基于隨機博弈網(wǎng)的Ad Hoc網(wǎng)絡安全評價與分析
本文關鍵詞: Ad Hoc網(wǎng)絡 隨機博弈網(wǎng) 連續(xù)時間馬爾科夫鏈 安全評價與分析方法 出處:《東華大學》2014年碩士論文 論文類型:學位論文
【摘要】:隨著Ad Hoc網(wǎng)絡的發(fā)展,其安全問題受到了人們的廣泛關注。近年來,國內(nèi)外學者對Ad Hoc網(wǎng)絡的安全策略進行了大量的研究,而在Ad Hoc網(wǎng)絡的安全評價與分析方面的研究卻寥寥無幾。建立一種行之有效的Ad Hoc網(wǎng)絡安全評價與分析方法可以為Ad Hoc網(wǎng)絡安全策略的設計提供方向。 本文提出了一種基于隨機博弈網(wǎng)的Ad Hoc網(wǎng)絡安全評價與分析方法。該方法通過構建Ad Hoc網(wǎng)絡的攻防隨機博弈網(wǎng)模型并計算得到納什均衡策略,然后將模型轉化為一個同構的連續(xù)時間馬爾科夫鏈(CTMC),通過計算CTMC的穩(wěn)態(tài)概率就可以對Ad Hoc網(wǎng)絡的安全進行評價與分析。最后本文通過matlab對各項安全指標進行了數(shù)據(jù)仿真,實驗結果表明:攻擊成功概率與攻擊響應時間只與Ad Hoc攻擊行為的期望收益與攻擊強度有關而與攻擊速率無關;Ad Hoc網(wǎng)絡系統(tǒng)的可靠性與Ad Hoc攻擊行為的期望回報、攻擊強度和攻擊速率都有關。
[Abstract]:With the development of Ad Hoc network, people pay more and more attention to the security problem of Ad Hoc network. In recent years, scholars at home and abroad have done a lot of research on the security strategy of Ad Hoc network. However, there are few researches on the security evaluation and analysis of Ad Hoc network. The establishment of an effective method for Ad Hoc network security evaluation and analysis can be used as an effective method for Ad Hoc network security evaluation and analysis. The Hoc network security policy design provides the direction. In this paper, a method of security evaluation and analysis for Ad Hoc networks based on stochastic game nets is proposed. The method is based on the construction of Ad Hoc networks. The attack and defense stochastic game net model of Hoc network and the Nash equilibrium strategy are calculated. Then the model is transformed into an isomorphic continuous time Markov chain (CTMC). By calculating the steady-state probability of CTMC, the security of Ad Hoc network can be evaluated and analyzed. Finally, the data simulation of each security index is carried out by matlab. The experimental results show that the attack success probability and the attack response time are only related to the expected return of Ad Hoc attack behavior and the attack intensity, but not to the attack rate. The reliability of Ad Hoc network system is related to the expected return of Ad Hoc attack behavior, attack intensity and attack rate.
【學位授予單位】:東華大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN929.5
【參考文獻】
相關期刊論文 前10條
1 肖坤;古天龍;常亮;;一種Ad Hoc網(wǎng)絡可生存性度量方法[J];桂林電子科技大學學報;2011年03期
2 何明;董強;袁黎苗;裘杭萍;曾曉光;;無線傳感器網(wǎng)絡的可靠性評估模型[J];解放軍理工大學學報(自然科學版);2010年04期
3 杜君;李偉華;;面向多跳無線自組織網(wǎng)絡的安全信任模型[J];吉林大學學報(工學版);2011年05期
4 劉建軍;;不確定環(huán)境下的Ad-hoc網(wǎng)絡可信性評價模型研究[J];計算機科學;2011年08期
5 洪錫軍,車克南,張激;無線自組網(wǎng)路由協(xié)議研究[J];計算機工程;2005年08期
6 彭志楠;葉丹霞;范明鈺;;移動Ad hoc網(wǎng)絡的黑洞攻擊研究[J];計算機應用研究;2009年11期
7 馬濤;單洪;;移動Ad Hoc網(wǎng)絡的改進攻擊樹建模方法研究[J];計算機應用與軟件;2009年04期
8 李慶誠;任開;宮曉利;叢躍進;;結合結點信任度的Ad Hoc地址配置協(xié)議研究[J];計算機應用與軟件;2013年02期
9 王峰;李平;朱海;;一種基于社交網(wǎng)絡的Sybil攻擊防御[J];計算機應用與軟件;2013年06期
10 王海泉;馬心意;夏春和;;一種MANET可生存性模型的建模方法[J];信息安全與通信保密;2010年01期
,本文編號:1478090
本文鏈接:http://sikaile.net/kejilunwen/wltx/1478090.html