Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Black hole attack defense method applied to route discovery

A black hole attack and routing technology, applied in the field of black hole attack defense, can solve the problems of low practical applicability and difficulties of trusted third parties, and achieve good adaptability

Active Publication Date: 2017-05-10
XIDIAN UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in wireless ad hoc networks, it is difficult to introduce a trusted third party, so the practical applicability of this method is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Black hole attack defense method applied to route discovery
  • Black hole attack defense method applied to route discovery
  • Black hole attack defense method applied to route discovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention uses based on receiving routing request table T q and receive routing response table T p The comparison method obtains a set of suspicious nodes, and then uses the machine learning algorithm to obtain the threshold of the destination sequence number of the routing response packet, and then the source node compares the destination sequence number of the received routing response packet with the threshold to determine whether a black hole attack has occurred, and uses The comparison of the above two tables results in the black hole node.

[0041] The present invention receives the routing request table T q , Receive routing response table T p The knowledge of set theory and engineering optimization is applied in the step of comparison and the step of applying machine learning algorithm to dynamically calculate the serial number threshold, and the symbols used are shown in Table 1.

[0042]

[0043]

[0044] Note: 0

[0045] The present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a black hole attack defense method applied to route discovery. The objective of the invention is to solve the problem of incapability of detecting inner attacks and defending against black hole attacks in route discovery in the prior art. According to the method provided by the technical schemes of the invention, each node establishes a receiving route request table and a receiving route response table and compares the content of the receiving route request table and the receiving route response table; whether a suspicious node exists is judged; if a suspicious node exists, a determined threshold value in a training set is compared with the destination sequence number of a received route response packet; if the sequence number is larger than the threshold value, it is determined that a node which sends the route response packet is a black hole node, otherwise, the node which sends the route response packet is determined as a normal node; and in subsequent route discovery, only the data packet of the normal node is forwarded or received, and the data packet of the black hole node is not forwarded or received. According to the black hole attack defense method applied to route discovery of the invention, a third party is not introduced, all procedures are completely completed by nodes in a wireless ad hoc network, and therefore, the security requirements of the routing of the wireless ad hoc network can be satisfied. The method can be applied to defending against black hole attacks in the route discovery of the wireless ad hoc network.

Description

technical field [0001] The invention belongs to the technical field of wireless network communication, in particular to a black hole attack defense method in route discovery, which can be used in wireless ad hoc networks. Background technique [0002] With the rapid development of the Internet and digital technology, people's demand for network bandwidth is increasing year by year, and there is a higher demand for the convenience and security of network access. As a new form of networking, wireless ad hoc network has the characteristics of strong mobility, large coverage area, flexible deployment and low deployment cost compared with traditional wired network. The most important way. However, the wireless ad-hoc network has inherent defects such as equal status of each node, limited node energy, and limited node computing power, and its routing protocol did not consider internal security issues at the beginning of the design. Vulnerable to black hole attacks. Black hole a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W40/28H04W84/18H04L29/06H04W12/126
CPCH04L63/1441H04W12/00H04W40/28H04W84/18
Inventor 马建峰孙聪李腾魏大卫袁涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products