Method and node equipment for improving mobile self-network grouping security

A mobile ad hoc network, node equipment technology, applied in security devices, data exchange networks, network traffic/resource management, etc. The effect of improving safety

Inactive Publication Date: 2008-06-11
SIEMENS AG
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The purpose of the present invention is to provide a method and node equipment for improving ad hoc security, so as to solve the problem that the ad hoc network security decreases due to frequent sending of RREQ by malicious nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and node equipment for improving mobile self-network grouping security
  • Method and node equipment for improving mobile self-network grouping security
  • Method and node equipment for improving mobile self-network grouping security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The route discovery process of AODV is as follows: the source node sends RREQ, and if the intermediate node has a fresh enough route to the destination node, it sends a route reply (Route Reply, RREP) to the source node; if the intermediate node does not have a fresh enough route to the destination node path, the RREQ is forwarded. The intermediate node will generate and save the corresponding routing table entry according to the RREQ. After the destination node receives RREQ, it will send RREP to the source node. When the source node receives the RREP, it selects an appropriate path, thus completing the route discovery process, and then the data packet is sent to the destination node along this path.

[0048] It can be seen that AODV sends RREQs to neighboring nodes by broadcasting, until the path to the destination node is found, the intermediate nodes will continue to broadcast this RREQ. When malicious nodes frequently send RREQs, the entire ad hoc network will be...

Embodiment 2

[0084]Compared with the first embodiment, the second embodiment mainly changes in the sequence of steps of increasing the RREQ counter and comparing the counter value with RREQ_th. In Example 1, first add 1 to C[A], and then compare C[A] and RREQ_th[A]; while in Example 2, first compare C[A] and RREQ_th[A], and then compare C[A] Add 1, that is, step 303 and step 304 are exchanged.

[0085] Also to figure 2 For example, node P1 sets RREQ_th[A]=3:

[0086] In Embodiment 1: when node P1 saves more than 3 RREQ routing entries from node A, it no longer saves routing entries for it, and does not forward RREQs for it at the same time, but the routing entry count value C[A] It will still be incremented, for example, when node P1 receives the fourth RREQ from node A, C[A]=4, when receiving the fifth RREQ, C[A]=5, and so on;

[0087] In the second embodiment: when the number of RREQ routing table entries from node A stored by node P1 exceeds 4, it will no longer save routing table i...

Embodiment 3

[0091] The working principle of ad hoc network DSR is similar to that of AODV. It also uses the source node to broadcast RREQ to find the route discovery process of the destination node. Among them, the intermediate node will generate and save the routing table entry for RREQ. The difference is that AODV records the routing information in the node, while DSR adds the routing information to the RREQ. When the destination node receives the RREQ, it will return the RREP to the source node according to the node position in the RREQ. DSR is a simple and effective routing protocol. It does not need to periodically update the routing information in the network, thereby omitting the routing overhead caused by maintaining routing information when there is no transmission task.

[0092] Because AODV does not maintain complete routing information and does not participate in the exchange of routing tables, it is a routing protocol that obtains routes on demand; and DSR is different from AO...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for improving security of a mobile ad-hoc network. The method comprises the following procedures: a threshold that an intermediate node can transfer the quantity of a routing request RREQ of a source node is set; the intermediate node receives the RREQ which comes from the source node, generates and saves RREQ routing list items; if the total of the RREQ routing list items saved for the source node reaches the threshold is judged, the RREQ is abandoned if the total of the RREQ routing list items saved for the source node reaches the threshold. The invention limits the RREQ routing list items from the same source node at each node, effectively restrains the RREQs which are frequently sent by hostile nodes, thereby preventing that the hostile nodes occupy network resources and node resources, effectively strengthening the ability of the network against attacks and improving the security of the ad hoc network; and the invention sets and makes a dynamic adjustment to the quantity threshold of the RREQ by comprehensively considering the factors such as the congestion degree of the network, the quantity of the nodes and the rate of sending RREQs and so on, thereby ensuring that the effect of rejecting the frequent sending of the hostile nodes is more apparent. The invention also discloses node equipment.

Description

technical field [0001] The invention relates to the technical field of mobile ad hoc networks, in particular to a method and node equipment for improving the security of mobile ad hoc networks. Background technique [0002] Mobile ad hoc network (ad hoc) is a special wireless mobile network in which all nodes (Node) devices in the network have equal status and do not need to set up any fixed infrastructure. In an ad hoc network, nodes have the ability to forward messages, and the communication between nodes may be forwarded by multiple intermediate nodes, that is, multi-hop (MultiHop). This is the most fundamental difference between an ad hoc network and other mobile networks. The nodes in the ad hoc network not only have the functions required by ordinary mobile terminals, but also have the characteristics of no center, self-organization, multi-hop routing and dynamic topology. It is significantly different from ordinary cellular mobile communication networks and fixed com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/28H04L12/24H04W12/122H04W28/02
Inventor 隋爱芬郭代飞F·雷纳
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products