Method for detecting black hole attack in wireless ad hoc network
A technology of wireless self-organization and black hole attack, which is applied in the field of network security, can solve problems such as uncertainty and uncertainty, and achieve the effect of good promotion and application prospects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0017] see figure 1 , introduce the mechanism of the method of the present invention: when a certain node (or router) A wants to send a data packet to another node B which is not a destination node, the node B will forward the data packet according to the routing information. Because the signal propagation in the wireless network is omnidirectional, the data packet forwarded by node B must also be received by node A. Therefore, node A can monitor the wireless network. When node B forwards the data packet to node A C, as its neighbor node A can still listen to the forwarded data packets, so it can be judged whether the node B is a black hole node by checking whether the node B forwards the data packets. If Node B does not forward data packets for a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com