A secure communication method between mobile nodes in mobile self-organized network

A mobile ad hoc network and mobile communication technology, which is applied in the field of secure communication between mobile nodes in the mobile ad hoc network, and can solve problems such as security attacks, information destruction, and peers that cannot ensure communication

Inactive Publication Date: 2005-09-14
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

③ There may be threats to information integrity; when the network is attacked, due to the weakening of wireless signals during propagation, and human interference, information will be destroyed or interrupted during transmission
④ Facing the threat of counterfeit mobile nodes in the network; usually the communication of mobile nodes in the Ad Hoc network is not authenticated, because without identity authentication, any mobile communication node cannot ensure the opposite end of communication with it, that is The real communication peer; therefore, an attacker can impersonate a node in the network to communicate with other nodes, obtain unauthorized resources and sensitive information, and thus threaten the security of the entire network
⑤ Security threats of routing protocols; Ad Hoc network routing protocols may be an important target of network attacks, because existing Ad Hoc network routing protocols, including TORA, AODV, DSR, OLSR and ZRP, rarely consider their security issues , the attacker can obtain the routing data by eavesdropping without interfering with the normal routing protocol; or take the initiative to attack and continuously send data packets to the network to achieve the purpose of the attack; in summary, the main problem faced by the Ad Hoc network is that it is easy to subject to various security attacks
Only according to a certain actual environment and for a certain security weakness, a corresponding security solution can be proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication method between mobile nodes in mobile self-organized network
  • A secure communication method between mobile nodes in mobile self-organized network
  • A secure communication method between mobile nodes in mobile self-organized network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Modern IP network, its protocol reference model consists of physical layer, data link layer, network layer, transport layer and application layer from bottom to top, and the method of the present invention is implemented in the second layer of data link layer. This layer is mainly composed of control plane, data plane and framing plane. The data plane transmits the data sent from the network layer to the framing plane, so as to pass it to the communication partner; at the same time, the data plane transmits the data sent from the framing plane to the network layer for processing; the framing plane transmits the upper layer data sent from the data plane After adding the frame header of the data link layer to the control message sent by the control plane, it is transmitted to the communication peer through the physical layer; at the same time, the framing plane sends the data received from the physical layer to the data plane and the control plane respectively. The contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention disclose a secret communication method among mobile nexuses in a mobile self-organized network characterizing in applying Diffie-Hellman protocol and a public cryptographic key digital signature to realize double-way discrimination when setting up Ad Hoc mobile self-organized network link and deriving cryptographic key for the cipher of data link layer data frame and data completion, which realizes safety of segment by segment of the link, ensures that different links apply different working cryptographic keys in a mobile Ad Hoc network, solves the problem of counterfeit communication nexus and tap network and simplifies the management to said network link layer.

Description

technical field [0001] The invention relates to a method for ensuring safe communication between mobile nodes when a link is established in a mobile ad hoc network (Ad Hoc network for short). Background technique [0002] Ad Hoc network is a temporary autonomous wireless system composed of mobile nodes. As a wireless mobile network, it has many differences from traditional mobile networks. The main difference is that it does not rely on any fixed network facilities. The network interconnection between nodes is completed through the mutual cooperation between mobile nodes. Ad Hoc networks, in addition to being mainly used in the military, security-sensitive environments, and some situations that require emergency networking, are gradually developing into commercial environments, such as sensor networks, virtual classrooms, and home networks. [0003] The characteristics of the Ad Hoc network are: ① There is no base station or mobile switching center in the network; if two mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32
Inventor 罗超祝世雄曾兵杨鹏
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products