Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bug wormhole attack method aiming at safe, high-efficiency distance vector routing protocol

A distance vector, routing protocol technology, applied in wireless network protocols, access restrictions, electrical components, etc., can solve the problem that intermediate nodes cannot be reversed, and cannot tamper with routing table entry serial numbers and distance metric values.

Inactive Publication Date: 2010-07-07
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the one-way nature of the hash function, the intermediate node cannot deduce the chain value before the hash value in the destination node according to the existing hash value, so the malicious node cannot tamper with the sequence number and distance measurement of the routing table entry value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bug wormhole attack method aiming at safe, high-efficiency distance vector routing protocol
  • Bug wormhole attack method aiming at safe, high-efficiency distance vector routing protocol
  • Bug wormhole attack method aiming at safe, high-efficiency distance vector routing protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] 1. Routing table information format

[0033] For routing table information format, see figure 1

[0034] (1) Initial routing table settings

[0035] a.dest is set to itself, that is, the entry with itself as the destination.

[0036] b.nex_hop is set to itself like dest.

[0037] c.metric is set to 0, indicating that this routing entry is its own information, which is used to broadcast to the entire network.

[0038] d.seq_num is set to 0, and it will be added after each periodic update.

[0039] (2) Setting of the hash value in the routing table entry

[0040] a. The hash value in each entry of the routing table is generated by the node dest.

[0041] b. The hash value hash_num in the routing table entry is determined by the seq_num and metric of the distance from the destination dest.

[0042] The choice of two attack effects

[0043] After the network is stable, the routing table of each node contains the routing table entry information of all nodes in the ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a bug wormhole attack method aiming at safe, high-efficiency distance vector routing protocol based on distance vector routing protocol with wide application, the safety is improved; the bugs in the protocol are researched to institutively know the safety problems in other safety routing protocols in an Ad Hoc network, in particular to the safety of the distance vector routing protocol; the attack protocol in the invention is generated by researching the routing construction process of the SEAD protocol, the hash chain spreading and the verification mode of the hash chain value; based on multi-node combined attack, the invention has strong hidden property, compared with the normal node in the network, the attack node does not show special abnormal behavior and has strong camouflage capacity.

Description

technical field [0001] The invention relates to an attack method against a SEAD protocol (safe and efficient distance vector routing protocol) in a wireless ADHOC network, and belongs to the intersecting field of computer networks and wireless communications. Background technique [0002] With the emergence of new technologies and some advantages of wireless ADHOC networks that are different from traditional networks, its application scope has been extended to many fields. At the same time, these differences also prevent the security technology of traditional networks from being directly applied. There will be more security issues. [0003] SEAD is a secure routing protocol based on the DSDV protocol (distance vector routing protocol) jointly proposed by Yih-ChunHu and David Bjohnson of Rice University and Adrian Perrig of the University of California, Berkeley, and uses the node serial number and distance metric value. Each node in the network uses the same one-way hash fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/24H04W48/10H04W80/00
Inventor 王汝传吴万烽黄海平孙力娟赵传信祝世雄王文胜康荣保
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products