CN101426221A - Mobile Ad Hoc network simulation system oriented to survivability - Google Patents

Mobile Ad Hoc network simulation system oriented to survivability Download PDF

Info

Publication number
CN101426221A
CN101426221A CNA2008102395236A CN200810239523A CN101426221A CN 101426221 A CN101426221 A CN 101426221A CN A2008102395236 A CNA2008102395236 A CN A2008102395236A CN 200810239523 A CN200810239523 A CN 200810239523A CN 101426221 A CN101426221 A CN 101426221A
Authority
CN
China
Prior art keywords
attack
module
fault
mobile
hoc network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008102395236A
Other languages
Chinese (zh)
Other versions
CN100579308C (en
Inventor
夏春和
周远
李肖坚
姚珊
戚建中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN200810239523A priority Critical patent/CN100579308C/en
Publication of CN101426221A publication Critical patent/CN101426221A/en
Application granted granted Critical
Publication of CN100579308C publication Critical patent/CN100579308C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a mobile Ad Hoc network simulating system which faces survivability and comprises a mobile Ad Hoc network configuration module (11), a configuration file analyzing module (12), a movable Ad Hoc network simulation module (21), a result collecting module (31), an attacking event allocating module (1), a malfunction event allocating module (4), an attacking event simulating module (2) and a malfunction event simulating module (3). The mobile Ad Hoc network simulating system according to the invention is introduced with simulating modules for typical attacking event and malfunction event of mobile Ad Hoc network for providing powerful simulation checking environment supporting and more data related with the survivability for the user on the network safety and survivability research. Therefore the addition of attacking event simulation and malfunction event simulation in traditional mobile Ad Hoc network simulating system according to the invention is significant for the aspect of safety and survivability research of mobile Ad Hoc network.

