Ad Hoc network security trust method based on reference node strategy

A network security and reference node technology, which is applied in the field of AdHoc network security trust based on reference node strategy, can solve problems that cannot be solved fundamentally, the effect of message attack defense is not obvious, and the defense model has a single attack mode, etc. Achieve good defense effect, strong scalability and adaptability, and defense against various attacks

Active Publication Date: 2018-01-19
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing attack methods are diverse, and at the same time, various attack methods do not exist in a single way, and most of the existing defense models only target a single attack method
Aiming at the impact of data message discarding attack, the main defense methods are: Based on the method of multi-path data transmission, Karlof first proposed the selective discarding attack in the literature, and proposed to use multi-path delivery to deal with this attack, but did not propose a detailed When multiple paths are close to the BS (Base Station), it is easy to merge into one path, which can implement selective discarding attacks, but cannot solve the problem fundamentally; while the schemes proposed in the existing literature have a large node control overhead The problem; and based on the neighbor node inspection method, the proposed Watchdog algorithm, the node works in promiscuous mode, when the node forwards the message to the next hop node, it uses the characteristics of the wireless signal exposed to the air to monitor the next hop Whether the node continues to forward the message; in addition, the neighbor node’s hand-raising penalty strategy based on time statistics proposed in the existing literature is based on the assumption that the malicious node does not discard the RREQ and RREP messages, which cannot defend against black hole attacks. Node interference; moreover, the node evaluation method based on statistical analysis proposed in the existing literature has a large amount of calculation, and is only applicable to the network model with the sink node as the communication center
For black hole attacks, the existing literature proposes the method of using virtual nodes as the target nodes to judge the attack nodes. Since the target nodes are virtual nodes, it is easy to be seen through by the attack nodes; the existing trust models are mainly based on Bayesian model, vector model and D-S Evidence theory, etc., the trust evaluation model proposed in the existing literature has a certain effect on complete data packet attacks, but the defense effect on partial packet discard attacks is not very obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ad Hoc network security trust method based on reference node strategy
  • Ad Hoc network security trust method based on reference node strategy
  • Ad Hoc network security trust method based on reference node strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0073] The present invention comprises the following steps:

[0074] Step 1: Build a trust model

[0075] 1. Packet statistics strategy based on direct trust model

[0076] Direct trust (Direct_Trust) refers to the trust relationship obtained by nodes collecting communication packet loss rate information through a strategy based on packet statistics and evaluating through the Bayesian trust model. The evaluation of Bayesian trust model is to calculate the trust value of nodes in a probabilistic way according to the communication result set of observed nodes. The Bayesian model under direct trust evaluation is described as follows: the destination node collects message information through a strategy based on message statistics, and calculates the message loss rate. times; if the packet loss rate of the node is normal, then α=a+1, and if t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Ad Hoc network security trust method based on a reference node strategy and belongs to the field of network security. The method specifically comprises the following stepsof computing a trust value of each node through a trust model, sending the trust value to a trust value statistical node, making the trust value statistical node count a weighted trust value of each node, updating a reference node and the trust value statistical node, and lastly, initiating the reference node strategy through the reference node. The method has the advantages that a black hole attack node in the Ad Hoc network can be quickly discovered, and meanwhile, the method has a good defense effect on a way of hybrid of a data message attack and the black hole attack; and the method has strong expandability and adaptability.

Description

technical field [0001] The invention belongs to the field of network security and relates to an Ad Hoc network security trust method based on a reference node strategy. Background technique [0002] The Ad Hoc network is a wireless mobile network that does not rely on any fixed infrastructure, and has the characteristics of no center, self-organization, high dynamics and limited energy. It has broad application prospects in battlefield environment, emergency rescue and mobile conference. At the same time, its security problems are more prominent, and the network anti-attack capability is particularly vulnerable. Therefore, it is necessary to design an effective security routing algorithm. [0003] In the mobile Ad Hoc network, because there is no fixed infrastructure, the communication is completely established on the wireless communication between nodes. When two nodes are within the communication coverage of each other, they can communicate directly. However, the coverage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/00H04W40/02H04W84/18H04W12/122H04W12/126
Inventor 欢水源蒋溢黄梅根祝清意黄奕
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products