Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Coexistence method of weakly trusted nodes under opportunistic routing in wireless mesh networks

A node and network technology, applied in the field of coexistence mechanism of weakly trusted nodes under opportunistic routing in wireless Mesh networks, can solve problems such as potential security risks, discussion and research of weakly trusted nodes, etc., to improve communication traffic, reduce expected transmission times, The effect of improving the success rate of data transmission

Active Publication Date: 2021-06-29
NANJING TECH UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The literature [Trusted Opportunity Routing and Forwarding Model Based on Feedback Credibility] only isolates the malicious nodes in the network, and does not discuss and study the weak trusted nodes, and there are still security risks in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Coexistence method of weakly trusted nodes under opportunistic routing in wireless mesh networks
  • Coexistence method of weakly trusted nodes under opportunistic routing in wireless mesh networks
  • Coexistence method of weakly trusted nodes under opportunistic routing in wireless mesh networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0085] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a method for coexistence of weakly trusted nodes based on a trust model of a reporting mechanism and a Markov prediction method. Based on the general trust model, this mechanism introduces a reporting mechanism to report the trust value of nodes to form a node trust degree. According to the trust degree threshold, after excluding trusted nodes and untrustworthy nodes, weakly trusted nodes are screened out. Then use the Markov prediction model to predict the behavior trend of the weakly trusted nodes, form the node coexistence degree, and judge whether the node can coexist and participate in routing transmission, so as to improve the communication flow of the network.

Description

technical field [0001] The invention relates to the technical field of network data transmission, in particular to a coexistence mechanism of weakly trusted nodes under opportunistic routing in a wireless Mesh network. Background technique [0002] Wireless Mesh networks are developed from Ad hoc networks. Opportunistic routing can adapt to flexible wireless Mesh networks because of its broadcast characteristics. However, its flexible structure and node mobility will make the network suffer from malicious nodes. Nodes in the network are rational and may refuse to participate in data forwarding for their own benefit, and nodes are also selfish. [0003] For selfish nodes and malicious nodes in opportunistic routing of wireless Mesh networks, trust models are usually used to quantify the trust value of network nodes. A trust model is an abstract description of the working mode of a trust system. It is essentially a mathematical model and a set of methods and rules for quantit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/02H04W28/02H04W28/10H04W40/02
CPCH04W24/02H04W28/021H04W28/10H04W40/02
Inventor 吴军张玲玲白光伟
Owner NANJING TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products