Target attack and defense method specific to optimized link state routing protocol

A link state and routing protocol technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as destroying integrity, providing error messages, and affecting network topology, achieving highly targeted effects

Inactive Publication Date: 2012-05-09
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when a node fails or a malicious node attacks the network, it will provide wrong information, thereby destroying the integrity and affecting the generation of the network topology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target attack and defense method specific to optimized link state routing protocol
  • Target attack and defense method specific to optimized link state routing protocol
  • Target attack and defense method specific to optimized link state routing protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] - Attack method steps

[0046] Step 1) Implant malicious nodes in the network, do not launch malicious attacks at the beginning, only eavesdrop on relevant routing information,

[0047] Step 2) Send attack command, start malicious attack, malicious node receives the topology control message that source node A produces, i.e. TC message, records the sequence number of this TC message, i.e. ANSN,

[0048] Step 3) On the basis of step 2), the malicious node resends a new topology control message, the source address is still set as the initial source address, and the new serial number is to add 5 to the original serial number, namely ANSN 新 =ANSN 旧 +5,

[0049]Step 4) In the optimal link state routing protocol, the node will ignore the TC message sent by the source node A for a subsequent period of time,

[0050] Step 5) set a timer, and take the operation of step 3) every 5s;

[0051] Two detection method steps

[0052] Step 2 1) In the topology discovery within the O...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A target attack and defense method specific to optimized link state routing protocol relates to a defense method against attack to the optimized link state routing protocol in Ad Hoc network; the OLSR protocol is a typical routing protocol in the Ad Hoc network, which enjoys wide application in the Ad Hoc network. By studying loopholes of the protocol, the problems of the routing protocol in the Ad Hoc network cane be understood intuitively. The attack proposed in the method is exactly based on the typical weak point that Ad Hoc network information is easily exposed. The defense mechanism of the method is formed by studying the characteristics of the OLSR protocol and analyzing topology discovery and routing construction rules in details; with the OLSR protocol of the defense mechanism added, TC information tampering can be detected easily, as a result, the defense mechanism can not only defend against the ANSN attack proposed in the invention but also prevent others attacks attempting to temper with TC information serial number in a certain sense, thus strengthening safety of the Ad Hoc network.

Description

technical field [0001] The invention relates to a defense method against an optimal link state routing protocol attack in an Ad Hoc network, and belongs to the intersecting field of computer networks and wireless communications. Background technique [0002] With the emergence of new technologies and the need for flexibility and simplicity in the work environment, the use of mobile wireless networks is growing rapidly. Since the Ad Hoc network has the characteristics of no infrastructure requirements, fragile links between nodes, dynamic changes in topology, lack of identity authentication, and openness of wireless channels, its routing protocols face more security issues than traditional networks. [0003] OLSR (Optimized Link State Routing Protocol, OLSR routing protocol for short) is a table-driven link state routing protocol proposed by the IETF MANET (Mobile Ad Hoc Network) working group. Nodes need to periodically exchange various control information, and update and b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/36H04L29/06
Inventor 王汝传陈国伟孙力娟黄海平赵传信祝世雄王文胜康荣保
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products