Description

But mobile Ad Hoc network (WSN) emulation system towards survivability
Technical field
The present invention relates to a kind of analogue system, more particularly say, be meant and a kind of mobile Ad Hoc network carried out emulation.
Background technology
The provisional autonomous system of the multi-hop that mobile Ad Hoc (Mobile Ad Hoc Network) network is made up of one group of portable terminal that has a wireless transmitter, portable terminal has routing function, can constitute network topology arbitrarily by wireless connections, this network can work alone, and also can be connected with Internet or cellular radio.Node in the network can produce message, receive message as main frame; Can transmit message as router.Node in same radio transmission range can direct communication, and the node in same radio transmission range can be transmitted packet by other node and not communicate.The mobility of node has caused complicated dynamic network topology structure in the mobile Ad Hoc network.
" emulation " speech is translated from English Simulation, another once the translated name of usefulness be " simulation ".So-called Computer Simulation is meant at entity and does not still exist or be difficult under situation about experimentizing on the entity, earlier by carrying out modeling to investigating object, give expression to its physical characteristic with mathematical equation, prepare a computer program then, and go out to investigate object under the situation of system parameters and internal and external environment condition changing by Computing, how its major parameter changes, thereby reaches overall understanding and grasp the purpose of investigating plant characteristic.
Adopt method of emulation that mobile Ad Hoc network is studied, the realization of emulation consumes littler resource than experimentizing with true environment, and the model that emulation is set up is much simpler than the Mathematical Modeling of analytic approach foundation.Therefore utilizing the means of emulation that mobile Ad Hoc network is studied is a good way.But the mobile Ad Hoc network (WSN) emulation system towards survivability of the present invention be build mobile Ad Hoc network (WSN) emulation system (referring to shown in Figure 1) but in add the factor that attack emulation module and event of failure emulation module realize influencing mobile Ad Hoc network survivability, thereby but reach purpose towards survivability.
Summary of the invention
But the objective of the invention is to propose a kind of mobile Ad Hoc network (WSN) emulation system towards survivability, this analogue system includes mobile Ad Hoc network simulation module 21, attack emulation module 2, event of failure emulation module 3, attack configuration module 1, event of failure configuration module 4, mobile Ad Hoc Network conf iotag. module 11, configuration file parsing module 12 and collection module 31; The user disposes mobile Ad Hoc network by mobile Ad Hoc Network conf iotag. module 11, comprises the number that node is set, the position of node, the Routing Protocol of node binding, the transmission radius of node, the move mode of node etc. can be bound data service then on node.And these configuration informations are shifted be the configuration file of certain format, to resolve by configuration file parsing module 12, the interface function that calling mobile Ad Hoc network simulation module 21 provides is carried out emulation.The user is provided with attack and event of failure at mobile Ad Hoc network by attack configuration module 1 and event of failure configuration module 4 in network.And these configuration informations are converted to corresponding attack configuration file and event of failure configuration file automatically, resolved by configuration file parsing module 12, the interface function that calling attack emulation module 2, event of failure emulation module 3 provides is carried out emulation.In carrying out simulation process, analogue system can demonstrate simulation process dynamically, and data collection module 31 is collected relevant emulated data and preserved into destination file simultaneously.
But the advantage of the mobile Ad Hoc network (WSN) emulation system towards survivability of the present invention is: only consider that in Ad Hoc network procotol and performance are not enough, but also need to carry out the research of network security and survivability aspect.But can check Ad Hoc network whether to have survivability according to adding attack and event of failure in simulation process during subscriber simulation.The present invention has promptly introduced but the emulation module of the typical attack incident of mobile Ad Hoc network and event of failure is provided strong simulating, verifying environment support and but the more data relevant with survivability are provided on network security and Study on survivability for the user.So the present invention increases attack emulation in the mobile Ad Hoc of tradition network (WSN) emulation system and but event of failure emulation is significant aspect mobile Ad Hoc network security and Study on survivability.
Description of drawings
Fig. 1 is the structured flowchart of traditional mobile Ad Hoc network (WSN) emulation system.
But Fig. 2 is the structured flowchart of the present invention towards the mobile Ad Hoc network (WSN) emulation system of survivability.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
Referring to shown in Figure 1, traditional mobile Ad Hoc network (WSN) emulation system includes mobile Ad Hoc Network conf iotag. module 11, configuration file parsing module 12, mobile Ad Hoc network simulation module 21 and collection module 31; Mobile Ad Hoc Network conf iotag. module 11 is used to export the configuration file FILE of mobile Ad Hoc network 11(be called for short configuration file FILE 11) to configuration file parsing module 12; Configuration file parsing module 12 adopts morphology and parsing method to FILE 11Handle, obtain the information enabled instruction M of the information in the mobile Ad Hoc network simulation module 21 of calling 21Mobile Ad Hoc network simulation module 21 is according to information enabled instruction M 21The artificial intelligence S that output Ad Hoc network configuration module 11 is required 21(be called for short network simulation information S 21) to collection module 31; The network simulation information S of 31 pairs of receptions of collection module 21Store and show.
