Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trustworthy Verification Method for Routers in Wireless Ad Hoc Networks

A wireless self-organizing network and verification method technology, which is applied in the field of router trusted verification and privacy protection systems, can solve the problems of privacy protection difficulties, topology variability, etc., and achieve good privacy protection, good applicability, and attack resistance strong effect

Active Publication Date: 2018-11-16
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The object of the present invention is to propose a kind of trusted verification method for routers in a wireless ad hoc network in order to solve The above-mentioned deficiencies in the prior art ensure the security of verification information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trustworthy Verification Method for Routers in Wireless Ad Hoc Networks
  • Trustworthy Verification Method for Routers in Wireless Ad Hoc Networks
  • Trustworthy Verification Method for Routers in Wireless Ad Hoc Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Based on the existing wireless router communication, the present invention combines the characteristics of the wireless network, network resource management, network security requirements, etc., obtains the correct router log information through formal reasoning, and encodes the router log information, and then uses the password The Merkle Hash Tree is used to verify the log information, which effectively guarantees the security of router communication in the wireless network and the requirements of attack detection.

[0033] In the present invention, the log information reasoning of the receiver and the intermediate forwarding router is carried out according to the handshake protocol communication rules for transmitting messages between nodes in the wireless ad hoc network, and the communication rules are described using NDlog syntax, as shown in Table 1.

[0034] Table 1 Communication rules

[0035]

[0036] In Table 1, there are 10 inference rules in total, where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted verification method for routers in a wireless self-organizing network, which mainly solves the problems of single attack detection types, poor privacy protection and incapable of self-verification in the prior art. The technical solution is: without directly reading the log information of the router, the sender uses the communication rules of the handshake protocol for transmitting messages between nodes in the wireless ad hoc network to infer the log information of the receiver and the intermediate forwarding node, combined with the The hash tree of the verifying party calculates the hash value, performs security verification on the log information deduced by the receiver and the intermediate forwarding router, and detects whether there is an active or passive attack on the intermediate forwarding router. The invention does not introduce third party participation, and is completely completed by nodes in the wireless ad hoc network, which protects the privacy of data, meets the security requirements of the wireless ad hoc network, and can be used for trusted verification and malicious attack protection of wireless ad hoc network routers.

Description

technical field [0001] The invention belongs to the technical field of wireless network communication, in particular to a router credible verification and privacy protection system, which can be used in wireless ad hoc networks. Background technique [0002] With the rapid expansion of the Internet scale, the surge of network traffic, and the continuous emergence of new network applications, new requirements are put forward for network devices such as routers. The rapid development of digital technology has continuously spawned numerous digital products, such as personal computers, PDAs, mobile phones, digital TVs, DVDs, MP3s, DV / DCs, and other digital products have gradually entered ordinary life. Most communication and digital devices can be connected and communicated by wireless network. Wireless network is a new technology that completely adopts distributed processing. It has the characteristics of strong mobility, large coverage area, high dynamic performance, and multi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W84/18H04L29/06H04W12/102
CPCH04L63/1466H04L63/1475H04W12/12H04W84/18
Inventor 马建峰孙聪李腾习宁卢笛冯鹏斌马鑫迪
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products