Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting malicious node in wireless ad-hoc network based on behavioural cognition

A wireless self-organizing and malicious node technology, applied in the field of communication, can solve the problems of non-malicious node credibility reduction, high delay, congestion, etc., to avoid the reduction of trust, improve network reliability, and reduce negative effects

Active Publication Date: 2019-03-29
XIDIAN UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a wireless ad-hoc network, due to the changeable network status, in addition to malicious behavior, network congestion, buffer overflow and other reasons may also cause network packet loss or high delay.
Credibility evaluation based only on packet loss rate and delay statistics can easily lead to a decrease in the credibility of non-malicious nodes, causing normal nodes to be misjudged as malicious nodes and move out of the network, which seriously affects the performance of wireless ad hoc networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting malicious node in wireless ad-hoc network based on behavioural cognition
  • Method for detecting malicious node in wireless ad-hoc network based on behavioural cognition
  • Method for detecting malicious node in wireless ad-hoc network based on behavioural cognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0029] refer to figure 1 , the implementation steps of this example are as follows.

[0030] Step 1, the node periodically monitors the working status of the neighboring nodes.

[0031] (1a) Each node in the network is set in the promiscuous listening mode, that is, the node can receive all data packets within the communication range, regardless of whether it is the next-hop node of the data packet;

[0032] (1b) The node periodically monitors the behavior of all neighbor nodes, that is, monitors the following three situations:

[0033] Packet loss: The specific statistical parameter is the number s of correctly forwarded data packets among the data packets sent by this node and forwarded by node i 1i and the number of lost packets f 1i ;

[0034] Delay: The specific statistical parameter is the number of data packets that have not timed out among the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a malicious node in a wireless ad-hoc network based on behavioural cognition, and mainly solves the problem that the false detection rate is high due tothe fact that network congestion is not considered in the existing malicious node detection system. The implementation scheme comprises the steps of: periodically monitoring the working state information of a neighbour node by a node in a network; periodically performing quantitative trust evaluation on the neighbour node by the node; secondly judging whether a node having relatively low trust ispossibly congested in an evaluation period or not, so that false detection is prevented; calculating the direct trust; interacting with the neighbour node, and calculating the recommendation trust; synthesizing the direct trust and the recommendation trust, so that the total trust is obtained; and judging a malicious node, and isolating the malicious node. By means of the method for detecting themalicious node in the wireless ad-hoc network based on behavioural cognition in the invention, the possibility that a normal node is wrongly judged as a malicious node can be reduced; the negative effect of the malicious node on a network is reduced; the network reliability is improved; and the method can be used for detecting and defensing malicious node attack in the wireless ad-hoc network.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a malicious node detection method, which can be used for detecting and defending malicious node attacks in a wireless self-organizing network. Background technique [0002] A wireless ad hoc network is a multi-hop autonomous network formed by independent wireless temporary interconnection of wireless devices that do not depend on any fixed infrastructure. Due to the limited communication range of the nodes, the data transmission in the network needs to rely on cooperation with other intermediate nodes and adopt the method of multi-hop communication. Malicious nodes intruding into the network will attack the network by means of malicious packet loss, intentional delay, false routing, etc., resulting in a serious drop in network throughput or even network paralysis. In order to alleviate the dangers faced by the network, there are many methods based on cryptograp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W28/02H04L29/06H04W12/122
CPCH04L63/1416H04W12/12H04W28/0284H04W28/0289
Inventor 史琰刘博涛盛敏孙红光仲伟慧刘俊宇文娟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products