Referring to shown in Figure 2, but for the defective of the emulation that solves the dependent event that lacks the support Study on survivability that exists in traditional mobile Ad Hoc network (WSN) emulation system.The present invention adds information (the network simulation information S that attack configuration module 1, event of failure configuration module 4, attack emulation module 2, event of failure emulation module 3 make that collection module 31 receives 21, attack artificial intelligence S 2, fault simulation information S 3But) more can satisfy demand at mobile Ad Hoc network Study on survivability.
But a kind of mobile Ad Hoc network (WSN) emulation system towards survivability of the present invention includes mobile Ad Hoc Network conf iotag. module 11, configuration file parsing module 12, mobile Ad Hoc network simulation module 21, collection module 31, attack configuration module 1, event of failure configuration module 4, attack emulation module 2 and event of failure emulation module 3;
Mobile Ad Hoc Network conf iotag. module 11 is used to export the configuration file FILE of mobile Ad Hoc network 11(be called for short configuration file FILE 11) to configuration file parsing module 12;
Attack configuration module 1 is according to the attack of user input, and this attack converted to attacks configuration file FILE 1Export to configuration file parsing module 12;
Event of failure configuration module 4 is according to the event of failure of user input, and converts this event of failure to fault configuration file FILE 4Export to configuration file parsing module 12;
Attack emulation module 2 is used to realize that the attack at mobile Ad Hoc network carries out emulation;
Event of failure emulation module 3 is used to realize that the event of failure at mobile Ad Hoc network carries out emulation;
The FILE of 12 pairs of receptions of configuration file parsing module 11Adopt morphology and parsing method to handle, obtain the information enabled instruction M of the information in the mobile Ad Hoc network simulation module 21 of calling 21Export to mobile Ad Hoc network simulation module 21, mobile Ad Hoc network simulation module 21 is according to information enabled instruction M 21Export the required artificial intelligence S of mobile Ad Hoc Network conf iotag. module 11 21(be called for short network simulation information S 21) to collection module 31;
The attack configuration file FILE of 12 pairs of receptions of configuration file parsing module 1Adopt morphology and parsing method to handle, obtain the attack enabled instruction M of information in the attack emulation module 2 2Export to attack emulation module 2; Attack emulation module 2 is received and is attacked enabled instruction M 2Artificial intelligence S is attacked in back output 2Give collection module 31;
The fault configuration file FILE of 12 pairs of receptions of configuration file parsing module 4Adopt morphology and parsing method to handle, obtain the fault initiating command M of information in the event of failure emulation module 3 3Export to event of failure emulation module 3; Event of failure emulation module 3 is received the fault initiating command M 3Back output fault simulation information S 3Give collection module 31;
The network simulation information S of 31 pairs of receptions of collection module 21, attack artificial intelligence S 2, fault simulation information S 3Store and show.
In the present invention, configuration file parsing module 12 adopts morphology and parsing method to see also author (U.S.) John R.Levine, and Tony Mason, Doug Brown write<<lex and yacc〉introduction in (second edition).
In the present invention, attack configuration module 1 is according to the attack of user input, and this attack converted to attacks configuration file FILE 1(file memory format is *.TI).Described attack configuration file FILE 1Form
AttackTime<Time〉the expression attack initiation time,<Time〉be the time number;
AttackTarget<attack_target〉the expression target of attack,<attack_target〉be the IP address of destination node;
Attacktype<attack_type〉the expression attack type,<attack_type〉for attacking title; In the present invention, attacking title has resource consumption to attack attck_A, black hole attack attck_B and signal interference attack attck_C.
Attackparalist<attack_paralist〉parameter list attacked of expression,<attack_paralist〉be according to attacking title<attack_TYPE the attack parameter of coupling, this attack parameter has the rate of giving out a contract for a project paralist_A, duration paralist_B, interference source type paralist_C, interference source rank paralist_D and position of interference source paralist_E.
In the present invention, event of failure configuration module 4 is according to the event of failure of user input, and converts this event of failure to fault configuration file FILE 4(file memory format is *.TI).Described fault configuration file FILE 4Form
Figure A200810239523D0008091952QIETU
FaultTime<Time〉expression fault generation time,<Time〉be the time number;
FaultTarget<fault_target〉expression produces the node of fault,<Fault_target〉for producing the IP addresses of nodes of fault;
Faulttype<fault_type〉the expression fault type,<fault_type〉be the fault title; In the present invention, the fault title has node failure fault_A and link failure fault_B.
Faultparalist<fault_paralist〉expression fault parameter list,<fault_paralist〉be according to fault title<fault_type the coupling fault parameter, this fault parameter has trouble duration paralist_F and barrier position paralist_G.
In the present invention, attack emulation module 2 is used to realize the attack emulation at mobile Ad Hoc network.
