A method for routing security and privacy protection in an Internet of Things network

A privacy protection and Internet of Things technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as lack of consideration of internal attacks, achieve the effect of resisting collusion attacks and improving accuracy

Active Publication Date: 2018-09-18
FUJIAN NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above achievements still have the following deficiencies: (1) most of them consider the attack of a single user, and less consider the attack of alliance between two or more users; (2) lack of consideration of internal attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for routing security and privacy protection in an Internet of Things network
  • A method for routing security and privacy protection in an Internet of Things network
  • A method for routing security and privacy protection in an Internet of Things network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0034] Please refer to figure 1 , the present invention provides a method for routing security and privacy protection in an Internet of Things network, characterized in that it comprises the following steps:

[0035] Step S1: The source node u broadcasts a SETM message to neighbor nodes, and starts the route discovery process;

[0036] Step S2: After receiving the SETM message, any neighbor node v executes the LX-Core mechanism on this node to defend against collusion attacks from other nodes;

[0037] In the LX-Core mechanism, there are the following theorems:

[0038] Theorem 1: In the process of routing selection, when a small number of nodes collude, there will be a relationship WD(N)≥WD′(N), where WD′(N) is when there is collusion WD(N) value at time;

[0039] The stated Theorem 1 is proved as follows:

[0040] Proof: if the system model fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for routing security and privacy protection in an Internet of Things network, comprising the following steps: firstly start the routing establishment process; secondly, conduct credible evaluation on nodes, and record the evaluation results; The Core mechanism defends against node collusion attacks to ensure the safe transmission of data; when there are multiple paths, the best route is selected by combining the node's hop count information and reputation recommendation value information. The present invention can dynamically reflect the behavior of nodes and improve the performance of routing security in the network. At the same time, the dynamic reputation mechanism used in the present invention can meet the requirement of selecting credible routes in the path selection process.

Description

technical field [0001] The invention relates to a method for routing security and privacy protection in an Internet of Things network. Background technique [0002] With the expansion of the application scope of the Internet of Things, more and more private information of users will appear in the network. The disclosure of these private information will bring serious consequences to individuals, society and the country. Therefore, the issue of network and privacy security has attracted widespread attention from users, society and the country, and has become one of the problems that the Internet of Things needs to focus on and solve now and in the future. First, it is the basis for the Internet of Things to further use and provide more network services. As an important part of the Internet of Things, routing protocols are the main target of network attacks. In addition, since the integrity, confidentiality, and privacy of data information in the Internet of Things run throu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/751H04L29/06H04L45/02
CPCH04L45/02H04L63/1441
Inventor 林晖周赵斌许力夏有华
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products