Reliable Ad hoc network security routing device

A technology of network security and reliability, applied in the field of communication, can solve problems such as routing protocol malicious node sabotage attacks, resource problems, etc.

Active Publication Date: 2013-10-09
深圳市国鸿信息技术有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Resource issues
Due to the existence of various potential security threats and loopholes in the design of routing protocols, routing protocols are extremely vulnerable to sabotage attacks by malicious nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reliable Ad hoc network security routing device
  • Reliable Ad hoc network security routing device
  • Reliable Ad hoc network security routing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. However, the examples given are not intended to limit the present invention.

[0019] The first idea of ​​the present invention is to propose a comprehensive trust evaluation method, including proposing the definition of trust, obtaining each attribute of trust, quantifying each attribute, and comprehensively obtaining the overall trust value. Then, based on the trust evaluation mechanism, a secure routing method in Ad hoc network is proposed, which can realize the security and high performance of the routing protocol.

[0020] Such as figure 1 As shown, the present invention provides a schematic structural diagram of a reliable Ad hoc network security routing device, including: a monitoring module 101, a feedback module 102, a trust module 103 and a r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a reliable Ad hoc network security routing device and relates to the field of communication techniques. The reliable Ad hoc network security routing device comprises a monitoring module, a feedback module, a trust module and a routing module, wherein the monitoring module is used for monitoring and recording states and behaviors of all nodes in a network and providing node and network information, the feedback module can judge whether the node can participate routing according to the current states of the neighbor nodes, the trust module is used for finish acquiring, calculating and updating node trust values, and the routing module is used for providing message formats in a routing protocol, routing strategies and a routing work process. The reliable Ad hoc network security routing device can effectively improve data transmission rate, reduces energy consumption of nodes in the network, improves network performance, meanwhile can resist to security attacks in the network and can guarantee security operation of the network routing protocol.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a reliable Ad hoc network security routing device. Background technique [0002] Secure routing ensures that the network can still maintain an appropriate data transmission rate under a certain degree of attack, and generally includes two stages: secure route discovery and secure data transmission. There have been a lot of research on secure route discovery, however, only secure route discovery is not enough, the attacker may participate in the route discovery correctly, but when launching an attack during data transmission, the phenomenon of maliciously discarding data packets will also exist, so Secure data transmission is very important. When certain paths or areas in the network are controlled by an attacker, secure data transmission can change the path to avoid the attacker for data transmission. [0003] The Ad hoc network is composed of a group of wireless mobile no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W40/02H04W52/02H04W12/122H04W12/68
CPCY02D30/50Y02D30/70
Inventor 何泾沙徐晶张玉强刘公政万雪姣霍晓珍轩兴刚
Owner 深圳市国鸿信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products