Attack emulation module 2 is mainly formed by attacking logic control and attack type database two parts, attack logic control and be meant control attack time AttackTime<Time 〉, attack parameter Attackparalist<attack_paralist, attack kind Attacktype<attack_type by its allotment 〉.The attack type storehouse includes black hole attack, three kinds of resource consumption attack and signal interference attack.Each is attacked class and has all defined the concrete grammar of realizing this attack, and each is attacked class corresponding function interface is provided, and accepts the parameter that the transmission of attack Command Line Parsing module comes, the specific implementation that decision is attacked according to relevant parameters.Can produce black hole attack in this module at present, resource consumption is attacked and the signal interference attack.At first each is attacked to set up and attack tree-model, according to attacking tree-model emulation is carried out in attack then.
The signal interference attack is that the signal interference source passes through the perturbation operation to the reception and the behavior of transmission of radio communication physical layer.The signal interference attack provides two kinds of signal to attack conflicting modes: continuation is attacked and randomness is attacked, and will specify the parameters such as interference radius, interference rank of position, the interference source of type, the interference source of interference source during upper layer module scheduling signals interference attack.The signal interference attack is that the assailant utilizes interference source, the node of being attacked is carried out signal disturb.At first judge which node within the interference range of oneself, according to the intensity of interference source the transmission radius of those nodes within interference range is made amendment then according to the position coordinates and the interference radius of interference source.This paper is made as three grades with the interference strength of attack source, wherein one-level the transmission radius of disturbed node can be suppressed to be zero, secondary the transmission radius of disturbed node can be suppressed for before half, three grades the transmission radius of disturbed node can be suppressed for before 1/4th.And this paper is divided into the lasting interference source that disturbs and the interference source of random disturbances with interference source.The signal transmission radius to disturbed node that the interference source that wherein continues to disturb continues in interfering process disturbs, the random disturbances source then be in interfering process at random interference a period of time, stop a period of time to reach the effect of the disturbed node of fascination.
The essence that resource consumption is attacked is the Denial of Service attack at the mac-layer protocol of node, and function is to allow to be attacked node long-term in running order and reach catabiotic purpose.Upper layer module is called need specify the attacker when resource consumption is attacked, by attacker, the per second parameters such as quantity of giving out a contract for a project, after the attack interface is scheduled, can on attacker's node, binding attack body, under given parameter, be attacked resource consumption and attack by the attack node.The behavior of attacking node is as follows.At first because the attack node must be in being attacked the signal cover of node, at first to judge the positional information of being attacked node so attack node, if own in being attacked the signal cover of node, then sent the RTS packet to reach the purpose that consumes the energy of being attacked node with the packet sending speed that pre-sets and the time of giving out a contract for a project to attacking node.This shows that it is by a large amount of transmission request data package that resource consumption is attacked, and is in the operating state of highly energy-consuming always and reaches the attack purpose and make by the attack node.
Black hole attack be a kind of malicious node claim shortest path that it has a destination node by (minimum leapfrog number) so that can intercept the illegal act of the packet of transmitting by this node.Need give node binding when upper layer module is called black hole attack and move the aodv agreement, and specify this node to have the behavior of black hole attack, behavior in the time of then can changing its agreement operation reaches the effect of black hole attack.Black hole attack allows to be attacked node and has two class behaviors, and at first the packet of all application layers of receiving of node all abandons it.Secondly receive the route requests message RREQ of a network layer when node, will make corresponding behavior, promptly forge routing reply message RREP and give source node, and cause source node that data are sent data to the attack node that this reality does not arrive the destination node path.And when this attack node was received other message of network layer, it is normal response all, so that it can survive in the routed path of other node all the time.
In the present invention, event of failure emulation module 3 is used to realize the event of failure at mobile Ad Hoc network.Wherein comprise node failure and link failure.
Event of failure emulation module 3 mainly is made up of fault logic control and fault type storehouse two parts, fault logic control is control fault time of occurrence FaultTime<Time 〉, all kinds of fault parameter Faultparalist<fault_paralist 〉, by its allotment failure mode Faulttype<fault_type 〉.The fault type storehouse comprises node failure and link failure.Node failure is meant node at random, perhaps owing to the improper factum of closing of reasons such as depleted of energy.Link failure refers to owing to barrier occurs on the two internodal links, and perhaps noise jamming etc. is former thereby make the behavior that influences the transmission of node radius.The random time that the user can specify in simulation process becomes the state of the arbitrary node in the topology closes any a period of time.And the user can dispose the thing of placing obstacles arbitrarily in topology, makes near the transmission radius of the node that barrier is diminish.
