Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A black hole attack detection method in clustered self-organizing network

A self-organizing network, black hole attack technology, applied in network topology, electrical components, wireless communication and other directions, can solve problems such as less research on mutual cooperation and cooperation, not considering multiple malicious nodes, and difficult to effectively overcome, etc. The effect of defense and treatment

Inactive Publication Date: 2017-08-08
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, some researchers have proposed solutions to different black hole problems, such as redundant routing method, node credit measurement method, Watchdog method, downstream neighbor node verification method, etc., but these technical methods are based on a single malicious node. , without taking into account the existence of multiple malicious nodes
[0005] There are few studies on the mutual cooperation between multiple malicious nodes. It is known that an adjustable downstream neighbor node cyclic verification method is proposed by combining the prohibition of intermediate nodes from responding to RREQ packets and the verification method of downstream neighbor nodes. Source: the node in this method The authenticity of the source information is judged by checking the adjacent nodes of the node to be verified, and the recursive multi-hop verification is used to prevent collusion attacks. In order not to fall into the infinite loop verification, an adjustable parameter variable verification parameter is introduced, and the It is very difficult to determine the parameters, so this method is also difficult to effectively overcome the situation that there are multiple malicious nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A black hole attack detection method in clustered self-organizing network
  • A black hole attack detection method in clustered self-organizing network
  • A black hole attack detection method in clustered self-organizing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0045] Such as figure 1 As shown, the self-organizing network includes one or more base stations 1, and each base station 1 has one or more cluster head areas within the coverage area. The figure shows the first cluster head area 2, the second cluster head area 3 and In the third cluster head area 4, there is one cluster head node and one or more terminal nodes in the cluster head area. For example, the first cluster head area 2 includes terminal node 11 to terminal node 1n, a total of n terminal nodes.

[0046] Such as figure 2 As shown, a black hole attack detection method in a clustered self-organizing network according to the present invention, the method comprises the following steps:

[0047] Step 1: Instal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting black hole attacks in a clustered self-organizing network. The method includes the following steps: Step 1: Install a monitoring device at a base station; Step 2: All clusters in the self-organizing network within the coverage of the base station The head area is monitored in real time; step 3: judge whether there is an abnormal cluster head area in the monitored area, if there is, enter step 4, otherwise return to step 2; step 4: detect the credit level of the terminal node in the abnormal cluster head area, Find suspicious nodes to form a set of suspicious nodes S1; step 5: detect the flow difference of nodes in S1, and find out black hole attack nodes to form a set S2 of black hole attack nodes; step 6: the monitoring device issues an early warning prompt. This method can not only solve the attack of a single malicious node, but also effectively solve the problem that multiple malicious nodes cooperate with each other to attack, and can issue an alarm, which is conducive to timely defense and processing of black hole attacks.

Description

technical field [0001] The invention relates to a detection method of a black hole attack in an ad hoc network, belonging to the field of wireless sensor network security. Background technique [0002] Ad hoc network is a multi-hop temporary autonomous system composed of a group of mobile nodes with wireless transceivers. It can realize the automatic organization and operation of the network with any mesh topology without relying on any preset infrastructure, and can be widely used in military tactical communication, emergency communication and other communication occasions that require rapid deployment and dynamic networking. , is a research field with great practical application value. [0003] However, due to the characteristics of open media, dynamic topology, distributed collaboration and limited capacity, ad hoc networks are vulnerable to attacks, especially for their routing protocols. "Black hole" is one of the common attack methods. It obtains the control of netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W84/18H04W12/122
Inventor 翟立东张方娇朱宇佳任云龙
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products