Method for detecting black hole attacks in clustering self-organized networks

A self-organizing network, black hole attack technology, applied in network topology, electrical components, wireless communication and other directions, can solve the problems of less research on mutual cooperation and cooperation, difficult, not considering multiple malicious nodes, etc. processing effect

Inactive Publication Date: 2013-02-13
INST OF INFORMATION ENG CAS
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, some researchers have proposed solutions to different black hole problems, such as redundant routing method, node credit measurement method, Watchdog method, downstream neighbor node verification method, etc., but these technical methods are based on a single malicious node. , without taking into account the existence of multiple malicious nodes
[0005] There are few studies on the mutual cooperation between multiple malicious nodes. It is known that an adjustable downstream neighbor node cyclic verification method is proposed by combining the prohibition of intermediate nodes from responding to RREQ packets and the verification method of downstream neighbor nodes. Source: the node in this method The authenticity of the source information is judged by checking the adjacent nodes of the node to be verified, and the recursive multi-hop verification is used to prevent collusion attacks. In order not to fall into the infinite loop verification, an adjustable parameter variable verification parameter is introduced, and the It is very difficult to determine the parameters, so this method is also difficult to effectively overcome the situation that there are multiple malicious nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting black hole attacks in clustering self-organized networks
  • Method for detecting black hole attacks in clustering self-organized networks
  • Method for detecting black hole attacks in clustering self-organized networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0045] Such as figure 1 As shown, the self-organizing network includes one or more base stations 1, and each base station 1 has one or more cluster head areas within the coverage area. The figure shows the first cluster head area 2, the second cluster head area 3 and In the third cluster head area 4, there is one cluster head node and one or more terminal nodes in the cluster head area. For example, the first cluster head area 2 includes terminal node 11 to terminal node 1n, a total of n terminal nodes.

[0046] Such as figure 2 As shown, a black hole attack detection method in a clustered self-organizing network according to the present invention, the method comprises the following steps:

[0047] Step 1: Instal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting black hole attacks in clustering self-organized networks. The method includes that step one, a monitoring device is arranged at a base station; step two, cluster head areas in self-organized networks in an area covered by the base station are monitored in real time; step three, whether abnormal cluster head areas exist in the monitored area is judged, if the abnormal cluster head areas exist, step four is performed, and if not, the step two is repeated; step four, credit rates of terminal nodes in the abnormal cluster head areas are detected, and suspicious nodes are found to form a suspicious node set S1; step five, flow differences of nodes in the S1 are detected, and black hole attack nodes are found to form a black hole attack node set S2; and step six, the monitoring device sends early warning prompts. According to the method, not only a single malicious node attack is solved, the problem that a plurality of single malicious nodes are cooperated to attack can be effectively solved, alarms can be sent, and timely defense and treatment to the black hole attacks are facilitated.

Description

technical field [0001] The invention relates to a detection method of a black hole attack in an ad hoc network, belonging to the field of wireless sensor network security. Background technique [0002] Ad hoc network is a multi-hop temporary autonomous system composed of a group of mobile nodes with wireless transceivers. It can realize the automatic organization and operation of the network with any mesh topology without relying on any preset infrastructure, and can be widely used in military tactical communication, emergency communication and other communication occasions that require rapid deployment and dynamic networking. , is a research field with great practical application value. [0003] However, due to the characteristics of open media, dynamic topology, distributed collaboration and limited capacity, ad hoc networks are vulnerable to attacks, especially for their routing protocols. "Black hole" is one of the common attack methods. It obtains the control of netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W84/18H04W12/122
Inventor 翟立东张方娇朱宇佳任云龙
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products