Unlock instant, AI-driven research and patent intelligence for your innovation.

A node trust management method for two-hop multi-replica ad hoc network

A trust management and self-organizing network technology, applied in the field of network security, can solve the problems of static and single evaluation results, improve the confidentiality and integrity of transmitted data, and achieve the effect of promoting improvement, comprehensive and objective measurement, and promoting the degree of network security

Active Publication Date: 2021-06-22
BEIJING INST OF COMP TECH & APPL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Trust evaluation relies heavily on trusted centers or single-point monitoring, and the evaluation results are static and single, which cannot adapt to the dynamic networking environment of self-organizing networks;
[0006] (2) Trust management lacks an effective incentive strategy, which cannot ensure the availability of communication links while improving the confidentiality and integrity of transmitted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A node trust management method for two-hop multi-replica ad hoc network
  • A node trust management method for two-hop multi-replica ad hoc network
  • A node trust management method for two-hop multi-replica ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0049] A node trust management method oriented to a two-hop multi-copy ad hoc network proposed by the present invention, wherein oriented to a two-hop multi-copy ad hoc network environment, means that a data packet originating from a source node experiences at most two Redundant transmission. This method covers two parts: node trust evaluation model and node trust incentive model. From the perspective of a certain source node, the method flow of the present invention is as follows: first, the node trust evaluation model measures the behavior of neighbor nodes and quantifies the trust index, and then the node trust incentive model analyzes the utility of neighbor nodes and formulates relay strategies, and finally optimiz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a node trust management method for a two-hop multi-copy ad hoc network, and relates to the technical field of network security. The invention weights the direct trust value dynamically monitored by the source node and the indirect trust value dynamically fed back by the neighbor node, solves the problem of dynamic evaluation of the trust degree of the two-hop multi-copy self-organizing network node, and makes the measurement of the malicious behavior of the node more accurate. Comprehensive and objective. The present invention encourages the reliable behavior of the relay node by virtue of the positive utility value, and punishes the malicious behavior of the relay node by means of the reverse utility value, which can constrain the self-organizing network nodes to actively participate in the routing and forwarding of two-hop multi-copy, effectively promoting the network Improvements in security.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a node trust management method for a two-hop multi-copy ad hoc network. Background technique [0002] Ad hoc network is a dynamic autonomous system with no center (i.e. no base station, no agent, etc.) formed by a group of network devices with both terminal and routing functions through wireless communication links. Each node in the network can be used as a source node at the same time. , relay nodes or destination nodes participate in various network services. At present, the security problems brought about by the inherent uncontrollable behavior mode of the self-organizing network node itself are becoming more and more serious. On the one hand, due to the lack of a unified identity authentication mechanism, the relay node may launch malicious attacks such as tampering and packet loss, seriously damaging the confidentiality and integrity of the transmitted data; on the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04L29/06H04W84/18H04W12/122
CPCH04L63/1408H04W12/12H04W84/18
Inventor 王晓菲陈志浩石波吴朝雄于冰郭敏刘滋润李大卫
Owner BEIJING INST OF COMP TECH & APPL