软件导刊
軟件導刊
연건도간
SOFT WARE GUIDE
2014年
8期
137-139
,共3页
AODV路由协议%RREQ泛洪攻击%数据分组递交率%网络延迟
AODV路由協議%RREQ汎洪攻擊%數據分組遞交率%網絡延遲
AODV로유협의%RREQ범홍공격%수거분조체교솔%망락연지
AODV Routing Protocol%RREQ Flooding Attack%Packet Delivery Rate%Network Delay
恶意节点在一段时间内发送相当数量的RREQ消息,正常节点则广播入侵节点的RREQ信息,从而造成正常节点能源、存储资源和网络带宽耗尽,网络遭受破坏。研究了 AODV 路由协议的缺陷,针对路由请求RREQ消息广播的特性,实现了RREQ泛洪攻击。用NS对攻击过程进行仿真实验,用网络性能的两个重要变量(数据分组递交率和网络延迟)来衡量攻击结果。实验证明,RREQ泛洪攻击十分有效。
噁意節點在一段時間內髮送相噹數量的RREQ消息,正常節點則廣播入侵節點的RREQ信息,從而造成正常節點能源、存儲資源和網絡帶寬耗儘,網絡遭受破壞。研究瞭 AODV 路由協議的缺陷,針對路由請求RREQ消息廣播的特性,實現瞭RREQ汎洪攻擊。用NS對攻擊過程進行倣真實驗,用網絡性能的兩箇重要變量(數據分組遞交率和網絡延遲)來衡量攻擊結果。實驗證明,RREQ汎洪攻擊十分有效。
악의절점재일단시간내발송상당수량적RREQ소식,정상절점칙엄파입침절점적RREQ신식,종이조성정상절점능원、존저자원화망락대관모진,망락조수파배。연구료 AODV 로유협의적결함,침대로유청구RREQ소식엄파적특성,실현료RREQ범홍공격。용NS대공격과정진행방진실험,용망락성능적량개중요변량(수거분조체교솔화망락연지)래형량공격결과。실험증명,RREQ범홍공격십분유효。
This paper studied the vulnerabilities of AODV routing protocol .Based on route request RREQ message and its broadcast features ,the paper realized the RREQ flooding attack .Invasion node sent a number of RREQ frames every sec-ond ,other normal nodes broadcast RREQ information of Invasion node to the all network so that the power ,the cache and the bandwidth of normal node were exhausted .The network didn’t work normally .In the paper ,attack process was sim-ulated by NS .Two variables were measured ,packets delivery rate and network delay .The simulation results proved that the RREQ flooding attack method can damage the network effectively .