Black hole attack defense method in route discovery

A black hole attack and routing technology, applied in the field of black hole attack defense, can solve the problems of low practical applicability and difficulties of trusted third parties, and achieve good adaptability

Active Publication Date: 2020-04-07
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in wireless ad hoc networks, it is difficult to introduce a trusted third party, so the practical applicability of this method is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Black hole attack defense method in route discovery
  • Black hole attack defense method in route discovery
  • Black hole attack defense method in route discovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention uses a received routing request table T based on q and receive route response table T p The method of comparison obtains the set of suspicious nodes, and then uses the machine learning algorithm to obtain the destination sequence number threshold of the route response packet, and then the source node uses the received destination sequence number of the route response packet to compare with the threshold to determine whether a black hole attack occurs, and use it again. The comparison of the above two tables obtains the black hole node.

[0041] The present invention receives the routing request table T q , receive routing response table T p The knowledge of set theory and engineering optimization is applied in the steps of comparison and the step of applying machine learning algorithm to dynamically calculate the serial number threshold. The symbols used are shown in Table 1.

[0042]

[0043]

[0044] Note: 0

[0045] The present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a black hole attack defense method in route discovery, which mainly solves the problems that the prior art cannot detect internal attacks and cannot defend black hole attacks in route discovery. The technical solution is: the node establishes and compares the contents of the receiving routing request table and the receiving routing response table to determine whether there is a suspicious node. If there is a suspicious node, the threshold determined in the training set and the purpose of the received routing response packet Sequence numbers are compared: if the destination sequence number is greater than the threshold, it is determined that the node that sent the routing response packet is a black hole node, otherwise it is determined that the node that sent the routing response packet is a normal node; in the subsequent route discovery, only the data of the normal node is forwarded or received packets without forwarding or receiving packets from blackhole nodes. The invention does not introduce a third party, is completely completed by nodes in the wireless ad hoc network, meets the security requirements of the wireless ad hoc network routing, and can be used to defend against black hole attacks in the wireless ad hoc network routing discovery.

Description

technical field [0001] The invention belongs to the technical field of wireless network communication, in particular to a black hole attack defense method in route discovery, which can be used in a wireless self-organizing network. Background technique [0002] With the rapid development of the Internet and digital technology, people's demand for network bandwidth is increasing year by year, and there is a higher demand for the convenience and security of network access. As a new form of networking, wireless ad hoc network has the characteristics of strong mobility, large coverage area, flexible deployment, and low deployment cost compared with traditional wired networks. the most important way. However, the wireless ad hoc network has inherent defects such as equal status of each node, limited node energy, and limited node computing capability, and its routing protocol did not consider internal security issues at the beginning of its design. Vulnerable to black hole attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W40/28H04W84/18H04L29/06H04W12/126
CPCH04L63/1441H04W12/00H04W40/28H04W84/18
Inventor 马建峰孙聪李腾魏大卫袁涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products