A method and device for enhancing Ad hoc network security and cooperation mechanism

A network security and mechanism technology, applied in the field of communication security, can solve the problems of intolerance of unintentional errors of nodes, incentivized node enthusiasm, heavy burden on nodes, etc., to reduce communication traffic and computational overhead, avoid denial of service attacks, and reduce system complexity. Effect

Inactive Publication Date: 2010-08-04
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method does not require hardware support, but the algorithm is complex and the burden on nodes is relatively heavy, which cannot really motivate nodes to participate in the network.
[0008] As for the punishment of uncooperative nodes, initially they simply bypassed bad nodes and did not take corresponding punishment measures; CONFIDANT(Cooperation Of Nodes: Fairness InDynamic Ad- hoc NeTworks) and CORE (COllaborative REputation mechanism) have adopted only punishment but no reward, non-cooperative nodes will be permanently excluded from the network, and unintentional errors of nodes cannot be tolerated; OCEAN (Observation-based Cooperation Enforcement in Ad hoc Networks) and LARS (Locally Aware Reputation System) adopts the second chance mechanism, which can tolerate unintentional node errors, but brings repeated node attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for enhancing Ad hoc network security and cooperation mechanism
  • A method and device for enhancing Ad hoc network security and cooperation mechanism
  • A method and device for enhancing Ad hoc network security and cooperation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The method for enhancing Ad hoc network security and cooperation mechanism and the device for realizing the method of the present invention will be described in detail below with reference to the accompanying drawings.

[0033] 1. Reference model

[0034] figure 1It is the reference model of the method for enhancing Ad hoc network security and cooperation mechanism of the present invention. It is a reference model for the reward mechanism based on micropayment, which is a kind of small electronic payment. In the Ad hoc network, nodes correspond to entities in the reference model, and nodes play different roles at different times to complete corresponding tasks in the model. The entities in the model are described as follows:

[0035] 1) Broker: The main task of a node in the identity of a broker is to monitor the behavior of its neighbor nodes, record its reputation value and be responsible for issuing tickets.

[0036] 2) Buyer: The main task of a node as a buyer i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is to provide a method to enhance Ad hoc net security and cooperation mechanism. The method comprises the following stages: an initializing stage which is used to distribute a pair of keys and set initial reputation values for new nodes jointing in the net; a note request stage which is used to send a note request to a neighboring node broadcast when the current note of the node cannot pay for the activity transaction; an identity investigation stage which is used for the neighboring node to monitor the behavior of the node, evaluate the different behaviors, calculate the localreputation value and divide the nodes into credible and incredible ones according to the reputation value; a note management stage which is used for the neighboring node to firstly search the node reputation value in a respective reputation table thereof when receiving the node note request and to issue a plurality of notes to the requesting node if the node reputation value is above the threshold value, wherein, in the activity, the node note would have corresponding changes and updates according to the requirement; and a routing and data transferring stage which is used to select routing according to the node reputation.

Description

technical field [0001] The invention belongs to the technical field of communication security, in particular, it is a method for enhancing Ad hoc network security and cooperation mechanism. Background technique [0002] The wireless Ad hoc network is formed by a group of autonomous wireless nodes or terminals cooperating with each other, independent of the fixed infrastructure, and adopts a distributed management network. The Ad hoc network is considered to be the most promising terminal network to be adopted in the solution of the next generation mobile communication system, and it is one of the core components of the future mobile communication technology. [0003] The cooperation of nodes in Ad hoc network is a very important issue. On the one hand, due to the limited transmission distance of nodes, communication between two nodes that are not within the signal coverage of each other can only be completed through the cooperation of intermediate nodes. Each node in Ad ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/56H04L12/26H04L12/24
Inventor 黄本雄戴彬黄辰涂来王素芳王芙蓉
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products