A Method of Monitoring Router Selection Based on Mutual Information

A technology of mutual information and routers, applied in the field of communication networks, can solve problems such as inability to complete router monitoring tasks, large resource consumption, network performance degradation, etc., to reduce system monitoring overhead, avoid resource consumption, and achieve high information reliability. Effect

Active Publication Date: 2018-05-29
NORTHEASTERN UNIV LIAONING
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the use of wireless links provides great convenience, it also brings many security threats, which is of great significance to the research on wireless Mesh network security issues; as an active security protection technology, the intrusion detection system can target internal Real-time protection against attacks from external nodes and corresponding responses in a timely manner to reduce losses; the important task of intrusion monitoring is to monitor the status of network routers and observe whether the behavior of routers is normal. If each router in the network is used as an intrusion detection system If there are too few monitoring routers, the intrusion detection system may not be able to monitor all the routers in the network if there are too few monitoring routers. monitoring tasks
[0004] The current network monitoring router selection methods generally only consider the topological position of the router, and divide the routers with similar topological positions into a "cluster"; these methods ignore the importance difference of routers in the network and the interconnection between network routers, so It is possible to divide routers with frequent contacts and high communication frequencies into different "clusters", so that the cluster heads of their clusters will process a lot of the same or similar information, excessively consuming the computing resources and energy of routers, and at the same time It also increases the security monitoring overhead of the system, and they are likely to detect malicious node information at the same time, and at the same time send a report to notify the relevant nodes of the entire network, so the fluctuation of monitoring overhead is also large, which reduces network performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Monitoring Router Selection Based on Mutual Information
  • A Method of Monitoring Router Selection Based on Mutual Information
  • A Method of Monitoring Router Selection Based on Mutual Information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] An embodiment of the present invention will be further described below in conjunction with the accompanying drawings.

[0031] In the embodiment of the present invention, the number of randomly generated routers is 30 wireless Mesh networks, and the schematic diagram of the network topology is as follows figure 1 As shown, the 30 routers in the topology are all wireless routers, the wireless routers are single radio frequency, and the wireless links do not interfere with each other;

[0032] In the embodiment of the present invention, a monitoring router selection method based on mutual information, the method flow chart is as follows figure 2 shown, including the following steps:

[0033] Step 1. Obtain the bridge connection coefficient of each router according to the out-degree of each router in the network topology and the out-degree of its adjacent routers;

[0034] In the embodiment of the present invention, the described bridge connection coefficient of obtaini...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a monitoring router selecting method based on mutual information and belongs to the technical field of a communication network. The method comprises the steps as follows: firstly obtaining bridge connection coefficient of each router; secondly obtaining mutual information total amount of each router and all adjacent routers to each router; selecting the router with the largest mutual information total amount as a monitoring router in a network topology, and finally determining the monitoring area of each monitoring router. The topological location of the monitoring router selected by the invention has important position in a network, and is convenient for mutually informing monitoring information to ensure the accuracy of the monitoring information, and is hard to be attacked. The method of the invention avoids the condition that the computing resource and the energy of the router are overly consumed because a cluster-based monitoring method of an intrusion detection monitoring system ignores the significance difference of the router in the network and interrelation among network routers. The method of the invention reduces redundant information, avoids resource consumption, reduces system monitoring expenditure and improves network performance to a large extent.

Description

technical field [0001] The invention belongs to the technical field of communication networks, and in particular relates to a method for selecting a monitoring router based on mutual information. Background technique [0002] Wireless Mesh network is a new type of wireless network based on multi-hop interconnection. It is different from traditional wireless local area network and wireless multi-hop Ad Hoc network. It can be regarded as two kinds of networks; the nodes of wireless Mesh network have both The functions of routers and relays, nodes can be interconnected, similar to Ad Hoc networks, with self-organization, self-configuration and other characteristics, wireless Mesh network consists of a backbone network composed of Mesh routers and a peer-to-peer network composed of Mesh clients . The wireless backbone network is composed of wireless Mesh routers, which have only a small amount of mobility or no mobility, and can provide wireless backhaul functions; the routing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/02
CPCH04W24/02
Inventor 于尧宋清洋张杰朱学艳
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products