Internet of things trusted routing method based on Core-Selecting and reputation mechanism

An Internet of Things and routing technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problem of not being able to effectively resist internal attacks, not fully considering the Internet of Things architecture and communication methods, and unable to effectively guarantee the Internet of Things. Routing security and other issues

Inactive Publication Date: 2015-12-09
FUJIAN NORMAL UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the integrity, confidentiality, and privacy of data information in the Internet of Things run through the entire process of data stream transmission, and various routing attacks launched will destroy the integrity and confidentiality of data information, leading to the leakage of private information , therefore, it is particularly important to design a safe and reliable routing protocol
[0004] In recent years, researchers have proposed some Internet of Things security routing protocols, but the existing research results are mainly to modify the existing WMN and WSN security routing protocols, and then apply them to the Internet of Things, without fully considering the system of the Internet of Things The characteristics of the structure and communication methods cannot effectively guarantee the routing security of the Internet of Things; in addition, most of the existing research results are based on the assumption that the nodes in the network are credible, and believe that the nodes are credible after being certified and included in the network. It will not become a malicious node, and cannot effectively resist internal attacks initiated by internal malicious nodes; in addition, although some achievements consider internal attacks, they consider attacks from a single user, and cannot effectively resist alliances or shared networks of multiple internal users. attack, cannot provide good routing security guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things trusted routing method based on Core-Selecting and reputation mechanism
  • Internet of things trusted routing method based on Core-Selecting and reputation mechanism
  • Internet of things trusted routing method based on Core-Selecting and reputation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0050] Please refer to figure 1 , the present invention provides a kind of Internet of Things trusted route selection method based on Core-Selecting and reputation mechanism, it is characterized in that, comprises the following steps:

[0051] Step S1: The source node u queries the reputation of the neighbor nodes stored locally, if there is a node set Φ, Where R(k) is the reputation value of node k, TH min is the reputation threshold value, then the source node u broadcasts a SETM message to the nodes in the node set Φ, and starts the route discovery process;

[0052] Step S2: After any node v in the node set Φ receives the SETM message, it first calculates about the source node u at the current t n Moment's direct credibility The source node u at current t n Moment's direct credibility is calculated as follows:

[0053] R...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of things trusted routing method based on Core-Selecting and a reputation mechanism. The method comprises the following steps that: a source node inquires history interaction record firstly, sends a relay node selection request message to a most trusted node, and broadcasts the relay node selection request message to all neighbor nodes if the most trusted node cannot be found or a selected node does not make feedback; the neighbor nodes assess the confidence level of a request node by a reputation model based on the Core-Selecting after reception of the request message, and provides feedback information indicating whether or not the neighbor nodes wound like to provide relay services; and the source node performs confidence level assessment on the nodes which would like to provide the relay services by the reputation model based on the Core-Selecting after reception of the feedback information, and selects the most trusted relay node finally. Through adoption of the method, the routing security and reliability can be enhanced effectively, and internal collusion attacks can be resisted effectively.

Description

technical field [0001] The invention relates to a trusted route selection method of the Internet of Things based on Core-Selecting and reputation mechanism. Background technique [0002] With the rapid development of the Internet and wireless communication technology, the Internet of Things has emerged as the times require and has become one of the most critical technologies in the new generation of information technology. The Internet of Things is a new type of network that aims to connect various items with the Internet through information sensing equipment and in accordance with agreed protocols for information exchange and communication, so as to realize intelligent identification, positioning, tracking, monitoring and management. It is a network that extends and expands on the basis of the Internet. In recent years, the Internet of Things technology has developed rapidly, and a series of innovative applications and services based on the Internet of Things have also eme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/751H04L45/02
CPCH04L45/02
Inventor 林晖许力周赵斌夏有华
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products