Method for construction of network trust topology based on reliable loop

A construction method and credible technology, applied in the field of computer networks, can solve problems such as limited resource network collapse, increased packet loss rate, and reduced network performance, achieving high scalability and portability, increasing network throughput, The effect of suppressing the packet loss rate

Inactive Publication Date: 2012-11-21
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to their limited energy, nodes in wireless ad hoc networks are inevitably selfish, and may stop forwarding data in order to save their own resources, resulting in increased packet loss rates and reduced network performance; and the routing information in the network It may be used by attackers to distribute false routing information or a large number of useless data packets, thereby causing the collapse of this limited resource network
Based on the above problems, many trust mechanisms have been introduced into the ad-hoc network, but these methods are all aimed at specific routing protocols, and certain rules are set in the specific protocol to calculate the trust value and determine the route between the source node and the destination node. Whether the path is trustworthy or not, the routing algorithm is not only responsible for routing selection, but also responsible for trust calculation. This type of trusted routing method needs to consider the specific routing protocol in the network, and modify it according to the routing protocol, which leads to the inconsistency of the trusted routing method. Flexibility and poor scalability, and the routing protocol needs to be responsible for the selection and calculation of trust, which will also reduce the efficiency of the routing method to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for construction of network trust topology based on reliable loop
  • Method for construction of network trust topology based on reliable loop
  • Method for construction of network trust topology based on reliable loop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] First, the trustworthiness is introduced: trustworthiness is a quantitative representation of trust. According to the node object, the trust value can be divided into direct trust value and indirect trust value. The direct trust value is the trust value between neighbor nodes, which is obtained through direct observation and calculation of neighbor nodes; the indirect trust value is the trust value between non-neighbor nodes, which needs to be calculated through a certain trust model. The network trust topology in the present invention generates The algorithm only needs to use the direct trust value and the link trust value. The direct trust value t of a node in the link is estimated by its upstream node's trust in completing a specific behavior of the node, and the calculation method is as follows:

[0015] t = μ ( a , b ) = a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for construction of a network trust topology based on a reliable loop. In the method, a reliable triangular loop is constructed for each node in a network, the whole reliable triangular loop is viewed as a node of a larger reliable triangular loop, a reliable triangular loop of a largest scale is recursively constructed and is connected with a node set which is not communicated to generate a reliable topology, and a routing protocol can run on the topological structure. The invention can be used for finding an appropriate reliable path, thereby inhibiting the packet loss rate, improving the forward rate, enlarging the network throughput, and effectively resisting against various attacks. More importantly, the invention can be independent of the specific routing algorithm, and has high scalability and portability.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a trust loop-based network trust topology construction method. Background technique [0002] The Ad hoc routing protocol is not absolutely safe, and its routing algorithm is based on the assumption that all nodes cooperate with each other to complete the transmission of network data. However, due to their limited energy, nodes in wireless ad hoc networks are inevitably selfish, and may stop forwarding data in order to save their own resources, resulting in increased packet loss rates and reduced network performance; and the routing information in the network It may be used by attackers to distribute false routing information or a large number of useless data packets, thereby causing the collapse of this limited resource network. Based on the above problems, many trust mechanisms have been introduced into the ad-hoc network, but these methods are all aimed at specific r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/42H04L12/56H04L45/02
Inventor 喻莉刘祖浩程伟熊飞王珂
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products