Please wait a minute...
  2010, Vol. 1 Issue (03): 43-45    DOI:
安全技术 Current Issue | Archive | Adv Search |
Research for Typical Attack Methods and Security Policies in Ad Hoc Network
Yang Xiuwen1  Mu Pengzhi2
(1.Qingdao Branch of China Unicom Internet Business Center,Qingdao 266071,Shandong; 2.Department of Network Engineering,Chengdu University of InformatioTechnology,Chengdu 610225,Sichuan)
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract   As a special kind of multi-hop mobile wireless network,Ad Hoc network has a wide range of applications.This article described the main features of Ad Hoc network,analyzed the typical network attack methods,and then proposed the corresponding policies,focused on the key issues such as the key management of mobile Ad Hoc network、the development trend of the new Invasion Detection System which is suitable for Ad Hoc network.
Key wordsAd Hoc Network      Security Policy      Key Management      Intrusion Detection     
Received: 01 January 1900      Published: 10 March 2010

Cite this article:

Yang Xiuwen  Mu Pengzhi. Research for Typical Attack Methods and Security Policies in Ad Hoc Network. , 2010, 1(03): 43-45.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2010/V1/I03/43

[1] FU Sen HE Zhen-xiang. A Black Box Attack on a Network Traffic Intrusion Detection System[J]. 电脑与电信, 2021, 1(5): 46-51.
[2] HUANG Qing-lan. Intrusion Detection Method Based on Cluster Analysis and Transfer Learning[J]. 电脑与电信, 2021, 1(3): 13-15.
[3] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[4] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[5] HOU Yan. Research and Design of the Network Security Model in Cloud Environment[J]. 电脑与电信, 2020, 1(12): 69-71.
[6] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
[7] Liao Haiyan. Wireless Campus Network Planning[J]. 电脑与电信, 2016, 1(1-2): 65-68.
[8] GaoWeimin, Zhu Lingzhi. Research on the Key Management Technology of Sensor Networks under Internet of Things Environment[J]. 电脑与电信, 2015, 1(7): 21-25.
[9] Chen Huangwei . E-government Information Security Technology Briefly Reviewed[J]. , 2011, 1(05): 0-0.
[10] Jia Hongwei Ge Yongliang chen Ming. The Bloom Filter Algorithm Based on the Information Security of Risk Assessment [J]. , 2011, 1(01): 0-0.
[11] Chen Lin  Wang Hongyan  Fu Lei. Analysis of the LAN Data Transmission and Security Policy[J]. , 2010, 1(05): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd