Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ad hoc network security routing method based on trust model

A network security and routing technology, applied in the field of communication, can solve the problems of resource problems, malicious node destruction attacks of routing protocols, insecurity, etc., and achieve the effect of reducing energy consumption, reducing routing overhead, and ensuring security.

Inactive Publication Date: 2013-10-09
山东政信大数据科技有限责任公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Potential insecurity exists in an open and shared environment, which makes mobile Ad hoc networks more vulnerable to malicious attacks such as eavesdropping and counterfeiting than traditional wired networks
At the same time, because the nodes in the network are in dynamic changes and the network topology is constantly changing, the original security protection scheme for static networks is no longer applicable.
[0004] (2) Resource issues
Due to the existence of various potential security threats and loopholes in the design of routing protocols, routing protocols are extremely vulnerable to sabotage attacks by malicious nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ad hoc network security routing method based on trust model
  • Ad hoc network security routing method based on trust model
  • Ad hoc network security routing method based on trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. However, the examples given are not intended to limit the present invention.

[0031] The first idea of ​​the present invention is to propose a comprehensive trust evaluation method, including proposing the definition of trust, obtaining each attribute of trust, quantifying each attribute, and comprehensively obtaining the overall trust value. Then, based on the trust evaluation mechanism, a secure routing method in Ad hoc network is proposed, which can realize the security and high performance of the routing protocol.

[0032] Such as figure 1 As shown, the present invention provides a schematic flow chart of an Ad hoc network security routing method based on a trust mechanism, including:

[0033] Step S101, define trust, obtain attributes involved i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Ad hoc network security routing method based on the trust model and relates to the technical field of communication. The method comprises the steps of defining trust, obtaining properties involved with the trust, and quantizing and evaluating the properties; acquiring overall credibility of nodes comprehensively, wherein the overall credibility is the composition of the quantized properties; monitoring the state and the behavior of each node in a network, recording the state and the behavior in the network, and providing information of the nodes and the network; monitoring the current state of a neighbor node and judging whether the node is capable of participating in the routing; acquiring, calculating and updating trust values of the nodes; providing the message format, the routing strategy and the routing process inside a routing protocol; analyzing and verifying the security and performance of the routing. According to the Ad hoc network security routing method based on the trust model, energy consumption of the nodes in the network is effectively reduced, network performance is improved, security attack in the network can be resisted, and safe operation of the network routing protocol is guaranteed.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a trust mechanism-based Ad hoc network security routing method. Background technique [0002] The Ad hoc network is composed of a group of wireless mobile nodes. Each node in the network has the functions of a host and a router at the same time. It can not only complete its own communication but also forward information for other nodes, so it is not only widely used in military It also plays a big role in daily life, such as building communication networks in areas with harsh conditions and complex geographical locations. The mobile ad hoc network has the characteristics of self-organization, dynamicity, multi-hop, wireless, distribution, terminal limitation, and security vulnerability. In practice, the network still faces many challenges and problems, mainly including limited energy, communication bandwidth, network security, and network scalability and recoverability. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/00H04W40/02H04W12/122
CPCY02D30/70
Inventor 何泾沙霍晓珍赵斌刘公政万雪姣徐晶
Owner 山东政信大数据科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products