Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security trust method for ad Hoc network based on reference node strategy

A reference node, network security technology, applied in the field of network security, can solve the problems that cannot be fundamentally solved, the effect of packet attack defense is not obvious, the defense model is a single attack method, etc., to achieve good defense effect, strong and reliable. Scalability and adaptability, the effect of defending against multiple attacks

Active Publication Date: 2020-06-02
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing attack methods are diverse, and at the same time, various attack methods do not exist in a single way, and most of the existing defense models only target a single attack method
Aiming at the impact of data message discarding attack, the main defense methods are: Based on the method of multi-path data transmission, Karlof first proposed the selective discarding attack in the literature, and proposed to use multi-path delivery to deal with this attack, but did not propose a detailed When multiple paths are close to the BS (Base Station), it is easy to merge into one path, which can implement selective discarding attacks, but cannot solve the problem fundamentally; while the schemes proposed in the existing literature have a large node control overhead The problem; and based on the neighbor node inspection method, the proposed Watchdog algorithm, the node works in promiscuous mode, when the node forwards the message to the next hop node, it uses the characteristics of the wireless signal exposed to the air to monitor the next hop Whether the node continues to forward the message; in addition, the neighbor node’s hand-raising penalty strategy based on time statistics proposed in the existing literature is based on the assumption that the malicious node does not discard the RREQ and RREP messages, which cannot defend against black hole attacks. Node interference; moreover, the node evaluation method based on statistical analysis proposed in the existing literature has a large amount of calculation, and is only applicable to the network model with the sink node as the communication center
For black hole attacks, the existing literature proposes the method of using virtual nodes as the target nodes to judge the attack nodes. Since the target nodes are virtual nodes, it is easy to be seen through by the attack nodes; the existing trust models are mainly based on Bayesian model, vector model and D-S Evidence theory, etc., the trust evaluation model proposed in the existing literature has a certain effect on complete data packet attacks, but the defense effect on partial packet discard attacks is not very obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security trust method for ad Hoc network based on reference node strategy
  • A security trust method for ad Hoc network based on reference node strategy
  • A security trust method for ad Hoc network based on reference node strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0073] The present invention comprises the following steps:

[0074] Step 1: Build a trust model

[0075] 1. Packet statistics strategy based on direct trust model

[0076] Direct trust (Direct_Trust) refers to the trust relationship obtained by nodes collecting communication packet loss rate information through a strategy based on packet statistics and evaluating through the Bayesian trust model. The evaluation of Bayesian trust model is to calculate the trust value of nodes in a probabilistic way according to the communication result set of observed nodes. The Bayesian model under direct trust evaluation is described as follows: the destination node collects message information through a strategy based on message statistics, and calculates the message loss rate. times; if the packet loss rate of the node is normal, then α=a+1, and if t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an Ad Hoc network security trust method based on a reference node strategy, belonging to the field of network security. The method is specifically as follows: calculate the trust value of each node through the trust model, and send the trust value to the trust value statistics node, the trust value statistics node counts the weighted trust value of each node and updates the reference node, the trust value statistics node, and finally the reference node The node initiates the reference node policy. The invention has the advantages of quickly finding the black hole attack nodes in the Ad Hoc network, and at the same time having a good defense effect against data packet attacks and hybrid black hole attacks; and having strong scalability and adaptability.

Description

technical field [0001] The invention belongs to the field of network security and relates to an Ad Hoc network security trust method based on a reference node strategy. Background technique [0002] The Ad Hoc network is a wireless mobile network that does not rely on any fixed infrastructure, and has the characteristics of no center, self-organization, high dynamics and limited energy. It has broad application prospects in battlefield environment, emergency rescue and mobile conference. At the same time, its security problems are more prominent, and the network anti-attack capability is particularly vulnerable. Therefore, it is necessary to design an effective security routing algorithm. [0003] In the mobile Ad Hoc network, because there is no fixed infrastructure, the communication is completely established on the wireless communication between nodes. When two nodes are within the communication coverage of each other, they can communicate directly. However, the coverage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/00H04W40/02H04W84/18H04W12/122H04W12/126
Inventor 欢水源蒋溢黄梅根祝清意黄奕
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products