Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network

A wormhole and routing technology, applied in the field of information security, can solve the problem of packet loss of special guard nodes and attack nodes

Active Publication Date: 2011-04-27
BEIHANG UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (3) Too strict assumptions such as special g

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network
  • Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network
  • Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] See figure 1, It is a schematic diagram of the Ad hoc network wormhole attack topology of the present invention;

[0051] See figure 2, It is the overall schematic flow chart of the present invention

[0052] The wormhole attack defense method based on multi-path routing and trust mechanism in the Ad hoc network of the present invention, the specific steps of the method are as follows:

[0053] Step 1: The node establishes multiple paths to the destination node.

[0054]First of all, it is pointed out that for a node N, multipath means that different paths pass through different next-hop neighbor nodes. If a neighbor node has multiple paths to reach the destination node, the node N calculates these paths into one

[0055] If a node reaches the destination node, the number of different paths of the next hop is less than the threshold value. Then send a routing request message, and save all paths with different next hops in the routing table.

[0056] Step 2: The n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wormhole attack defense method based on multipath routing and a trust mechanism in an Ad hoc network, belonging to the technical field of information safety. The wormhole attack defense method comprises three steps: step 1, establishing multiple paths to destination nodes; step 2, calculating the trust value of each neighbor node of the nodes; and step 3, selecting routing according to the probability of the magnitude of the trust values. The safety problem is the key factor influencing the application and popularization of the Ad hoc network, and because the wormhole attack defense method does not need additional equipment such as a directional antenna, a global positioning system (GPS), special radio-frequency, an ultrasonic device and the like, does not need precise time information and nodal position information, and does not need overstrict assumption such as that a special guard node and an attack node have to lose packets and the like, the wormhole attack defense method has superior universality; and because a punishment mechanism is adopted for packet loss, the method also can resist black hole attack and grey hole attack. The wormhole attack defense method has better practical value and wide application prospects in the technical field of information safety.

Description

technical field [0001] The present invention relates to a wormhole attack defense method based on multi-path routing and a trust mechanism in an Ad hoc network, which is a calculation method and a routing selection method based on a neighbor node trust value of an Ad hoc network in an open network environment, mainly The invention is used for the problem of wormhole attack existing in the Ad hoc network, and belongs to the technical field of information security. Background technique [0002] The security problem is a key factor affecting the application and popularization of Ad hoc network, and it is one of the very important research hotspots in recent years. Due to the inherent nature of the Ad hoc network itself, such as dynamic topology, limited resources (CPU, memory, bandwidth and energy, etc.), mobile nodes and wireless communication, the enemy can launch various attacks such as packet loss attacks and sybil attacks. , wormhole attack, routing deception, lie attack,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04W40/02H04W84/18H04L45/02
Inventor 刘建伟邱修峰郑志明毛剑修春娣尚涛
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products