Invasion detection method of radio self-organization network

A technology of network intrusion detection and wireless self-organization, which is applied in the field of network security, can solve problems such as undetermined detection and achieve the effect of reducing consumption

Inactive Publication Date: 2009-01-07
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, most of the current papers on wireless ad hoc network intrusion detection only provide a framework, and how to realize the detection has not yet been determined.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invasion detection method of radio self-organization network
  • Invasion detection method of radio self-organization network
  • Invasion detection method of radio self-organization network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0026] This embodiment includes the following steps:

[0027] Step 1. Intrusion detection based on distributed cooperation of cluster heads: In wireless ad hoc networks, the resources of nodes are very limited, so the entire ad hoc network is divided into several areas, and each area is selected by a free competitive election method. A cluster head is set up as a monitoring node to be responsible for intrusion detection in the entire area. The cluster head collects the behavior information of the nodes in the entire area, and analyzes it according to the finite state ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A wireless self-organized network intrusion detection method belongs to the technical field of network security, which comprises the following steps: step one, in a wireless self-organized network, the whole self-organized network is divided into a plurality of areas, and a cluster head is chosen in each area as a monitoring node in charge of the intrusion detection of the whole area, and the cluster head is used for collecting the behavior information of the nodes in the whole area; step two, the routing protocols of the wireless self-organized network are formed into a finite state machine which is then used for judging the behavior of each node in the wireless self-organized network collected by the cluster head in step one, and if the behavior of the node is not complied with the behavior of the finite state machine, the behavior of the node is regarded as an aggressive behavior, otherwise, the finite state machine enters the final state. The method of the invention is distributed cooperation intrusion detection, which requires no data training in advance and can detect intrusion behavior in real time.

Description

technical field [0001] The invention relates to an intrusion detection method in the technical field of network security, in particular to a wireless ad hoc network intrusion detection method. Background technique [0002] As a new type of mobile multi-hop wireless network, wireless ad hoc network has many different characteristics from traditional wireless networks. It does not depend on any fixed infrastructure and management center, but maintains the connection of the network and realizes the transmission of data through mutual cooperation and self-organization among mobile nodes. Compared with fixed wired networks, wireless ad hoc networks face more security threats. In order to ensure the security of wireless ad hoc networks, many security solutions have been proposed so far. But these security schemes mainly focus on key distribution and authentication, and routing security algorithms. These measures are used in wireless ad hoc networks and can play a certain role i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L12/28
Inventor 易平吴越柳宁张帅李建华
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products