的发展趋势,充分说明了水雷武器的重要地位和广阔的发展空间。
3.
Most multicast authentication schemes do not tolerate packets loss,some others may only work in random packets loss while vulnerable to active attack.
大多数的组播认证方案不能用于这种环境,其他一些方案的主要目标是针对网络通讯故障引起的随机包丢失情况,而不能抵抗主动攻击。
5) Proactive aggression(PA)
主动攻击(PA)
6) wormhole attack
虫洞攻击
1.
Detecting Wormhole Attacks in Multi-path Ad Hoc Networks
检测多径路由Ad Hoc网络中的虫洞攻击
2.
Basic wormhole attack and accordance wormhole attack problems were analyzed, based on which proposed an attack detection scheme.
针对基于TDoA测距的定位技术,分析了基本虫洞攻击与一贯虫洞攻击的特点,提出了一种利用无线多跳网络时空特性与测距数据一致性性质的攻击检测方法,并从理论上给出了此方法的成功检测攻击概率下限值。
3.
This article presents the characteristics of wireless sensor networks,analyzes the roots of the security issues,and then describes in detail the theory of wormhole attack and its destructions.
文章首先介绍了无线传感器网络的特征,分析了安全问题的根源,然后详细介绍了无线传感器网络中虫洞攻击的原理和破坏性,提出引入简化的marsh信任模型,将邻居节点以往表现作为信任评估的经验来源,通过具体分析确定节点的位置关系,从而避免传感器网络中的虫洞攻击,最后指出了下一步研究的方向。
补充资料:主动
①不靠外力促进而自动:主动关心同学。②能够由自己把握:争取主动。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条