天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于軟件無線電的超短波無線網(wǎng)絡(luò)監(jiān)測系統(tǒng)設(shè)計(jì)

發(fā)布時(shí)間:2018-04-27 06:11

  本文選題:自組織網(wǎng) + 超短波; 參考:《電子科技大學(xué)》2014年碩士論文


【摘要】:超短波無線自組織網(wǎng)絡(luò)擁有快速組網(wǎng)、健壯性強(qiáng)的優(yōu)點(diǎn),在軍事和民用通信中有著廣泛應(yīng)用前景的。但是其固有的暴露信道、動(dòng)態(tài)拓?fù)浜投嗵酚傻忍攸c(diǎn)使其面臨著消息欺騙、虛假路由、拒絕服務(wù)等無線網(wǎng)絡(luò)安全威脅。因此,對(duì)自組織網(wǎng)進(jìn)行無線網(wǎng)絡(luò)監(jiān)測,及時(shí)發(fā)現(xiàn)網(wǎng)絡(luò)入侵行為非常必要。無線網(wǎng)絡(luò)監(jiān)測需要解決網(wǎng)絡(luò)協(xié)議的分析、數(shù)據(jù)數(shù)據(jù)流的偵收和無線網(wǎng)絡(luò)數(shù)據(jù)的分析三個(gè)問題。本文圍繞著三個(gè)問題進(jìn)行了220D協(xié)議的分析研究、基于軟件無線電的無線數(shù)據(jù)捕獲系統(tǒng)設(shè)計(jì)研究和入侵檢測的研究,并完成了部分功能的設(shè)計(jì)和實(shí)現(xiàn)。本文的主要工作包括如下幾個(gè)方面:第一,結(jié)合無線自組織網(wǎng)的特點(diǎn),對(duì)無線自組織網(wǎng)的安全性進(jìn)行分析,提出適合于無線自組織網(wǎng)的分布式監(jiān)測系統(tǒng)設(shè)計(jì)方案。根據(jù)方案,引出需要解決的三個(gè)關(guān)鍵技術(shù)問題,并明確了技術(shù)問題的研究方法。第二,學(xué)習(xí)研究了MS-STD-188-220D協(xié)議標(biāo)準(zhǔn)。重點(diǎn)對(duì)220D的數(shù)據(jù)鏈路幀、網(wǎng)絡(luò)層幀的結(jié)構(gòu)和數(shù)據(jù)包的逐層封裝過程進(jìn)行分析,研究了針對(duì)220D/IP網(wǎng)絡(luò)的協(xié)議解析方法。以FSK作為物理層調(diào)制方式,搭建一個(gè)220D實(shí)驗(yàn)平臺(tái),模擬220D數(shù)據(jù)包的收發(fā)過程,以作為網(wǎng)絡(luò)監(jiān)測的研究對(duì)象。第三,基于uSDR3500軟件無線電平臺(tái),實(shí)現(xiàn)對(duì)220D實(shí)驗(yàn)平臺(tái)產(chǎn)生的無線信號(hào)接收和解調(diào)。通過Simulink工具完成FSK接收機(jī)的仿真實(shí)驗(yàn)和鏈路設(shè)計(jì)。最終,將生成的比特文件下載到uSDR3500平臺(tái)中,實(shí)現(xiàn)對(duì)FSK信號(hào)進(jìn)行接收解調(diào),獲取到無線通信數(shù)據(jù)流。第四,進(jìn)行入侵檢測的研究,建立一種針對(duì)泛洪攻擊的隱馬爾可夫入侵檢測模型。以UDP流量負(fù)載變化作為隱馬爾可夫模型的觀測值,建立具有三個(gè)隱含狀態(tài)的隱馬爾可夫入侵檢測模型。使用NS-2仿真獲取的學(xué)習(xí)和評(píng)估數(shù)據(jù)包,對(duì)隱馬爾可夫入侵檢測模型進(jìn)行訓(xùn)練和評(píng)估,完成檢測模型的可行性驗(yàn)證,分析模型的檢測性能。
[Abstract]:Ultra-short wave wireless ad hoc networks have the advantages of fast networking and strong robustness, and have wide application prospects in military and civil communications. However, its inherent characteristics such as exposed channel, dynamic topology and multi-hop routing make it face the security threats of wireless networks such as message spoofing, false routing, denial of service and so on. Therefore, it is necessary to monitor the wireless network and discover the intrusion behavior in time. Wireless network monitoring needs to solve three problems: network protocol analysis, data stream detection and wireless network data analysis. This paper focuses on the analysis of 220D protocol, the design of wireless data capture system based on software radio and the research of intrusion detection, and completes the design and implementation of some functions. The main work of this paper includes the following aspects: first, combining the characteristics of wireless ad hoc network, the security of wireless ad hoc network is analyzed, and the design scheme of distributed monitoring system suitable for wireless ad hoc network is proposed. According to the scheme, three key technical problems need to be solved, and the research methods of technical problems are clarified. Secondly, we study the standard of MS-STD-188-220D protocol. The data link frame, network layer frame structure and packet encapsulation process of 220D data link frame are analyzed, and the protocol parsing method for 220D/IP network is studied. A 220D experimental platform is built with FSK as the physical layer modulation mode to simulate the receiving and sending process of 220D data packet, which can be used as the research object of network monitoring. Thirdly, based on uSDR3500 software radio platform, the wireless signal received and demodulated from 220 D experimental platform is realized. The simulation experiment and link design of FSK receiver are completed by Simulink tool. Finally, the generated bit file is downloaded to the uSDR3500 platform to receive and demodulate the FSK signal and obtain the wireless communication data stream. Fourthly, a hidden Markov intrusion detection model for flooding attack is established. Taking the change of UDP traffic load as the observed value of hidden Markov model, a hidden Markov intrusion detection model with three hidden states is established. The hidden Markov intrusion detection model is trained and evaluated using the learning and evaluation packets obtained by NS-2 simulation. The feasibility of the detection model is verified and the detection performance of the model is analyzed.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN98

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 劉小蘭;張傳慶;葉梧;;MIL-STD-188-220C中MAC層協(xié)議的研究及仿真[J];軍事通信技術(shù);2006年01期

,

本文編號(hào):1809523

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1809523.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶2c47f***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com