Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security routing method for ad hoc network based on trust mechanism

A network security and routing technology, applied in the field of communication, can solve the problems of routing protocol malicious node damage attack, insecurity, resource problems, etc., and achieve the effect of reducing routing overhead, ensuring security, and reducing energy consumption

Inactive Publication Date: 2016-12-28
山东政信大数据科技有限责任公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Potential insecurity exists in an open and shared environment, which makes mobile Ad hoc networks more vulnerable to malicious attacks such as eavesdropping and counterfeiting than traditional wired networks
At the same time, because the nodes in the network are in dynamic changes and the network topology is constantly changing, the original security protection scheme for static networks is no longer applicable.
[0004] (2) Resource issues
Due to the existence of various potential security threats and loopholes in the design of routing protocols, routing protocols are extremely vulnerable to sabotage attacks by malicious nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security routing method for ad hoc network based on trust mechanism
  • A security routing method for ad hoc network based on trust mechanism
  • A security routing method for ad hoc network based on trust mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. However, the examples given are not intended to limit the present invention.

[0031] The first idea of ​​the present invention is to propose a comprehensive trust evaluation method, including proposing the definition of trust, obtaining each attribute of trust, quantifying each attribute, and comprehensively obtaining the overall trust value. Then, based on the trust evaluation mechanism, a secure routing method in Ad hoc network is proposed, which can realize the security and high performance of the routing protocol.

[0032] Such as figure 1 As shown, the present invention provides a schematic flow chart of an Ad hoc network security routing method based on a trust mechanism, including:

[0033] Step S101, define trust, obtain attributes involved i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The trust mechanism-based Ad hoc network security routing method provided by the present invention relates to the field of communication technology, including defining trust, obtaining attributes involved in trust, quantifying and evaluating attributes; comprehensively obtaining the total trust value of nodes; The trust value is a synthesis of quantified attribute values; monitor and record the status and behavior of each node in the network, and provide node and network information; monitor the current status of neighboring nodes, and judge whether the node is capable of participating in routing; obtain , Calculate and update the trust value of the node; provide the message format, routing strategy and routing working process inside the routing protocol; analyze and verify the security and performance of the above routing. The invention provides a trust mechanism-based Ad hoc network security routing method, which can effectively reduce the energy consumption of nodes in the network, improve network performance, resist security attacks in the network, and ensure the safe operation of network routing protocols.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a trust mechanism-based Ad hoc network security routing method. Background technique [0002] The Ad hoc network is composed of a group of wireless mobile nodes. Each node in the network has the functions of a host and a router at the same time. It can not only complete its own communication but also forward information for other nodes, so it is not only widely used in military It also plays a big role in daily life, such as building communication networks in areas with harsh conditions and complex geographical locations. The mobile ad hoc network has the characteristics of self-organization, dynamicity, multi-hop, wireless, distribution, terminal limitation, and security vulnerability. In practice, the network still faces many challenges and problems, mainly including limited energy, communication bandwidth, network security, and network scalability and recoverability. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/00H04W40/02H04W12/122
CPCY02D30/70
Inventor 何泾沙霍晓珍赵斌刘公政万雪姣徐晶
Owner 山东政信大数据科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products