Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure routing protocol based on trust detection in vehicle-mounted ad hoc network

A technology of vehicular ad hoc network and routing protocol, which is applied in the field of vehicular ad hoc network, and can solve the problem of deliberate discarding of malicious nodes with short survival time of vehicular network links

Inactive Publication Date: 2015-12-16
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the deficiencies of the existing VANET routing protocols, mainly aiming at the short life time of VENET links and the inability of traditional cryptographic system-related methods to solve the problem that malicious nodes intentionally discard data packets. Starting with the multi-channel characteristics of the network, a more flexible and stable security routing protocol based on trust detection is designed. The protocol first uses a multi-channel selection monitoring mechanism to allow vehicle nodes with the same movement trend to work on the same service channel, while movement The channel transmission link of nodes with the same trend is relatively stable, and data transmission and monitoring on the same channel can also reduce channel synchronization delay and data monitoring. Then, by monitoring and observing the routing behavior of nodes, you can Establish a trust list of neighbor nodes to assist nodes in routing decisions, which can effectively avoid malicious discarding of routing packets by nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure routing protocol based on trust detection in vehicle-mounted ad hoc network
  • Secure routing protocol based on trust detection in vehicle-mounted ad hoc network
  • Secure routing protocol based on trust detection in vehicle-mounted ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings, but the implementation and protection scope of the present invention are not limited thereto.

[0049] Such as figure 1 Shown is the model established by the traffic density sensing method in the multi-channel selective monitoring mechanism of the present invention. First, the road is divided into k units, and the interval of each unit is a single communication distance R, and the value of the number of cells k is given by The ratio of the length of each road to a single communication distance is determined. According to the division of cells, the distribution of the number of vehicles in two opposite directions in different cells of the road is defined as two one-dimensional arrays, which are expressed as M[k ]=[m 1 ,m 2 ,...,m i ,...,m k ], 1≤i≤k and N[k]=[n 1 ,n 2 ,...,n i ,...,n k ], 1≤i≤k, where m i and n i respectively represen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure routing protocol based on trust detection in a vehicle-mounted ad hoc network. The secure routing protocol comprises the steps of firstly, according to multi-channel selection monitoring mechanism, allowing vehicle nodes with a consistent movement trend to work on the same service channel and achieve data monitoring and transmission tasks on the same service channel; the vehicle nodes acquiring routing packet forwarding behaviors of adjacent nodes through channel monitoring to establish direct trust of the adjacent nodes; and meanwhile, detecting the received hello message packets periodically transmitted by the adjacent nodes, obtaining recommend trust through a node trust list attached to the packets, then calculating and maintaining the trust list of the adjacent nodes, and assisting the nodes in making routing decisions. The routing protocol can maintain a relatively stable communication link in a vehicle-mounted environment with a rapid change in the topology, has high delivery rate and low transmission delay, and can also effectively avoid malicious behaviors of discarding routing packets by nodes through trust detection.

Description

technical field [0001] The invention relates to vehicle-mounted ad hoc network technology, in particular to a security routing protocol based on trust degree detection in the vehicle-mounted ad hoc network. Background technique [0002] With the development of intelligent transportation systems, the research on VANET-related technologies has been sought after by people. In order to meet the communication needs of VANETs in special environments, the IEEE Association formulated the bottom layer dedicated to VANETs in 2000. The communication protocol IEEE802.11p, which adopts a multi-channel scheme, divides the 75MHz bandwidth of 5.9GHz into one control channel (represented by CH178) and six service channels (represented by CH174, CH176, CH180, CH182 and CH184), as Vehicle nodes provide applications such as safety warnings, assisted driving, data sharing, and workshop entertainment. As the basic research of VANET, the routing protocol plays a decisive role in the performance o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/02H04W12/121
CPCH04W12/00H04W24/02H04W12/009H04W12/66H04W12/126H04W12/122
Inventor 秦华标翁锦深管伟祥
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products