Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data forwarding method with black hole attack detection

A forwarding method and black hole attack technology, applied in electrical components, transmission systems, etc., can solve the problems of accuracy discount and lack of comprehensive consideration, and achieve the effect of reducing the impact

Active Publication Date: 2017-08-04
CHONGQING UNIV OF POSTS & TELECOMM +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above-mentioned literatures, some attack characteristics of black hole attacks are used to evaluate the behavior of nodes, but these methods only focus on one aspect of black hole attacks, and lack of comprehensive consideration
If only the data delivery rate of the node is used as the criterion for judging whether the node is a black hole node, the accuracy of the judgment result will be affected by the node cache space and the timeliness of message forwarding; and if only the routing information provided by the detected node Considering the accuracy of the node, the accuracy of the judgment result will be affected by the update delay of the node routing information. When the routing information of the node is too old, the accuracy of the judgment will be greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data forwarding method with black hole attack detection
  • A data forwarding method with black hole attack detection
  • A data forwarding method with black hole attack detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0023]The technical solution adopted by the present invention to solve the technical problem is: according to the behavior of the nodes in the network and the characteristics of black hole attacks, when two nodes meet, the node trust value evaluation will be performed for the following attributes of the nodes: 1) each node When meeting other nodes, they will exchange summary tables, and the accuracy of the summary table is the trustworthiness of the node's behavior T 1 ; 2) The credibility of the node evaluated by this node last time is the historical credibility T of the node 2 , to measure whether the node has misbehaved in the past; 3) The node collects the evaluation of the detected node from other nodes in the network, and obtains the indirect credibility T of the node by integrating these evaluations of the node 3 ; 4) The message fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data forwarding method with a black hole attack detection function and belongs to the technical field of opportunistic network trust management. In order to solve the problems that existing black hole attack detection methods in an opportunistic network only detect attack behaviors of black hole nodes in a certain aspect and lack relatively comprehensive evaluation on the black hole nodes and detection results are affected by certain changes of the network easily, during black hole attack detection, trust conditions of the nodes in all aspects are required to be considered comprehensively, comprehensive judgments are made, and an opportunistic network trust management method for comprehensively judging node credibility according to node experience in the aspects of the accuracy degree of routing information provided by to-be-detected nodes, the reliability of historic behaviors of the nodes, the forwarding capacity of the nodes for messages and the like is further designed. With the adoption of the method, the reliability of the nodes is accurately judged, and detection results cannot be affected by other factors in the network easily, so that the delivery rate of the messages in the network is increased, and the performance of the network is enhanced.

Description

technical field [0001] The invention belongs to the technical field of opportunistic network trust management, and relates to a data forwarding method with black hole attack detection. Background technique [0002] With the popularity of a large number of low-cost smart devices with short-distance communication capabilities (such as mobile phones, PDAs, sensors, etc.), opportunistic networks have received extensive attention. As a special application of traditional wireless ad hoc networks, the relatively sparse distribution of nodes and frequent movement in opportunistic networks cause intermittent connections of nodes in the network, which makes the source node and destination node of the message lack of end-to-end connection. For the above reasons, messages in opportunistic networks are usually delivered in a store-carry-forward manner. In this way, the node does not need to establish an end-to-end path before forwarding data, but uses the opportunity of encountering oth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/14
Inventor 杨静赵妍妍谢毅张炎吴大鹏张洪沛
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products