Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-lies attack comprehensive trust value estimation method

A technology of trust value and lie, applied in the field of information security, can solve the problems of affecting computing, affecting communication security, unable to judge the credibility of the recommended trust value, etc., to achieve the effect of reducing harm

Active Publication Date: 2012-08-29
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the above methods all have the following technical problems: 1) The idea adopted is to use the historical behavior of the recommender to judge the credibility of the recommended trust value provided by the recommender, and the recommended trust value cannot be judged by the recommended trust value itself. Credibility
2) When the recommender's historical behavior records are very good, but a bad recommendation trust value is provided, that is, when a lie attack is implemented, it is impossible to distinguish which nodes' recommendation trust values ​​are credible and which are not.
As a result, the calculation of the comprehensive trust value of the source node to the target node is affected, and the best routing information cannot be obtained, which affects communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-lies attack comprehensive trust value estimation method
  • Anti-lies attack comprehensive trust value estimation method
  • Anti-lies attack comprehensive trust value estimation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0030] The present invention is an anti-lie attack comprehensive trust value evaluation method, such as figure 2 As shown, the specific steps are as follows:

[0031] Step 1: Before networking, test the packet forwarding delay. In the case of only two nodes A and B, node B moves randomly within the broadcast radius of node A, and the test broadcasts the data packet DB from node A. After receiving the DB, node B immediately broadcasts the DB, and then receives it again at node A. The elapsed time to DB, the present invention refers to this time as forwarding packet delay. And after many experiments, an average value T of forwarding packet delay is obtained. 0 .

[0032] Step 2: Obtain the direct trust value of each single-hop neighbor node communicating with it. After a communication cycle, the source node obtains the direct trust value o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information safety, and in particular relates to a trust value estimation method in a mobile ad-hoc network (MANET). The method comprises the following steps of: first, giving a method for determining a threshold for judging whether a node is trustworthy; then, determining a presenter set according to the threshold; and finally, giving a model for calculating a trust value. The method can resist lies attack about the trust value of the node; and the trust relationship between a source node and a target node can be reflected actually by the trustvalue calculated by the method discloses by the invention.

Description

technical field [0001] The present invention relates to a comprehensive new trust value evaluation method against lie attacks, specifically a calculation method based on MANET (Mobile Ad-hoc network, mobile ad hoc network) comprehensive trust value in an open network environment, mainly The invention is used to solve the problem of lie attack existing in trust routing, and belongs to the technical field of information security. Background technique [0002] MANET network is a wireless network without infrastructure, and its network topology changes randomly. Because it is a distributed structure, network nodes have routing functions, and it can adapt to some places such as battlefields and disaster sites. The more security problems it has more and more people's attention. However, because it is a wireless communication, and the network topology changes randomly, many security mechanisms suitable for wired networks are no longer applicable to MANET, and its communication sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W24/00
Inventor 刘建伟刘建华郑志明毛剑修春娣尚涛
Owner BEIHANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More