An Ad hoc network invasion detecting method and system based on trust model

A network intrusion detection and trust model technology, applied in the field of communication security, can solve problems such as one-sided evaluation of nodes, malicious nodes, and difficulties in intrusion detection, achieving good stability and security, low false alarm rate and false alarm rate, and good The effect of scalability

Inactive Publication Date: 2008-07-09
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Ad hoc networks use multi-hop wireless channels. Attackers can easily eavesdrop, counterfeit, tamper and replay information transmitted on the network through wireless links, and implement denial of service attacks at the link layer. These attacks are difficult to detect and track
[0004] 2. Network nodes lack physical protection and routing infrastructure
[0012] (2) The trust relationship between nodes changes frequently, so it is required that the security measures of the Ad hoc network should also be dynamic, and the static configuration scheme adopted by the traditional network is no longer applicable to the Ad hoc network;
[0013] (3) Difficulty in intrusion detection
Wrong routing information may be caused by topology changes or intruders. In addition, it is very difficult to track a specific node in a large-scale mobile Ad hoc network.
[0014] 4. Limited resources
In the existing Ad hoc network intrusion detection systems, there is still a problem that often only a single piece of evidence is considered to prove whether a node is a malicious node, for example, whether the data transmission between nodes is successful, if it is not successful, it means The node is malicious, which will cause one-sided evaluation of the node and cause false alarms
[0021] In general, the current intrusion detection technology is not a very mature technology, and there are still the following problems: 1) the contradiction between false positives and false negatives; 2) the contradiction between privacy and security; 3) passive analysis and active discovery 4) The contradiction between massive information and analysis cost; 5) The contradiction between functionality and manageability; 6) The contradiction between a single product and complex network applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Ad hoc network invasion detecting method and system based on trust model
  • An Ad hoc network invasion detecting method and system based on trust model
  • An Ad hoc network invasion detecting method and system based on trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Relevant technical content and detailed description of the present invention, now cooperate accompanying drawing to explain as follows:

[0063] The present invention provides an Ad hoc network intrusion detection method based on a trust model, which detects several known types of attack behaviors through the means of node self-observation and mutual notification, and obtains a comprehensive evaluation of the node—trust value, so that Nodes in the network bypass possible malicious nodes when routing.

[0064] The present invention provides a method for detecting malicious nodes by way of "evidence chain". When the trust value of a node is lower than a certain threshold, other nodes will refuse to provide services to it, thereby excluding malicious nodes from the network. The invention compares the behavior of the node with a series of typical behaviors of malicious nodes specified in advance to obtain a local evaluation of the node. In addition, in order to avoid the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a detection method for the Ad hoc network intrusion based on a trust model and comprises the following steps that the first step is that a local node detects network behaviors of a detected node, gets and records a trust value of the detected node in a trust table by comparing the network behaviors with typical malicious behaviors; the second step is that the local node gets the trust value of the detected node recommended by a neighboring node; the third step is to obtain the ultimate trust value of the node by integrating the locally calculated trust value and the recommended trust value returned by all the trust neighboring nodes and to judge whether the nodes are malicious nodes by inquiring the trust value ranges of the trust nodes. The invention has the advantages that the invention is simple in model and can detect malicious nodes early without great effect on the system performance; with the consideration of the effect of the surrounding nodes on the ultimate trust values of the nodes, the invention is smaller in false alarm ration and plays a good protection role on the stability and safety of the networks and has good expandability.

Description

technical field [0001] The invention belongs to the field of communication security and relates to a method for detecting malicious nodes in an Ad hoc network, in particular to a trust model-based Ad hoc network intrusion detection method and system. Background technique [0002] The wireless Ad hoc network is a multi-hop temporary autonomous system composed of a group of mobile terminals with wireless transceiver devices. The deployment or deployment of the network does not need to rely on any preset network infrastructure and centralized organization and management. An independent network can be formed quickly and automatically. Since the wireless signal transmission range of each node is limited, two nodes that are not within each other's signal coverage need to forward messages through multiple intermediate nodes to achieve communication, so each node in the Ad hoc network is both a terminal and a routing and forwarding function. However, the characteristics of the mobi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 王芙蓉黄辰赵婧黄本雄王非涂来
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products