Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting black hole attack in wireless ad hoc network

A technology of wireless self-organization and black hole attack, which is applied in the field of network security, can solve problems such as uncertainty and uncertainty, and achieve the effect of good promotion and application prospects

Inactive Publication Date: 2010-11-24
SHENZHEN ZAXID TECH INDAL
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the two papers of the above-mentioned prior art provide an idea for implementing black hole attack detection, many details or specific methods for actually implementing the detection are not determined in these two papers.
That is to say, at present, most papers on the black hole detection technology of wireless ad hoc networks only provide a framework or idea, and the technical means of how to realize the detection have not yet been determined.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting black hole attack in wireless ad hoc network
  • Method for detecting black hole attack in wireless ad hoc network
  • Method for detecting black hole attack in wireless ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0017] see figure 1 , introduce the mechanism of the method of the present invention: when a certain node (or router) A wants to send a data packet to another node B which is not a destination node, the node B will forward the data packet according to the routing information. Because the signal propagation in the wireless network is omnidirectional, the data packet forwarded by node B must also be received by node A. Therefore, node A can monitor the wireless network. When node B forwards the data packet to node A C, as its neighbor node A can still listen to the forwarded data packets, so it can be judged whether the node B is a black hole node by checking whether the node B forwards the data packets. If Node B does not forward data packets for a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a black hole attack in a wireless ad hoc network. The method for detecting the black hole attack is respectively carried out at each node of the network independently, and comprises the following steps of: detecting behaviors of neighbor nodes in a one-hop range of a wireless signal effective transmission distance of the node, namely collecting and analyzing the behaviors of the neighbor nodes around the node; performing analysis and statistics on the behaviors of the neighbor nodes, wherein if the statistic data of a certain neighbor node is discovered to be abnormal, the neighbor node is considered to be the black hole attacked node; and once the black hole attacked node is detected, listing the black hole attacked node in a blacklist, broadcasting the black hole attacked node, and isolating the attacked node to reduce the loss due to the black hole attack to the minimum. The invention originally provides a concrete method for detecting the black hole attacked node, and the method can reduce the attack caused loss to the minimum by taking precautionary measures immediately after the black hole attacked node is detected.

Description

technical field [0001] The invention relates to a method for detecting a black hole attack in a wireless self-organizing network, and belongs to the technical field of network security. Background technique [0002] The wireless ad hoc network is a wireless mobile multi-hop communication network, which has many different characteristics from the traditional wireless communication network: the network does not depend on any fixed infrastructure and management center, but through the cooperation between mobile nodes and Self-organization to maintain the connection between the nodes in the network, while realizing the transfer of data. Compared with the wired network, the special feature of the wireless self-organizing network is that it faces more security threats. Utilizing the essential characteristics of wireless ad hoc networks sharing wireless media, it is possible for external attackers to pretend to be legitimate nodes (Masquerade) to intercept routing information (Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W84/18H04W12/08H04W12/122
Inventor 易平王翔宇陈春燕陈树鑫
Owner SHENZHEN ZAXID TECH INDAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products