Mobile Ad Hoc Network conf iotag. module 11 is used to realize disposing the relevant information of mobile Ad Hoc network, and converts these configuration informations to configuration file FILE automatically 11
In this module, divide view layer, key-course, data Layer and conversion coating.The view layer provides node, the link of mobile Ad Hoc network, the visual configuration interface of application service, and editor is provided the view of these element property.Key-course mainly is responsible for the establishment and the deletion of node and link in the network topology, with and the editor of attribute; The establishment of application service incident and deletion, with and the editor of attribute; Provide newly-built simultaneously, preserve and open the function of network topology.And in data hierarchy, mainly be to be responsible for organizing and storing about the attribute of node and the attribute of link.Conversion layer converts above-mentioned configuration information to the configuration file of describing by certain format.
Command Line Parsing module 12 is used to realize the configuration file of mobile Ad Hoc network and the configuration file FILE1 and the event of failure configuration file FILE4 of attack are resolved, call in mobile Ad Hoc network simulation module 21, attack emulation module 2 and the event of failure emulation module 3 interface function carry out emulation.
Resolving is to use Lex and Yacc to configuration file FILE 11, attack configuration file FILE 1With event of failure configuration file FILE 4Analyze, explain.Detailed process is as follows: at first by the Lex program input file is separated into significant unit (being referred to as sign usually), i.e. morphological analysis (or lexical scan) generates Lexical Analysis Module.Yacc instrument GNU Bison generative grammar analysis module.Yacc has defined some variablees in definition phase, terminal character and nonterminal character; Comprise series of rules (being syntax rule) in the rule section, the part rule can trigger corresponding action; Defined the function that calls in the action in user's routine section.The Yacc program is established the relation between the sign, and the list of rules of the relation that can understand of define program, promptly finishes syntactic analysis.If the action invocation that rule is set out is carried out respective function, so just be called the meaning of one's words explanation or the meaning of one's words and carry out.
Yacc and the lex cardinal principle flow process of finishing the work that cooperatively interacts is: the Yacc program is higher routine, calls lexical analyzer yylex () when the needs input marking.Lexical analyzer one is found the interested mark of Yacc, just returns to Yacc, and marker code is returned as a value.In order to reach above-mentioned requirements, Yacc is defined as C preprocessor name with the token name in the syntactic analyser, is placed among the y.tab.h, so that lexical analyzer uses.After the identification mark, yacc with word be pressed into storehouse and with rule relatively, if mate then stipulations, and trigger corresponding action with a certain rule, shift-in or make mistakes does not match then.
Mobile Ad Hoc network simulation module 21 is to adopt the method for layering according to ICP/IP protocol stack architecture for the basis to realize the emulation of mobile Ad Hoc network.Be followed successively by application layer, transport layer, network layer, MAC layer, physical layer, move mode model and energy consumption model from top to bottom in the mobile Ad Hoc network simulation module 21.Wherein the application layer The Realization of Simulation data transport service of mobile Ad Hoc network.Transport layer emulation has realized Transmission Control Protocol, udp protocol.The network layer The Realization of Simulation AODV agreement and DSR agreement.MAC layer The Realization of Simulation 802.11 agreements.Move mode specifically comprises road point move mode at random, random walk move mode and random direction move mode.Energy consumption model is that the behavior with node is divided into the reception data mode, sends data mode and idle condition, at different state lower nodes with different power consumption energy.The mobile Ad Hoc network simulation environment of the common formation of above-mentioned part.
Collection module 31 is used for the data of simulation process are collected and preserved.
Whether interstitial content, node that collection module 31 collects in the simulation processes the relevant information in the network topology, comprise total node number, take place to lose efficacy are to attack node and residue energy of node or the like information.After emulation finished, the collection module can be carried out computing to the data of gathering in the simulation process, the display part emulated data.Video data comprises: overall simulation time, and total interstitial content, the line node number, the communication event that takes place between node, the attack that takes place between node is on the node and the event of failure that takes place on the link.
Use the present invention, at first the user is by mobile Ad Hoc network of mobile Ad Hoc Network conf iotag. module 11 designs, wherein the user can self-defined topological structure, comprise the number that node is set, the position of node, the Routing Protocol of node binding, the transmission radius of node, the move modes of node etc. can be bound data service then on node.The user is provided with attack and event of failure at mobile Ad Hoc network by attack configuration module 1 and event of failure configuration module 4 in network then.Each configuration file that mobile Ad Hoc Network conf iotag. module 11, attack configuration module 1 and event of failure configuration module 4 are generated, resolve by configuration file parsing module 12, and the interface function that calls in mobile Ad Hoc network simulation module 21, attack emulation module 2 and the event of failure emulation module 3 is carried out emulation.In carrying out simulation process, analogue system can demonstrate simulation process dynamically, and emulation finishes the back and shows relevant data by collection module 31, and data are preserved into destination file.

