Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense Method of Routing Query Flooding Attack in Ad Hoc Networks

A wireless ad hoc network and flood attack technology, which is applied in the defense of route query flood attacks in wireless ad hoc networks. Query flood attack, easy to deploy effect

Inactive Publication Date: 2015-11-25
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the method disclosed in this patent technology is that this method only detects neighbor nodes, and cannot defend against low-rate routing query flood attacks jointly initiated by multiple nodes
The disadvantage of this patented technology is that this method requires a node that can obtain the behavior information of all nodes in the network to perform detection operations, and the distribution characteristics of the wireless ad hoc network make it difficult to deploy this method in the wireless ad hoc network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense Method of Routing Query Flooding Attack in Ad Hoc Networks
  • Defense Method of Routing Query Flooding Attack in Ad Hoc Networks
  • Defense Method of Routing Query Flooding Attack in Ad Hoc Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings.

[0029] In a general on-demand routing protocol, data packets and routing control packets (including routing query packets, routing reply packets, etc.) share a first-in first-out FIFO buffer area, and routing control packets have a higher priority. In the method of the present invention, the node needs to establish an independent priority-based buffer area for routing query messages, and take out routing query messages from the buffer area at a set rate for processing.

[0030] Attached below figure 1 The specific steps of the present invention are further described as follows.

[0031] Step 1, cache the route query message.

[0032] After the node receives the routing query message, it will first put the routing query message into the routing query cache.

[0033] For caching steps, refer to the attached figure 2 ,details as follows:

[0034] In the first step, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defending method of wireless ad hoc network routing inquiry flooding attacks. The defending method includes that (1), nodes buffer routing inquiry messages according to priority, (2), the routing inquiry messages are abandoned according to a message abandoning method when a routing inquiry buffering area is full, (3), according to the priority sequence, the nodes abstract the routing inquiry messages from the outing inquiry buffering area to process, (4), the nodes calculate the priority of adjacent nodes at a set interval, and (5), the nodes update priority monitoring sheets. With the defending method of the wireless ad hoc network routing inquiry flooding attacks, each node is utilized to monitor adjacent nodes and manage the buffering area in Internet, and multi-node allied low-bitrate routing inquiry blooding attacks can be effectively defended; the defending method can well adapt to distribution characteristics of the wireless ad hoc network can be adapted well, and is easy to deploy.

Description

technical field [0001] The invention belongs to the technical field of computers, and further relates to a method for defending against routing query flood attacks in a wireless ad hoc network in the technical field of network information security. The invention can be used in the wireless ad hoc network adopting the on-demand routing protocol, and effectively defends against routing query flood attacks by using the priority-based cache area management technology. Background technique [0002] Ad hoc networks are vulnerable to attacks due to their multi-hop communication, dynamic topology, and wireless channels, and most of their network protocols do not consider security issues at all. Therefore, more and more researchers have begun to pay attention to the secure routing of this type of network. Among many attack methods, internal attacks initiated by some malicious nodes with legitimate identities are difficult to detect and prevent. Among them, the routing query flood at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/04H04W12/122
Inventor 张睿马建峰姜奇李金库杨超李申杨力张俊伟吴莉莉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products