Method for detecting ad hoc network helminth based on neighbor synergic monitoring
A detection method and network technology, applied in network topology, digital transmission system, electrical components, etc., can solve problems such as complexity, non-isolation of malicious nodes, waste of storage space, etc., and achieve the effect of low additional cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] The ad hoc network worm detection method based on neighbor cooperative monitoring is divided into the following three parts:
[0014] 1) Define the variables used in the model
[0015] a) Divide the nodes in the detection process into the following three states to distinguish:
[0016] N normal :normal status;
[0017] N suspicious : suspicious state;
[0018] N isolated : isolated state;
[0019] b) Suspicious factor r: the constraint value of node state transition, there are α neighbor nodes reporting node i as
[0020] The specific relationship between malicious nodes and suspicious factors is as follows:
[0021]
[0022] c) Monitoring period expire time: the time period for monitoring cache updates;
[0023] d) Packet loss rate: the number of data packets lost to a specific destination node per unit time, the upper limit of packet loss β;
[0024] 2) State transition between nodes
[0025] In this method, an evaluation field E is firstly added to each ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com