Claims (5)

1, but a kind of mobile Ad Hoc network (WSN) emulation system towards survivability is characterized in that: include Ad Hoc network configuration module (11), configuration file parsing module (12), mobile Ad Hoc network simulation module (21), collection module (31), attack configuration module (1), event of failure configuration module (4), attack emulation module (2) and event of failure emulation module (3);
Mobile Ad Hoc Network conf iotag. module (11) is used to export the configuration file FILE1 of mobile Ad Hoc network 1Give configuration file parsing module (12);
Attack configuration module (1) is according to the attack of user input, and this attack converted to attacks configuration file FILE 1Export to configuration file parsing module (12);
Event of failure configuration module (4) is according to the event of failure of user input, and converts this event of failure to fault configuration file FILE4 and export to configuration file parsing module (12);
Attack emulation module (2) is used to realize that the attack at mobile Ad Hoc network carries out emulation;
Event of failure emulation module (3) is used to realize that the event of failure at mobile Ad Hoc network carries out emulation;
The FILE1 of configuration file parsing module (12) to receiving 1Adopt morphology and parsing method to handle, obtain to call the information enabled instruction M of information in the mobile Ad Hoc network simulation module (21) 21Export to mobile Ad Hoc network simulation module (21), mobile Ad Hoc network simulation module (21) is according to information enabled instruction M 21Export the required artificial intelligence S of mobile Ad Hoc Network conf iotag. module (11) 21Give collection module (31);
The attack configuration file FILE of configuration file parsing module (12) to receiving 1Adopt morphology and parsing method to handle, obtain the attack enabled instruction M of information in the attack emulation module (2) 2Export to attack emulation module (2); Attack emulation module (2) is received and is attacked enabled instruction M 2Back output is attacked artificial intelligence S2 and is given collection module (31);
The fault configuration file FILE of configuration file parsing module (12) to receiving 4Adopt morphology and parsing method to handle, obtain the fault initiating command M of information in the event of failure emulation module (3) 3Export to event of failure emulation module (3); Event of failure emulation module (3) is received the fault initiating command M 3Back output fault simulation information S3 give collection module (31);
The network simulation information S of collection module (31) to receiving 21, attack artificial intelligence S 2, fault simulation information S 3Store and show.
But 2, the mobile Ad Hoc network (WSN) emulation system towards survivability according to claim 1 is characterized in that: the attack configuration file FILE of attack configuration module (1) output 1Form be AttackTime<Time, AttackTarget<attack_target 〉, Attacktype<attack_type 〉, Attackparalist<attack_paralist〉wherein, AttackTime<Time〉the expression attack initiation time,<Time〉be the time number; AttackTarget<attack_target〉the expression target of attack,<attack_target〉be the IP address of destination node; Attacktype<attack_type〉the expression attack type,<attack_type〉for attacking title, attacking title has resource consumption to attack attck_A, black hole attack attck_B and signal interference attack attck_C; Attackparalist<attack_paralist〉parameter list attacked of expression,<attack_paralist〉be according to attacking title<attack_TYPE the attack parameter of coupling, this attack parameter has the rate of giving out a contract for a project paralist_A, duration paralist_B, interference source type paralist_C, interference source rank paralist_D and position of interference source paralist_E.
But 3, the mobile Ad Hoc network (WSN) emulation system towards survivability according to claim 1 is characterized in that: the fault configuration file FILE of event of failure configuration module (4) output 4Form be FaultTime<Time, FaultTarget<fault_target, Faulttype<Fault_type 〉, Faultparalist, wherein, FaultTime<Time〉expression fault generation time,<Time〉be the time number; FaultTarget<fault_target〉expression produces the node of fault,<Fault_target〉for producing the IP addresses of nodes of fault; Faulttype<fault_type〉the expression fault type,<fault_type〉be the fault title, the fault title has node failure fault_A and link failure fault_B; Faultparalist<fault_paralist〉expression fault parameter list,<fault_paralist〉be according to fault title<fault_type the coupling fault parameter, this fault parameter has trouble duration paralist_F and barrier position paralist_G.
But 4, the mobile Ad Hoc network (WSN) emulation system towards survivability according to claim 1, it is characterized in that: attack emulation module (2) is formed by attacking logic control and attack type database two parts, attack logic control and be meant control attack time AttackTime<Time 〉, attack parameter Attackparalist<attack_paralist, attack kind Attacktype<attack_type by its allotment 〉; The attack type storehouse includes black hole attack, three kinds of resource consumption attack and signal interference attack.
But 5, the mobile Ad Hoc network (WSN) emulation system towards survivability according to claim 1, it is characterized in that: event of failure emulation module (3) is made up of fault logic control and fault type storehouse two parts, fault logic control is control fault time of occurrence FaultTime<Time 〉, all kinds of fault parameter Faultparalist<fault_paralist 〉, by its allotment failure mode Faulttype<fault_type 〉; The fault type storehouse comprises node failure and link failure.
CN200810239523A 2008-12-12 2008-12-12 Mobile Ad Hoc network simulation system oriented to survivability Expired - Fee Related CN100579308C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810239523A CN100579308C (en) 2008-12-12 2008-12-12 Mobile Ad Hoc network simulation system oriented to survivability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810239523A CN100579308C (en) 2008-12-12 2008-12-12 Mobile Ad Hoc network simulation system oriented to survivability

