Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack detection method, device and system

An attack detection and service node technology, applied in the field of communication, can solve the problems of RPL routing protocol security, increase network transmission overhead, meaningless routing update, etc.

Pending Publication Date: 2021-12-24
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the RPL routing protocol still has security issues
For example, a malicious node carries a false Rank in a DIO message to attract child nodes and affect the DODAG topology, thereby affecting data transmission and increasing network transmission overhead; or, a malicious node triggers the sequence number by updating the destination notification in the DIO message ( DAO trigger sequence number, DTSN), triggering a large number of meaningless routing updates, increasing network transmission overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method, device and system
  • Attack detection method, device and system
  • Attack detection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to facilitate understanding of the technical solutions of the embodiments of the present application, a brief introduction of related technologies of the present application is given as follows.

[0048] First, the relevant elements in RPL:

[0049] 1. Network (NETWORK): A network includes one or more RPL instances (RPLInstance), and each RPLInstance is uniquely identified by RPLInstanceID.

[0050] 2. RPLInstance: A RPLInstance includes one or more DODAGs, and each DODAG is identified by a DODAGID. Different DODAGs in the same RPLInstance have the same RPLInstanceID.

[0051] 3. DODAG: Each DODAG includes only one root node (root), and all nodes except the root node are nodes.

[0052] Second, DIO message, DAO message:

[0053] Nodes running the RPL routing protocol establish topology and routing by exchanging DIO messages, DAO messages, and DODAG information solicitation (DIO) messages.

[0054] The DIO message includes the information of the node itself....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an attack detection method, device and system, which can be used for detecting various security attacks in an RPL routing protocol and reducing the network transmission overhead in an attack detection process. The method comprises the steps that a root node receives first information, wherein the first information is obtained by monitoring DIO messages of N service nodes through M monitoring nodes, the N service nodes belong to a first DODAG, the M monitoring nodes belong to a second DODAG, the first DODAG is used for service transmission, the second DODAG is used for monitoring the first DODAG, the root node is the root node of the first DODAG and the second DODAG, and M and N are positive integers; and then, the root node determines malicious nodes in the N service nodes according to the first information.

Description

technical field [0001] The present application relates to the communication field, in particular to an attack detection method, device and system. Background technique [0002] A routing protocol for low-power and lossy networks (RPL) based on version 6 of the Internet Protocol (internet protocol version 6, IPv6), which is an IPv6 wireless personal area network (IPv6 over Low power wireless The main routing protocol used in personal area network, 6LoWPAN). The network topology established by using the RPL routing protocol can be one or more destination oriented directed acyclic graphs (Destination oriented directed acyclic graph, DODAG), each node in the network, and communication between nodes and the external network through DODAG. Exemplary, the network topology established based on the RPL routing protocol can be as follows figure 1 shown. [0003] In the process of establishing the network topology, one or more root nodes can be determined first. After the root node...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/122
CPCY02D30/70
Inventor 王东晖马吉德·哈巴赞
Owner HUAWEI TECH CO LTD