作业帮 > 英语 > 作业

英语翻译The wormhole attack is a severe attack against ad hoc ro

来源:学生作业帮 编辑:作业帮 分类:英语作业 时间:2024/05/17 05:58:47
英语翻译
The wormhole attack is a severe attack against ad hoc routing protocols that is particularly challenging to defend against; it can potentially cripple a range of ad hoc network routing protocols.In the wormhole attack,an attacker records packets (or bits) at one location in the network,tunnels them to another location,and retransmits them from there into the network.Most existing ad hoc network routing protocols that lack a mechanism to defend them against the wormhole attack would be unable to find routes longer than one or two hops,which severely disrupts communication.
If a wormhole attacker tunnels all packets through the wormhole honestly and reliably,no harm is done; the attacker actually provides a useful service in connecting the network more efficiently.However,when an attacker forwards only routing control messages,this attack might severely disrupt routing.For example,when used against an on-demand routing protocol such as DSR4 or AODV,a powerful application of the wormhole attack can be mounted by tunneling each ROUTE REQUEST packet directly to the target node of the REQUEST.This attack prevents any node from discovering routes more than two hops long.
Periodic protocols are also vulnerable to this kind of attack.For example,OLSR and TBRPF use HELLO packets for neighbor detection,so if an attacker tunnels to B all HELLO packets transmitted by A and tunnels to A all HELLO packets transmitted by B,then A and B will believe that they are neighbors,which would cause the routing protocol to fail to find routes when they aren’t actually neighbors.
The wormhole attack is also dangerous in other wireless applications.One example is any wireless access control system that is proximity based,such as wireless car keys or proximity- and token-based access control systems for PCs.In such systems,an attacker could relay authentication exchanges to gain unauthorized access.
Our solution to the wormhole attack is packet leashes.We consider specifically two types of packet leashes:geographical and temporal.The main idea is that by authenticating either an extremely precise timestamp or location information combined with a loose timestamp,a receiver can determine if the packet has traversed an unrealistic distance for the specific network technology used.Temporal leashes rely on extremely precise time synchronization and timestamps in each packet.We can approximate a packet’s travel time as the difference between the receive time and the timestamp.To be more conservative,however,a node can choose to add the maximum time synchronization error,assuming that the sender’s clock might be faster than the receiver’s.
拒绝翻译工具,求人工的啊!现身吧
The wormhole attack is a severe attack against ad hoc routing protocols that is particularly challenging to defend against; it can potentially cripple a range of ad hoc network routing protocols.In the wormhole attack,an attacker records packets (or bits) at one location in the network,tunnels them to another location,and retransmits them from there into the network.Most existing ad hoc network routing protocols that lack a mechanism to defend them against the wormhole attack would be unable to find routes longer than one or two hops,which severely disrupts communication.虫洞攻击是一个严重的攻击,路由协议,是特别具有挑战性,抵御;它可以削弱一系列网络路由协议.在虫洞攻击,攻击者记录数据包(或位)在同一地点的网络,隧道到另一个位置,并转发到网络.现有的大多数网络路由协议,缺乏一种机制来保护他们免受虫洞攻击将无法fi钕路线长于1或2啤酒花,这严重破坏通信.If a wormhole attacker tunnels all packets through the wormhole honestly and reliably,no harm is done; the attacker actually provides a useful service in connecting the network more efficiently.However,when an attacker forwards only routing control messages,this attack might severely disrupt routing.For example,when used against an on-demand routing protocol such as DSR4 or AODV,a powerful application of the wormhole attack can be mounted by tunneling each ROUTE REQUEST packet directly to the target node of the REQUEST.This attack prevents any node from discovering routes more than two hops long.如果一个虫洞攻击隧道数据包通过虫洞诚实可靠,没有造成危害后果的;攻击者实际上提供了一个有用的服务,更有效地fi连接网络.然而,当一个攻击者只转发路由控制消息,这次袭击可能严重破坏路由.例如,当使用一个路由协议如dsr4或路由协议,一个强大的应用虫洞攻击可以安装在隧道每个路由请求数据包直接到目标节点的请求.这种攻击可以防止任何节点发现路线超过2跳.Periodic protocols are also vulnerable to this kind of attack.For example,OLSR and TBRPF use HELLO packets for neighbor detection,so if an attacker tunnels to B all HELLO packets transmitted by A and tunnels to A all HELLO packets transmitted by B,then A and B will believe that they are neighbors,which would cause the routing protocol to fail to find routes when they aren’t actually neighbors.周期性的协议,也容易受到这类攻击.例如,路由和tbrpf使用包来检测为邻居,所以如果攻击者隧道都喂所传送的数据包和隧道到所有你好所传送的数据包,然后,会相信他们是邻居,这将导致路由协议未能fi钕路线时,他们不实际上的邻居.The wormhole attack is also dangerous in other wireless applications.One example is any wireless access control system that is proximity based,such as wireless car keys or proximity- and token-based access control systems for PCs.In such systems,an attacker could relay authentication exchanges to gain unauthorized access.虫洞攻击也是危险的其他无线应用.一个例子是任何无线接入控制系统,是接近,如无线车钥匙或接近和象征性的访问控制系统的电脑.在这样的系统中,攻击者可以获得未经授权的访问认证交流继电器.Our solution to the wormhole attack is packet leashes.We consider specifically two types of packet leashes:geographical and temporal.The main idea is that by authenticating either an extremely precise timestamp or location information combined with a loose timestamp,a receiver can determine if the packet has traversed an unrealistic distance for the specific network technology used.Temporal leashes rely on extremely precise time synchronization and timestamps in each packet.We can approximate a packet’s travel time as the difference between the receive time and the timestamp.To be more conservative,however,a node can choose to add the maximum time synchronization error,assuming that the sender’s clock might be faster than the receiver’s.我们的解决方案的虫洞攻击数据包限制.我们认为,特别地fi类型分组的牵引:地理和时间.其主要思想是,通过认证的任何一个非常精确的时间戳或位置信息,结合一个松散的时间戳,接收器可以确定数据包已经走过一个不切实际的距离为fi网络技术.时间约束依靠非常精确的时间同步,时间戳每个数据包.我们可以近似的数据包的旅行时间之间的差异的时间和收到的时间戳.更为保守,然而,一个节点可以选择添加最大时间同步误差,假设发送方的时钟可能是速度快于接收器的.
可以了吧!大哥