Computer Science ›› 2009, Vol. 36 ›› Issue (10): 94-97.
Previous Articles Next Articles
LI Bing-xin, ZHU Li-na, YUAN Wei-Bong
Online:
Published:
Abstract: Comparing with the traditional network,the Mobile Ad Hoc NETwork(MANET) is more vulnerable to various proactive and passive attacks. Building an efficient and practical benchmark for researching anomaly behaviors through modeling the possible threats and ways of attacks in MANET environment is very beneficial for verifying and testing some proposed detection and provention related approaches. It also establishes a significative base for exploring a secure MANET environment. This paper presented some approaches of modeling and simulating some typical abnormal behaviors like Worm hole,l3lack hole and Routing Jams commonly occurred in MANET. Those approaches depict the abnormal behaviors exactly. The verification and tests in simulation scenarios were also conducted in experiments with better performance.
Key words: MANET, Threats modeling, Simulation research
LI Bing-xin, ZHU Li-na, YUAN Wei-Bong. Research on Modeling and Simulating the Threats in MANET Environment[J].Computer Science, 2009, 36(10): 94-97.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I10/94
Cited