SAODV optimization method capable of effectively fighting against black hole attacks

A technology of black hole attack and optimization method, which is applied in the field of communication, can solve problems such as inability to effectively resist black hole attacks, achieve the effects of improving reliability and security, improving transmission efficiency, and reducing packet loss rate

Inactive Publication Date: 2017-05-10
陕西尚品信息科技有限公司
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the deficiency that the existing technology cannot effectively resist black hole attacks, the present invention proposes a SAODV optimization method that effectively resists black hole attacks, which is suitable for Ad-Hoc self-organizing networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SAODV optimization method capable of effectively fighting against black hole attacks
  • SAODV optimization method capable of effectively fighting against black hole attacks
  • SAODV optimization method capable of effectively fighting against black hole attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] A further detailed description of the technical solution of the present invention is given below in conjunction with the accompanying drawings, so that those skilled in the art can understand the solution of the present invention more clearly, but the protection scope of the present invention is not limited thereby.

[0044] For ease of understanding, the principle of resisting black hole node attacks of the present invention is briefly given at first: in the Ad-hoc network, when the route selection mode is adopted, the malicious node adds false available channel information to the received route request packet in the route discovery stage, It is a malicious attack that tricks other nodes into establishing a routing connection with it, and then discards the data packets that need to be forwarded, resulting in data packet loss.

[0045] In order to prevent the black hole node from modifying the information contained in the routing request packet, the present invention inn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a SAODA optimization method capable of effectively fighting against black hole attacks. The technical schemes are as follows: based on the Hash function and the digital signature of a SAODA protocol, adding the concept of fidelity to the middle nodes to serve as the determination basis for their trustworthiness; during the route establishing and data transmitting stage, conducting dynamic calculation and constant updating to the fidelity of the nodes; and when the fidelity reaches a too small point, determining that the node is a black hole node and abandoning it. The method of the invention solves the problem that black hole attacks could not be solved in the existing SAODV protocol. With the method, the black hole node could be identified, therefore, making the network more reliable and more secure. The method is suitable for the Ad-Hoc network.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an SAODV optimization method for effectively resisting black hole attacks, which is suitable for Ad-Hoc self-organizing networks. Background technique [0002] Ad-Hoc (self-organizing network) is a wireless network composed of independent nodes and each node can join, leave and move freely. The topology of its network will change frequently as the state of the nodes changes. In addition, each node in the network has the same possibility of being attacked, so in the Ad-Hoc network, it is necessary to introduce a definite mechanism to prevent malicious attackers from tampering with routing data or discarding data, so as to ensure the security performance of the network. [0003] At present, most Ad-Hoc networks use the on-demand routing protocol—AODV protocol. Each node does not need to maintain accurate routing information, that is, only when the source node wants to send ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W84/18H04L29/06H04W12/122
CPCH04L63/1441H04L63/1466H04W12/00H04W84/18
Inventor 李雅颂李朋云王艳
Owner 陕西尚品信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products