Method for implementing IP credible route based on fault-tolerance and invade-tolerance

An implementation method and technology of trusted paths, applied in the field of communication, can solve the problems of insufficient sharing of node trust information and no decision module definition.

Inactive Publication Date: 2009-01-28
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages are: (1) It assumes that the watchdog mechanism only monitors adjacent nodes, which greatly simplifies the design of the watchdog mechanism, but it does not fully share the trust information between nodes
Therefore, the interaction of trust values, that is, the implementation algorith

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing IP credible route based on fault-tolerance and invade-tolerance
  • Method for implementing IP credible route based on fault-tolerance and invade-tolerance
  • Method for implementing IP credible route based on fault-tolerance and invade-tolerance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The present invention will be further described below in conjunction with the accompanying drawings and examples.

[0076] Aiming at the defects of RFSN design in the implementation of trusted routing, the present invention proposes a corresponding improvement scheme: a method for implementing IP trusted routing based on fault tolerance and intrusion, that is, a secure routing based on trust relationship Strategy. figure 1 The schematic diagram of network node trust monitoring and acquisition functions shown is the core mechanism of the present invention to acquire trust values. The trusted routing implementation method proposed in the invention is applicable to the IP network environment in a general sense, and can detect abnormal network behaviors such as: bad-mouth attacks, conflicting behavior attacks, on-off Attacks and node failures are fault-tolerant and intrusion-tolerant.

[0077] The core design idea of ​​the technical solution of the present invention is as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing an IP credible route based on fault tolerance and intrusion tolerance, comprising the following steps: (1) when a data packet is transmitted to a node, the node is taken as a transmitting node which selects a receiving node to deliver the data packet, and then the receiving node carries out detection through trust detection and a trust extension route table; if the detection fails, the data packet delivery fails and step (2) is carried out; if the detection succeeds, the receiving node receives the data packet and a route is established successfully; and (2) routing recovery for the data packet which can not be delivered successfully is carried out. The realization process of the IP route is safe and credible; when a network encounters vicious attacks or breaks down, communication can be recovered quickly on the premise of minimum resource consumption; moreover, the method can eliminate damages to a network route caused by decrial attacks, two-faced behavior attacks, intermittent attacks and node failures, and has better fault-tolerant and intrusion-tolerant capability.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a fault-tolerant and intrusion-tolerant IP trusted routing implementation method. Background technique [0002] With the continuous development of computer network technology and the wide application of network, more and more attention has been paid to the security issues in network communication. People hope that the network can still provide normal services even when it fails or suffers malicious attacks such as viruses. Among them, the implementation method of trusted routing in IP network has also become a hotspot of extensive research. Trusted routing is an important idea in secure routing. It draws on the trust relationship in the human social network and applies it to the communication field to establish a "trust relationship" between routers. Whether it is their own errors or malicious behaviors, whether they use "trust" to decide whether to "communicate" with th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L1/16H04L12/26H04L29/06H04L45/28
Inventor 曾婧杰阳小龙隆克平
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products