Publications (2)

Publication Number Publication Date
CN101426221A true CN101426221A (en) 2009-05-06
CN100579308C CN100579308C (en) 2010-01-06

Family

ID=40616506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810239523A Expired - Fee Related CN100579308C (en) 2008-12-12 2008-12-12 Mobile Ad Hoc network simulation system oriented to survivability

Country Status (1)

Country Link
CN (1) CN100579308C (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841531A (en) * 2010-03-16 2010-09-22 中国科学院计算技术研究所 Simulating method and system for CDN-P2P (Content Distribution Network-Peer-to-Peer) hybrid network
CN105208592A (en) * 2015-10-31 2015-12-30 武汉米风通信技术有限公司 Simulation method and simulation system for fault protection of communication base station transceiver
CN107086957A (en) * 2017-04-21 2017-08-22 桂林电子科技大学 Ad Hoc Routing Protocol verification methods based on BeagleBone Black
CN107623555A (en) * 2016-07-14 2018-01-23 工业和信息化部电信研究院 A kind of implementation method and device of general purpose communication emulation platform

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841531A (en) * 2010-03-16 2010-09-22 中国科学院计算技术研究所 Simulating method and system for CDN-P2P (Content Distribution Network-Peer-to-Peer) hybrid network
CN101841531B (en) * 2010-03-16 2013-04-03 中国科学院计算技术研究所 Simulating method and system for CDN-P2P (Content Distribution Network-Peer-to-Peer) hybrid network
CN105208592A (en) * 2015-10-31 2015-12-30 武汉米风通信技术有限公司 Simulation method and simulation system for fault protection of communication base station transceiver
CN107623555A (en) * 2016-07-14 2018-01-23 工业和信息化部电信研究院 A kind of implementation method and device of general purpose communication emulation platform
CN107623555B (en) * 2016-07-14 2021-05-14 工业和信息化部电信研究院 Method and device for realizing universal communication simulation platform
CN107086957A (en) * 2017-04-21 2017-08-22 桂林电子科技大学 Ad Hoc Routing Protocol verification methods based on BeagleBone Black

Also Published As

Publication number Publication date
CN100579308C (en) 2010-01-06

Similar Documents

Publication Publication Date Title
Rana et al. A systematic survey on internet of things: Energy efficiency and interoperability perspective
Liu et al. Efficient naming, addressing and profile services in Internet-of-Things sensory environments
CN100561976C (en) Be used to make the method and apparatus of packet based traversal network address conversion equipment
Feldmann Internet clean-slate design: what and why?
Thombre et al. IP based wireless sensor networks: performance analysis using simulations and experiments
CN102447695A (en) Method for identifying key attack path in service system
CN101426221A (en) Mobile Ad Hoc network simulation system oriented to survivability
Khan et al. crSimulator: A discrete simulation model for cognitive radio ad hoc networks in OMNeT++
Adesina et al. A novel cognitive IoT gateway framework: Towards a holistic approach to IoT interoperability
Campanile et al. Performance evaluation of a fog WSN infrastructure for emergency management
CN102104609B (en) Method for analyzing safety defect of network protocol
CN106375271A (en) network application service device and operation method thereof
Li et al. Rsearch of development in wireless sensor network routing protocols based on NS2
Neema et al. SOAMANET: A tool for evaluating service-oriented architectures on mobile ad-hoc networks
Karkazis et al. Resource and service virtualisation in M2M and IoT platforms
Flammini et al. Virtualization technology for LoRaWAN roaming simulation in smart cities
Macia et al. Petri nets‐based model for the analysis of NORIA protocol
CN103347260A (en) Reliable Ad hoc network security routing device
Yamini et al. Theoretical study and analysis of advanced wireless sensor network techniques in Internet of Things (IoT)
Chen et al. Wireless Network Simulation Platform Based on OPNET and Simulink
Yu et al. Intrusion detection system and technology of layered wireless sensor network based on Agent
Wakili et al. AI-enhanced context-aware optimization of RPL routing protocol for IoT environments
Nepali The Secure and Energy Efficient Data Routing in the IoT based Network
Kotenko et al. Agent-based simulation of distributed defense against computer network attacks
SHAMS et al. Building automation (IoT) by WSN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100106

Termination date: 20111212