• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

干扰攻击下的MPH-M、AODV-M和DSR-M性能评估

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.

作者信息

Del-Valle-Soto Carolina, Mex-Perera Carlos, Monroy Raul, Nolazco-Flores Juan A

机构信息

Universidad Panamericana. Facultad de Ingeniería. Prolongación Calzada Circunvalación Poniente 49, Zapopan, Jalisco 45010, Mexico.

Telemática Telemetría y Radiofrecuencia, Francia 1717, Col. Moderna, Guadalajara 44190, Mexico.

出版信息

Sensors (Basel). 2017 Jul 5;17(7):1573. doi: 10.3390/s17071573.

DOI:10.3390/s17071573
PMID:28678180
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5539809/
Abstract

In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M.

摘要

在这项工作中,我们展示了一种集成到路由协议MPH、AODV和DSR中的针对干扰攻击的缓解方案设计。由此产生的协议分别命名为MPH-M(多父层次结构 - 修改版)、AODV-M(自组织按需距离矢量 - 修改版)和DSR-M(动态源路由 - 修改版)。对于缓解算法,如果在每个节点本地运行的检测算法产生肯定结果,则该节点被隔离;其次,路由协议调整其路径以避开被隔离的节点。我们评估了干扰攻击如何影响所有这些修改后协议的不同指标。我们用于检测干扰攻击的指标是数据包重传次数、等待空闲信道时的CSMA/CA(带有冲突避免的载波侦听多路访问)重试次数以及节点浪费的能量。用于评估修改后路由协议性能的指标是系统的吞吐量和弹性以及节点使用的能量。当攻击者位置设置在收集器节点附近、中间和远处时,我们评估了所有修改后的协议。我们的评估结果表明,MPH-M的性能比AODV-M和DSR-M好得多。例如,MPH-M的节点能量比AODV-M好138.13%,比DSR-M好126.07%。此外,我们还发现MPH-M比AODV-M和DSR-M从缓解方案中受益更多。例如,MPH-M的节点能量消耗降低了34.61%,而AODV-M和DSR-M分别仅降低了3.92%和3.42%。在吞吐量方面,当没有缓解机制时,MPH协议在收集器节点的数据包接收效率相对于AODV和DSR为16.4%。此外,当存在缓解方案时,MPH-M相对于AODV-M和DSR-M的效率提高了7.7%以上。此外,我们发现有了缓解机制后,AODV-M和DSR-M没有明显变化。然而,MPH-M的效率提高了8.4%。我们还从平均数据包重传的角度测量了这些算法的弹性,发现MPH-M的变化率比AODV-M和DSR-M低约15%。MPH-M的恢复时间比AODV-M快5秒,比DSR-M快2秒。

相似文献

1
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.干扰攻击下的MPH-M、AODV-M和DSR-M性能评估
Sensors (Basel). 2017 Jul 5;17(7):1573. doi: 10.3390/s17071573.
2
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.关于路由协议对无线传感器网络抗干扰攻击弹性的影响。
Sensors (Basel). 2015 Mar 27;15(4):7619-49. doi: 10.3390/s150407619.
3
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.用于在干扰攻击下提高无线传感器网络性能的新型检测范式。
Sensors (Basel). 2019 May 31;19(11):2489. doi: 10.3390/s19112489.
4
On the MAC/network/energy performance evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR routing protocols.关于无线传感器网络的MAC/网络/能量性能评估:对比MPH、AODV、DSR和ZTR路由协议
Sensors (Basel). 2014 Dec 2;14(12):22811-47. doi: 10.3390/s141222811.
5
Energy Efficient Routing Protocol in Sensor Networks Using Genetic Algorithm.使用遗传算法的传感器网络节能路由协议。
Sensors (Basel). 2021 Oct 25;21(21):7060. doi: 10.3390/s21217060.
6
Systematic review on modification to the on-demand distance vector routing discovery mechanics.关于对按需距离向量路由发现机制进行修改的系统评价。
PeerJ Comput Sci. 2022 Sep 5;8:e1079. doi: 10.7717/peerj-cs.1079. eCollection 2022.
7
Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm.使用增强型AODV算法在无线自组织网络中进行安全恶意节点检测。
Sci Rep. 2024 Apr 3;14(1):7818. doi: 10.1038/s41598-024-57480-6.
8
A comparative study on routing protocols for VANETs.车载自组网(VANETs)路由协议的比较研究。
Heliyon. 2019 Aug 30;5(8):e02340. doi: 10.1016/j.heliyon.2019.e02340. eCollection 2019 Aug.
9
Fuzzy-based optimization of AODV routing for efficient route in wireless mesh networks.基于模糊算法的无线网状网络中AODV路由优化以实现高效路由
PeerJ Comput Sci. 2023 Oct 18;9:e1508. doi: 10.7717/peerj-cs.1508. eCollection 2023.
10
Highly Reliable Fuzzy-Logic-Assisted AODV Routing Algorithm for Mobile Ad Hoc Networks.用于移动自组织网络的高度可靠的模糊逻辑辅助AODV路由算法
Sensors (Basel). 2021 Sep 6;21(17):5965. doi: 10.3390/s21175965.

引用本文的文献

1
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.用于在干扰攻击下提高无线传感器网络性能的新型检测范式。
Sensors (Basel). 2019 May 31;19(11):2489. doi: 10.3390/s19112489.
2
An Untraceable Data Sharing Scheme in Wireless Sensor Networks.无线传感器网络中的不可追踪数据共享方案。
Sensors (Basel). 2018 Dec 31;19(1):114. doi: 10.3390/s19010114.
3
A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks.一种用于检测无线传感器网络中干扰攻击的统计方法。

本文引用的文献

1
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.关于路由协议对无线传感器网络抗干扰攻击弹性的影响。
Sensors (Basel). 2015 Mar 27;15(4):7619-49. doi: 10.3390/s150407619.
2
On the MAC/network/energy performance evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR routing protocols.关于无线传感器网络的MAC/网络/能量性能评估:对比MPH、AODV、DSR和ZTR路由协议
Sensors (Basel). 2014 Dec 2;14(12):22811-47. doi: 10.3390/s141222811.
3
Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system.
Sensors (Basel). 2018 May 24;18(6):1691. doi: 10.3390/s18061691.
使用模糊推理系统的无线传感器网络有信息战价值的干扰攻击检测机制。
Sensors (Basel). 2010;10(4):3444-79. doi: 10.3390/s100403444. Epub 2010 Apr 8.