Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

OLSR protocol black hole attack method for unmanned aerial vehicle ad hoc network

A black hole attack and drone technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of high mobility drone ad hoc network inapplicability, network damage and other problems, and achieve good scalability.

Inactive Publication Date: 2020-11-06
SOUTHEAST UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Purpose of the invention: In view of the above problems, the present invention proposes an OLSR protocol black hole attack method for UAV Ad Hoc Networks. This method makes the execution node approach and attack the central node first, thereby occupying the position of the central node, and then attacks the network. Black hole attack to solve the problem that the existing black hole attack cannot be applied to the high-mobility UAV ad hoc network, and cause greater damage to the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • OLSR protocol black hole attack method for unmanned aerial vehicle ad hoc network
  • OLSR protocol black hole attack method for unmanned aerial vehicle ad hoc network
  • OLSR protocol black hole attack method for unmanned aerial vehicle ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] A black hole attack method of OLSR protocol for UAV Ad Hoc Network, such as figure 1 As shown, it is applied to the UAV ad hoc network system, and the architecture of the UAV ad hoc network system is as follows image 3 As shown, according to the different requirements of collaborative computing and flight control for the communication environment, the UAV network is divided into two parts: the internal communication of the fleet and the external communication of the fleet. The internal communication of the cluster is realized by Adhoc network plus OLSR self-organizing network technology, in which the edge position of the execution node tries to be close to the central node and occupy its position. Include the following steps:

[0046] S1, build the drone ad hoc network, set the execution node to operate the drone ad hoc network, first the execution node needs to calculate and attack the node in the center of the regional network through the routing table information. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an OLSR (Optimized Link State Routing) protocol black hole attack method for an unmanned aerial vehicle ad hoc network. The problem that an existing black hole attack method cannot be applied to a high-mobility drone ad hoc network is solved, the formation and the motion trail of the drone are changed, and finally the purpose of obtaining the network control right is achieved. The method comprises the following implementation steps that: an execution node calculates a node in a network center in an area through a routing table; the execution node reaches the transmission range of the central node through the time delay information transmitted by the data packet; the execution node sends a large number of Hello message packets of which the IP addresses are randomly modified to the central node to occupy the position of the central node; and node tampering is executed or the data packet in the network is discarded, and black hole attack is performed on the network. According to the method, the motion trail of the unmanned aerial vehicle ad hoc network can be drastically changed, the attack effect is good, the network is greatly damaged, and the method has obvious advantages in the aspects of changing the formation and the motion trail of the unmanned aerial vehicle, obtaining the control right of the network and the like.

Description

technical field [0001] The present invention relates to the technical field of mobile multi-hop ad hoc networks, in particular to an attack method for unmanned ad hoc networks, specifically an OLSR protocol black hole attack method for unmanned ad hoc networks, which can be used to attack unmanned The machine-ad hoc network conducts efficient attacks, changes the trajectory of the drone, and obtains network control. Background technique [0002] After nearly a hundred years of development, from the 1920s to the present, drone technology has attracted widespread attention. Unmanned Aerial Vehicle (UAV) is an aircraft managed by a control station (including remote control and autonomous flight), also known as Remotely Piloted Aircraft. However, due to the bottleneck of a single UAV performing tasks such as reconnaissance and target attack, organizing multiple UAVs with different functions is an important way of combat. Therefore, multi-UAV collaborative technology has become...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W40/02H04W40/22
CPCH04W40/02H04W40/22
Inventor 熊润群熊澜罗军舟
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products