Malicious Node Detection Method in Wireless Ad Hoc Networks Based on Behavioral Cognition

A wireless self-organizing, malicious node technology, applied in the field of communication, can solve the problems of non-malicious node reliability reduction, high delay, congestion, etc., to avoid the reduction of trust degree, improve network reliability, and reduce negative effects.

Active Publication Date: 2021-05-18
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a wireless ad-hoc network, due to the changeable network status, in addition to malicious behavior, network congestion, buffer overflow and other reasons may also cause network packet loss or high delay.
Credibility evaluation based only on packet loss rate and delay statistics can easily lead to a decrease in the credibility of non-malicious nodes, causing normal nodes to be misjudged as malicious nodes and move out of the network, which seriously affects the performance of wireless ad hoc networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious Node Detection Method in Wireless Ad Hoc Networks Based on Behavioral Cognition
  • Malicious Node Detection Method in Wireless Ad Hoc Networks Based on Behavioral Cognition
  • Malicious Node Detection Method in Wireless Ad Hoc Networks Based on Behavioral Cognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0029] refer to figure 1 , the implementation steps of this example are as follows.

[0030] Step 1, the node periodically monitors the working status of the neighboring nodes.

[0031] (1a) Each node in the network is set in the promiscuous listening mode, that is, the node can receive all data packets within the communication range, regardless of whether it is the next-hop node of the data packet;

[0032] (1b) The node periodically monitors the behavior of all neighbor nodes, that is, monitors the following three situations:

[0033] Packet loss: The specific statistical parameter is the number s of correctly forwarded data packets among the data packets sent by this node and forwarded by node i 1i and the number of lost packets f 1i ;

[0034] Delay: The specific statistical parameter is the number of data packets that have not timed out among the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a behavior cognition-based wireless self-organizing network malicious node detection method, which mainly solves the problem of high false detection rate caused by not considering network congestion in the existing malicious node detection system. Its implementation plan includes: nodes in the network periodically monitor the working status information of neighboring nodes; nodes periodically evaluate the quantitative trust degree of neighboring nodes; second judgments are made on nodes with lower trust degrees based on whether they may be congested within the evaluation period To prevent false detection; calculate direct trust degree; interact with neighboring nodes and calculate recommended trust degree; integrate direct trust degree and recommended trust degree to obtain overall trust degree; judge malicious nodes and isolate them. The invention can reduce the possibility of misjudging normal nodes as malicious nodes, reduce the negative impact of malicious nodes on the network, improve network reliability, and can be used for detection and defense of malicious node attacks in wireless self-organizing networks.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a malicious node detection method, which can be used for detecting and defending malicious node attacks in a wireless self-organizing network. Background technique [0002] A wireless ad hoc network is a multi-hop autonomous network formed by independent wireless temporary interconnection of wireless devices that do not depend on any fixed infrastructure. Due to the limited communication range of the nodes, the data transmission in the network needs to rely on cooperation with other intermediate nodes and adopt the method of multi-hop communication. Malicious nodes intruding into the network will attack the network by means of malicious packet loss, intentional delay, false routing, etc., resulting in a serious drop in network throughput or even network paralysis. In order to alleviate the dangers faced by the network, there are many methods based on cryptograp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/122H04W28/02H04L29/06
CPCH04L63/1416H04W12/12H04W28/0284H04W28/0289
Inventor 史琰刘博涛盛敏孙红光仲伟慧刘俊宇文娟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products