Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting ad hoc network helminth based on neighbor synergic monitoring

A detection method and network technology, applied in network topology, digital transmission system, electrical components, etc., can solve problems such as complexity, non-isolation of malicious nodes, waste of storage space, etc., and achieve the effect of low additional cost

Inactive Publication Date: 2009-05-27
XI AN JIAOTONG UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, authentication information is required to protect time stamp or location stamp information, which wastes a lot of storage space and does not isolate malicious nodes
[0005] The neighbor detection method based on trusted nodes assumes that there is a trusted authorized node (CA) with unlimited resources in the network, and other nodes obtain the logical address of the node through the CA, and then the neighbor node judges the suspicious node by the location information of the node. The core of the algorithm is to verify the exact node position, but it is too complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting ad hoc network helminth based on neighbor synergic monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The ad hoc network worm detection method based on neighbor cooperative monitoring is divided into the following three parts:

[0014] 1) Define the variables used in the model

[0015] a) Divide the nodes in the detection process into the following three states to distinguish:

[0016] N normal :normal status;

[0017] N suspicious : suspicious state;

[0018] N isolated : isolated state;

[0019] b) Suspicious factor r: the constraint value of node state transition, there are α neighbor nodes reporting node i as

[0020] The specific relationship between malicious nodes and suspicious factors is as follows:

[0021]

[0022] c) Monitoring period expire time: the time period for monitoring cache updates;

[0023] d) Packet loss rate: the number of data packets lost to a specific destination node per unit time, the upper limit of packet loss β;

[0024] 2) State transition between nodes

[0025] In this method, an evaluation field E is firstly added to each ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting ad hoc network worm based on neighbor collaborative monitoring. The method does not require special hardware support, and uses a collaborative relationship of nodes in the ad hoc network to realize simple and feasible worm attack detection. Against attack feature of worm in the ad hoc network, the detection method provided by the invention is divided into three stages, namely malicious node detection, warning information scatter and malicious node isolation, thereby simply and feasibly detecting the worm attack.

Description

technical field [0001] The invention belongs to the field of wireless mobile ad hoc network security, in particular to an ad hoc network worm detection method based on neighbor collaborative monitoring. Background technique [0002] The existing classic worm detection methods in ad hoc network mainly include: multipath statistical analysis method, time stamp and location stamp method, neighbor detection method based on trusted nodes. [0003] The multipath statistical analysis method judges the worm attack through the static statistics of the routing information. This method does not need to change the routing protocol or introduce an additional security service system, and only requires a small overhead in statistical analysis, and is also suitable for other attack detection, but the disadvantage is that the communication of nodes in the network must wait for more than two chains It starts only when the road is connected, and the communication delay becomes larger. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L29/06H04W84/18
Inventor 杨新宇侯光霞
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products