Creditability verification method for routers in wireless ad hoc network

A wireless self-organizing network and verification method technology, applied in the field of router trusted verification and privacy protection system, can solve the problems of privacy protection difficulty and topology structure variability, and achieve good privacy protection, good applicability, and protection of private information. Effect

Active Publication Date: 2016-04-06
XIDIAN UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The object of the present invention is to propose a kind of trusted verification method for routers in a wireless ad hoc network in order to solve The above-mentioned deficiencies in the prior art ensure the security of verification information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Creditability verification method for routers in wireless ad hoc network
  • Creditability verification method for routers in wireless ad hoc network
  • Creditability verification method for routers in wireless ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Based on the existing wireless router communication, the present invention combines the characteristics of the wireless network, network resource management, network security requirements, etc., obtains the correct router log information through formal reasoning, and encodes the router log information, and then uses the password The log information is verified using the Merkle HashTree, which effectively ensures the security of router communication in the wireless network and the requirements of attack detection.

[0033] In the present invention, the log information reasoning of the receiver and the intermediate forwarding router is carried out according to the handshake protocol communication rules for transmitting messages between nodes in the wireless ad hoc network, and the communication rules are described using NDlog syntax, as shown in Table 1.

[0034] Table 1 Communication rules

[0035]

[0036] In Table 1, there are 10 inference rules, where C represents ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a creditability verification method for routers in a wireless ad hoc network, and mainly aims to solve the problem that there is only a single type of attack detection, privacy protection is poor and self-verification cannot be conducted in the prior art. According to the technical scheme, the method comprises the following steps: a sender reasons out the log information of a receiver and intermediate forwarding nodes by use of handshake protocol communication rules for message transmission between nodes in a wireless ad hoc network under the condition of not directly reading the log information of routers; and the sender calculates the Hash value based on a Hash tree of a verified party, verifies the safety of the reasoned-out log information of the receiver and the intermediate forwarding routers, and detects whether there is active or passive attack to the intermediate forwarding routers. According to the invention, no participation of the third party is introduced, verification is completed fully by the nodes in the wireless ad hoc network, the privacy of data is protected, and the safety requirements of the wireless ad hoc network are satisfied. The method can be used in creditability verification and malicious attack defense of routers in the wireless ad hoc network.

Description

technical field [0001] The invention belongs to the technical field of wireless network communication, in particular to a router credible verification and privacy protection system, which can be used in wireless ad hoc networks. Background technique [0002] With the rapid expansion of the Internet scale, the surge of network traffic, and the continuous emergence of new network applications, new requirements are put forward for network devices such as routers. The rapid development of digital technology has continuously spawned numerous digital products, such as personal computers, PDAs, mobile phones, digital TVs, DVDs, MP3s, DV / DCs, and other digital products have gradually entered ordinary life. Most communication and digital devices can be connected and communicated by wireless network. Wireless network is a new technology that completely adopts distributed processing. It has the characteristics of strong mobility, large coverage area, high dynamic performance, and multi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W84/18H04L29/06H04W12/102
CPCH04L63/1466H04L63/1475H04W12/12H04W84/18
Inventor 马建峰孙聪李腾习宁卢笛冯鹏斌马鑫迪
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products