A safe routing method realized by aodv or dsdv protocol

A protocol implementation and routing technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems such as poor scalability and inability to maximize network security performance, and achieve strong practicability and good scalability

Inactive Publication Date: 2020-11-27
杭州缤构网络科技有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the inability to maximize network security performance and poor scalability in the above routing methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe routing method realized by aodv or dsdv protocol
  • A safe routing method realized by aodv or dsdv protocol
  • A safe routing method realized by aodv or dsdv protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be described in further detail below with reference to the accompanying drawings.

[0051] Such as figure 1 Shown, the distribution of nodes and eavesdroppers.

[0052] Such as figure 2 As shown, the process of a secure routing method that can be implemented using the AODV or DSDV protocol can be summarized as follows: initial stage: obtain node parameter information database; realize parameter information database sharing through information interaction; derive end-to-end secure connection probability The expression of EESCP; establish the system optimization model; analyze and optimize the system model, and get the final routing selection strategy.

[0053] image 3Several routing algorithms are compared when the eavesdropper density is λ=10 -5 time safety performance. Algorithm (I), (II) and algorithm (III) respectively represent the shortest path algorithm, the improved shortest path method, the traversal method and the minimum hop r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe routing method realized by using the AODV or DSDV protocol, comprising steps: S1: nodes obtain basic configuration information of the network and obtain parameters between nodes and system configuration parameters; The parameters and system configuration parameters are organized into a parameter library, and the sharing of nodes in the network is realized; S3: According to the definition of information theory security capacity, the expression of the system end-to-end secure connection probability EESCP is deduced; S4: According to the above expression Establishing a system optimization model, and deriving relevant parameter information from the parameter library, and substituting it into the optimization model; S5: analyzing and obtaining a routing selection strategy according to the optimization model. On the premise of assuming unknown eavesdropper's position and channel state information, the present invention combines physical layer security technology based on information theory, and obtains and uses end-to-end secure connection probability of multi-hop relay network.

Description

technical field [0001] The invention belongs to the field of network security communication, and discloses a security routing method for decoding and forwarding relay networks that can be realized by adopting traditional AODV or DSDV protocols based on the physical layer security technology of information theory. Background technique [0002] In the process of continuous development and innovation of network communication, as a core issue of network communication, information security has always been the focus of people's attention, and it is also a prerequisite for the large-scale popularization and application of network communication. With the continuous emergence of various new network communication technologies and the rapid growth of the number of network communication users, information security issues are becoming increasingly severe. In addition, due to the complexity of technology and the dynamics of changes in the external environment, the security performance of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/709H04L12/721H04L12/725H04L12/733H04L45/122H04L45/243
CPCH04L45/122H04L45/123H04L45/126H04L45/20H04L45/245H04L45/30H04L63/16
Inventor 冯维杨凯通徐永鑫吴端坡刘晴
Owner 杭州缤构网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products