A dual-link wireless ad hoc network and security defense method in an emergency scenario

A wireless ad hoc network and security defense technology, applied in the field of network security, can solve problems such as the failure of alarm response information to arrive in time, the paralysis of network security defense functions, and the lack of consideration of data tampering, so as to achieve rapid security defense and avoid transmission delays. , the effect of lightweight management

Active Publication Date: 2021-06-25
XIDIAN UNIV
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the intrusion detection device captures abnormal data in the network, after the detection of the deep neural network, and determines the abnormality, the alarm response module is started, and the alarm response information is transmitted to the node that has been invaded by the abnormal data through the wireless link. In this process, the transmission time caused by the difference in physical location and the wireless link that becomes redundant and inefficient due to the transmission of all kinds of information may cause the alarm response information to not arrive in time, resulting in the situation that the node has been invaded ; There is only one intrusion detection device in the mobile ad hoc network, and the device is independent of other nodes in the network. Once the device is attacked by a malicious person, it will cause paralysis of the entire network security defense function and affect normal communication; the invention only Improvements have been made to the intrusion detection rate, without considering data tampering during transmission and malicious actors forging identities to join the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dual-link wireless ad hoc network and security defense method in an emergency scenario
  • A dual-link wireless ad hoc network and security defense method in an emergency scenario
  • A dual-link wireless ad hoc network and security defense method in an emergency scenario

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described below with reference to the accompanying drawings and specific embodiments:

[0058] Refer figure 1 Double-link wireless self-network network under emergency scene includes: including M mobile nodes n = {n 1 N 2 , ..., n i , ..., n M }, M ≥ 3, where N i Indicates the i-th movement node, 1 ≤ i ≤ m, in this embodiment, m = 18, each mobile node is used both as a source node, and as the destination node of other mobile nodes, and the intermediate node between the two mobile nodes The first link and transmission of other two mobile nodes are provided with other packets, public keys, and encrypted AES keys, which are not belonging to the security defense packets.

[0059] The first link set is independent of the second link. The two sides do not affect each other, independently transmit the respective information, and because only the security defense packets are transmitted on the first link, the second link to transmit large amoun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dual-link wireless ad hoc network and a security defense method in an emergency scenario, aiming to comprehensively improve the security defense capability of the wireless ad hoc network in an emergency scenario. The steps of the security defense method are: the source node passes the first The second link sends keys and encrypted and digitally signed other messages that are not security defense messages; the destination node detects abnormal messages through the feature matching module and the supervision engine module for the obtained valid messages, and sends them through the TCP / The IP filter module filters it out, and at the same time quickly broadcasts the characteristics of the new abnormal message through the first link; the new node to be added to the dual-link wireless ad hoc network in the emergency scenario checks the identity and hardware status through the supervisory engine module, And authorize new nodes without abnormalities, and broadcast authorization result information through the first link; other nodes that receive the broadcast information add the characteristics of the new abnormal message to their own abnormal message feature database, and agree to join the new node.

Description

Technical field [0001] The present invention belongs to the network security technology, which relates to a wireless self-assembled network and safety defense method, which specifically involves a double-link wireless self-network and security defense method under emergency scene. Background technique [0002] In human or natural burst emergencies, it is necessary to temporarily build emergency communication networks to protect rescue and must communicate. As emergency communication can be applied to more and more scenes, how to make better security defense has become an urgent need for emergency communication. Wireless self-assembled networks can be widely used in emergency communication because they do not rely on infrastructure facilities. Wireless self-assembled network is a decentralized distributed network, network topology random change, each node in the network can simultaneously use mobile terminals with transceiver functions and routers with forwarding functions, and no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L29/06H04W12/122H04W84/18H04W12/03
CPCH04L63/1441H04L63/1416H04L9/0631H04W84/18H04L9/0825H04L9/3247H04W12/108H04W12/03H04W12/088H04W12/121G06N3/08H04W12/009G06N3/04H04L9/3249
Inventor 程文驰陈春华王慕尧
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products