Method for detecting flooding attack by wireless self-organizing network route query

A wireless self-organization and flooding attack technology, applied in wireless communication, network topology, electrical components, etc., can solve problems such as mistaking attack nodes, multi-route query messages, detection effect dependence, etc.

Inactive Publication Date: 2012-11-21
SHENZHEN ZAXID TECH INDAL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the detection effect of this detection method depends on the set detection threshold: nodes that generate query messages at a rate higher than the set value in any period are considered malicious nodes
The problem at this time is: if the threshold is set too high, it may cause the attack nodes with low flooding frequency to slip through the net; A large number of routing query messages are generated accidentally in a short period of time and are mistaken for attack nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting flooding attack by wireless self-organizing network route query
  • Method for detecting flooding attack by wireless self-organizing network route query
  • Method for detecting flooding attack by wireless self-organizing network route query

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments.

[0025] See Figure 1 ~ Figure 4 , Introduce the detection method of the wireless ad hoc network routing query message flooding attack of the present invention. The method includes the following operation steps:

[0026] Step 1. In a wireless ad hoc network using reactive routing protocols, each node monitors and counts the routing query messages generated by its surrounding nodes (see figure 1 Shown), and listen to each routing query message whether there is a routing reply message: when a routing query source node ( figure 1 , Which is represented by a six-pointed star) generates a routing query message and broadcasts it, the neighboring nodes around it (that is, the one-hop node on the route, figure 1 The middle is represented by a triangle, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting flooding attack by wireless self-organizing network route query, which comprises the following steps: (1) monitoring and counting route query messages produced by nodes around the node by each node and judging whether the route query messages are normal or forged by using a method for monitoring whether each route query message has a route reply message; (2) checking the counting record of the route query messages by each node per se every other set time; and if the quantity of the forged route query messages produced by a certain node around the node is found to reach or exceed a set threshold within the set time, then judging the node to be an attacking node and blacklisting the node; and (3) directly discarding and not forwarding the received route query messages sent by nodes in the blacklist any more by each node. The method only counts the forged messages of the flooding attack, separates out attacking nodes, increases correct detection rate and reduces misinformation rate to prevent the flooding attack.

Description

Technical field [0001] The invention relates to a detection method for ad hoc routing query flooding attack, and to be precise, to a wireless self-organizing network realized by using the routing query and routing reply mechanism in a reactive routing protocol in a wireless self-organizing network Route query flooding attack detection method; belongs to the technical field of data communication network security. Background technique [0002] Wireless self-organizing network is a new type of mobile multi-hop wireless communication network. The network does not rely on any fixed infrastructure and management center, but maintains the mutual cooperation and self-organization between mobile nodes. Connection, while realizing data transfer. Compared with the wired network, the special feature of the wireless ad hoc network is that the network topology may change in real time, which is difficult to determine in advance, which causes the traditional wired network routing query and rout...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/00H04W40/28H04W84/18
Inventor 易平邹岩陈春燕陈树鑫
Owner SHENZHEN ZAXID TECH INDAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products