Security routing method for internet of things based on topological quick check

An Internet of Things and routing technology, applied in the field of Internet of Things, can solve problems such as the inability to fully guarantee the privacy and security of terminal data, and the acquisition of sensitive data by malicious organizations, and achieve the effect of reducing route discovery overhead, improving routing efficiency, and high routing success rate.

Inactive Publication Date: 2015-04-29
北京哈工创新计算机网络与信息安全技术研究中心 +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The sensing layer of the Internet of Things integrates various types of networks, and communication devices are often deployed in advance without special monitoring. Therefore, in the face of the highly open and heterogeneous sensing environment of the Internet of Things, only using privacy protection at the terminal level cannot Completely guarantee the privacy and security of terminal data, sensitive data is very likely to be obtained by malicious organizations during transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security routing method for internet of things based on topological quick check
  • Security routing method for internet of things based on topological quick check
  • Security routing method for internet of things based on topological quick check

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to facilitate understanding of the present invention, the present invention will be further described below in conjunction with the accompanying drawings.

[0028] Assume agency {O 1 ,O 2 ,...,O m}Deployed several sensing nodes in the area R {R 1 , R 2 ,...,R n}, the sensing nodes are equipped with RFID and WIFI devices, and the distribution is random and uniform. Geographically adjacent sensing nodes are connected to each other to form an ad hoc network in a local area. The perception node can relay the data interacted with the terminal through the perception network, and finally transmit it to the upper layer service, see figure 1 . The IoT security routing method based on topology quick verification includes the following four steps, see figure 2 :

[0029] 1) Each organization Oi and a given application Aj also have a preset forwarding strategy. While the sensing node inherits the corresponding strategy of the organization, it also converts the st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security routing method for internet of things based on topological quick check. The method comprises the following steps: initializing node routing strategies; defining the routing strategies by sensing nodes; and building cluster structure topology, inter-cluster interconnection and target nodes, wherein the strategies comprise a source strategy and a forwarding strategy; preferentially selecting a node with a slack forwarding strategy as a cluster center node; sharing each state through a proactive method, and achieving the inter-cluster interconnection; and transmitting a data packet to a target node by virtue of an AODV protocol with a tag. The data packet is relayed by virtue of the center node, so that relatively high routing success rate can be maintained; and meanwhile, routing overhead between highly connected nodes is much smaller than reactive routing overhead on the overall path, so that the routing discover overhead is reduced; the routing efficiency is improved; and the security routing method is suitable for a network environment which is relatively large in scale and relatively stable.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and in particular relates to a secure routing method for the Internet of Things based on fast topology verification. Background technique [0002] The Internet of Things is an information carrier based on the Internet, traditional telecommunication networks, etc., which enables all ordinary physical objects that can be independently addressed to realize interconnection and intercommunication. Most of its interconnection core technologies are based on standards, interoperable and self-configurable. communication protocol. At present, for security reasons, environments such as homes, offices, and factories mostly use autonomous sensing subnets. [0003] With the widespread application of sensing nodes such as smart terminals and mobile devices in the Internet of Things, in order to reduce costs and increase access area between sensing subnets, sensing nodes deployed by different ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/02
CPCH04W40/02H04W12/12
Inventor 孙燕殷丽华段文良刘耀
Owner 北京哈工创新计算机网络与信息安全技术研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products