Region division and trust management mechanism-based security level routing method and application

A technology of trust management and security level, applied in network planning, wireless communication, advanced technology, etc., can solve problems such as network performance weakening, and achieve the effect of balancing network energy consumption and safe and effective transmission

Active Publication Date: 2017-12-12
ZHEJIANG SCI-TECH UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although its trust value will decrease with the implementation of malicious behavior, malicious nodes will keep their trust value above the threshold and remain hidden in the network
Therefore, the traditional reputation mechanism has a blind spot for identifying such betrayal nodes. The most important thing is that this kind of betrayal attack is an adjustable means to describe the trust value of a node, which means that the betrayal attack can be launched in combination with factors such as packet loss and behavior evaluation. Betrayal attacks with different attributes, so once the routing algorithm integrates the traditional reputation mechanism, its network performance will be greatly weakened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Region division and trust management mechanism-based security level routing method and application
  • Region division and trust management mechanism-based security level routing method and application
  • Region division and trust management mechanism-based security level routing method and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to better illustrate the technical solution of the present invention, the technical solution of the present invention will be described in detail here in combination with specific embodiments.

[0058] The security level routing method based on area division and trust management mechanism provided by the present invention not only balances the energy consumption of the network, but also further ensures the safe and effective transmission of various data. This method can be used for data transmission in any environment, such as classroom , office space, and smart home environment. Here, this application takes the smart home environment as an example for illustration. In order to explain the technical solution of the present invention more clearly, the node i, node j, and node m mentioned in this specific embodiment are all assumed in the network. A node does not mean that the present invention only includes the three points.

[0059] like figure 1 As shown, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a region division and trust management mechanism-based security level routing method and application. The method comprises the steps of network model building, node trust management, cluster head selection, routing building and routing. In the method, the idea of region division and a credit management mechanism are employed in stages of cluster head selection and intra-cluster and inter-cluster routing building of a routing algorithm, so as to isolate malicious nodes rapidly and accurately and make cluster distribution fit with the indoor structure. The method not only balances network energy consumption but also ensures various kinks of data to be transmitted safely and effectively. When the routing method provided in the invention is applied to the intelligent home appliances, the network energy consumption is balanced, further, various kinds of data is ensured to be transmitted safely and effectively in the intelligent home appliance scene.

Description

technical field [0001] The invention relates to a routing method and its application, in particular to a security level routing method and application based on area division and trust management mechanism. Background technique [0002] In the smart home scenario, the data perceived by nodes is mostly environmental, physiological, and behavioral data. This data involves personal privacy and personal life safety. There are many potential safety hazards, so that the possibility of nodes undertaking data transmission tasks being attacked is greatly increased, especially for A class of internal attacks launched by captured nodes that have mastered the key information and obtained identity recognition are extremely weak. On the other hand, the obvious pattern distribution of smart homes and the regional diversity of collected data make them different from traditional smart systems. In view of the obvious structure and weak resistance to internal attacks in smart home scenarios, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W16/22H04W24/02H04W40/10H04W40/22H04W40/24
CPCH04W16/225H04W24/02H04W40/10H04W40/22H04W40/246Y02D30/70
Inventor 洪榛邵茜纪守领
Owner ZHEJIANG SCI-TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products