Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ad hoc network opportunistic routing method avoiding malicious attacks

A malicious attack and routing technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of inconsistent information verification, information difference between statistical information and routing information table, misjudgment, etc., to ensure information Security, the effect of improving data transmission capability

Active Publication Date: 2017-05-10
HOHAI UNIV
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker is identified only through the above-mentioned malicious behavior identification mechanism, it is likely to cause misjudgment.
For example, there is a bit error in the data transmission process in the network and no correction is found. When the information verification is performed in the above process, the information verification caused by the bit error will be uniformly identified as a tampering attack on the data.
There is also a large possibility of misjudgment in the identification of the above-mentioned false routing attack and selective forwarding attack. The environment has a great impact on the performance of the wireless ad hoc network. If the environment changes, it may also exist in the statistical information and routing information table. In the case of large discrepancies in information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ad hoc network opportunistic routing method avoiding malicious attacks
  • Ad hoc network opportunistic routing method avoiding malicious attacks
  • Ad hoc network opportunistic routing method avoiding malicious attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0051] The present invention designs an Ad hoc network opportunistic routing method for avoiding malicious attacks. Firstly, the prior information on the operation of the opportunistic routing protocol is obtained by updating the routing information, and then the data transmission process is performed on the premise of obtaining the routing information, and the candidate forwarding node is selected. Mechanisms and forwarding nodes establish mechanisms to transmit packets along opportunistic paths from source nodes to destination nodes. In addition, the protocol identifies malicious nodes in the network through the malicious behavior identification mechanism and node trust mechanism and removes the malicious nodes from the Ad hoc network. The removed malicious nodes will not be able to participate in the data transmission process.

[0052] Step (1), the routing i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention presents an Ad hoc network opportunistic routing method avoiding malicious attacks. First, priori information of routing in an Ad hoc network is acquired through a routing information update mechanism based on a hello message; then, a data packet is transmitted along an opportunistic path through a candidate forwarding node selecting mechanism based on time delay parameters and a forwarding node determining mechanism based on priority; and finally, data tampering attack, false routing attack and selective forwarding attack behaviors in the network are identified through a malicious behavior identifying mechanism based on data characteristic information, the influence of the attack behaviors on the credibility of each node is quantified through a node credibility mechanism based on credibility, and malicious nodes are judged according to the credibility and eliminated from the Ad hoc network. Thus, the security of data transmission via an opportunistic routing protocol in the Ad hoc network is ensured.

Description

technical field [0001] The invention relates to an Ad hoc network opportunistic routing method, which belongs to the technical field of routing selection mechanisms. Background technique [0002] Routing protocols work at the network layer and are used to establish data packet transmission paths between source nodes and destination nodes. Routing protocols in Adhoc networks need to have characteristics such as invulnerability, reliability, scalability, and security to meet the quality requirements of data communication. Opportunistic routing protocols improve the data transmission capability by participating in data packet forwarding through multiple candidate forwarding nodes during each hop of data transmission. In addition, the protocol can adapt to the dynamic network topology and the mobility of nodes. It is difficult for traditional routing to maintain a fixed path in an Ad hoc network. If any node in the path fails, data transmission will fail. Data transmission of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/751H04L45/02
CPCH04L45/026H04L63/1416H04L2463/146
Inventor 王慧斌徐淑芳杨松刘阳
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products