Coexistence mechanism of weak trusted nodes under wireless Mesh network opportunity routing

A node and trusted technology, applied in wireless communication, network traffic/resource management, electrical components, etc., can solve problems such as potential safety hazards, discussion and research of weakly trusted nodes

Active Publication Date: 2018-11-23
NANJING UNIV OF TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The literature [Trusted Opportunity Routing and Forwarding Model Based on Feedback Credibility] only isolates the malicious nodes in the network, and does not discuss and study the weak trusted nodes, and there are still security risks in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Coexistence mechanism of weak trusted nodes under wireless Mesh network opportunity routing
  • Coexistence mechanism of weak trusted nodes under wireless Mesh network opportunity routing
  • Coexistence mechanism of weak trusted nodes under wireless Mesh network opportunity routing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0088] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is inten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a weak trusted node coexistence mechanism based on the trust model of a reporting mechanism and a Markov prediction method. The mechanism is based on a general trust model, thereporting mechanism is introduced, the trust values of the nodes are reported and node trust degrees are formed. According to a trust degree threshold, trusted nodes and untrusted nodes are eliminated, and then weak trusted nodes are screened. For the weak trusted nodes, a Markov prediction model is used to predict a behavior trend so as to form a node coexistence degree. Whether the nodes can coexist is determined and the nodes participate in routing transmission so as to increase the communication flow of a network.

Description

technical field [0001] The invention relates to the technical field of network data transmission, in particular to a coexistence mechanism of weakly trusted nodes under opportunistic routing in a wireless Mesh network. Background technique [0002] Wireless Mesh networks are developed from Ad hoc networks. Opportunistic routing can adapt to flexible wireless Mesh networks because of its broadcast characteristics. However, its flexible structure and node mobility will make the network suffer from malicious nodes. Nodes in the network are rational and may refuse to participate in data forwarding for their own benefit, and nodes are also selfish. [0003] For selfish nodes and malicious nodes in opportunistic routing of wireless Mesh networks, trust models are usually used to quantify the trust value of network nodes. A trust model is an abstract description of the working mode of a trust system. It is essentially a mathematical model and a set of methods and rules for quantit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/02H04W28/02H04W28/10H04W40/02
CPCH04W24/02H04W28/021H04W28/10H04W40/02
Inventor 吴军张玲玲白光伟
Owner NANJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products