Attack detection method, device and system
An attack detection and service node technology, applied in the field of communication, can solve the problems of RPL routing protocol security, increase network transmission overhead, meaningless routing update, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] In order to facilitate understanding of the technical solutions of the embodiments of the present application, a brief introduction of related technologies of the present application is given as follows.
[0048] First, the relevant elements in RPL:
[0049] 1. Network (NETWORK): A network includes one or more RPL instances (RPLInstance), and each RPLInstance is uniquely identified by RPLInstanceID.
[0050] 2. RPLInstance: A RPLInstance includes one or more DODAGs, and each DODAG is identified by a DODAGID. Different DODAGs in the same RPLInstance have the same RPLInstanceID.
[0051] 3. DODAG: Each DODAG includes only one root node (root), and all nodes except the root node are nodes.
[0052] Second, DIO message, DAO message:
[0053] Nodes running the RPL routing protocol establish topology and routing by exchanging DIO messages, DAO messages, and DODAG information solicitation (DIO) messages.
[0054] The DIO message includes the information of the node itself....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


