Unlock instant, AI-driven research and patent intelligence for your innovation.

A node trust management method for two-hop multi-replica ad hoc networks

A technology of trust management and self-organizing network, applied in the field of network security, it can solve the problems of static and single evaluation results, improve the confidentiality and integrity of transmitted data, etc., achieve the effect of comprehensive and objective measurement, and promote the degree of network security.

Active Publication Date: 2018-12-18
BEIJING INST OF COMP TECH & APPL
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Trust evaluation relies heavily on trusted centers or single-point monitoring, and the evaluation results are static and single, which cannot adapt to the dynamic networking environment of self-organizing networks;
[0006] (2) Trust management lacks an effective incentive strategy, which cannot ensure the availability of communication links while improving the confidentiality and integrity of transmitted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A node trust management method for two-hop multi-replica ad hoc networks
  • A node trust management method for two-hop multi-replica ad hoc networks
  • A node trust management method for two-hop multi-replica ad hoc networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0049] A node trust management method oriented to a two-hop multi-copy ad hoc network proposed by the present invention, wherein oriented to a two-hop multi-copy ad hoc network environment, means that a data packet originating from a source node experiences at most two Redundant transmission. This method covers two parts: node trust evaluation model and node trust incentive model. From the perspective of a certain source node, the method flow of the present invention is as follows: first, the node trust evaluation model measures the behavior of neighbor nodes and quantifies the trust index, and then the node trust incentive model analyzes the utility of neighbor nodes and formulates relay strategies, and finally optimiz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a node trust management method for a two-hop multi-replica ad hoc network, which relates to the technical field of network security. The invention carries out weighting treatment on the direct trust value dynamically monitored by the source node and the indirect trust value dynamically fed back by the neighboring node, solves the dynamic evaluation problem of the trust degree of the node in the two-hop multi-replica ad hoc network, and measures the malicious behavior of the node more comprehensively and objectively. The invention utilizes the forward utility value to stimulate the reliable behavior of the relay node, and utilizes the reverse utility value to punish the malicious behavior of the relay node, which can restrict the ad hoc network node to actively participate in the routing and forwarding of two-hop multiple copies, and effectively promotes the improvement of the network security degree.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a node trust management method for a two-hop multi-copy ad hoc network. Background technique [0002] Ad hoc network is a dynamic autonomous system with no center (i.e. no base station, no agent, etc.) formed by a group of network devices with both terminal and routing functions through wireless communication links. Each node in the network can be used as a source node at the same time. , relay nodes or destination nodes participate in various network services. At present, the security problems brought about by the inherent uncontrollable behavior mode of the self-organizing network node itself are becoming more and more serious. On the one hand, due to the lack of a unified identity authentication mechanism, the relay node may launch malicious attacks such as tampering and packet loss, seriously damaging the confidentiality and integrity of the transmitted data; on the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04L29/06H04W84/18H04W12/122
CPCH04L63/1408H04W12/12H04W84/18
Inventor 王晓菲陈志浩石波吴朝雄于冰郭敏刘滋润李大卫
Owner BEIJING INST OF COMP TECH & APPL