Electric power RPL protocol black hole attack defense method based on cuckoo filter

A black hole attack and cuckoo technology, applied in encryption devices with shift registers/memory, electrical components, digital transmission systems, etc., can solve problems such as inability to defend, and achieve the effect of maintaining security and defending a wide range

Inactive Publication Date: 2020-04-21
SHENZHEN POWER SUPPLY BUREAU +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology optimizes an algorithm called RPL that allows any device connected into your network (called client) to be identified by its IP address or other identifiers like MAC addresses). It also includes various mechanisms such as establishing a strong connection between two servers before sending data packets over them. By adding these features to the ID-based authorization used during startup phases, it becomes better at preventing denials from hackers trying to compromise systems' integrity without being detected. Overall, this innovative approach helps improve communication networks while protecting their sensitive equipment.

Problems solved by technology

This patented technical problem addressed in this patents relates to developing an improved system for managing power usage within electronic grids like smart grids without compromizing their reliability due to poor signal quality caused by lower levels of noise during transmission compared with older systems based on wired connections.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power RPL protocol black hole attack defense method based on cuckoo filter
  • Electric power RPL protocol black hole attack defense method based on cuckoo filter
  • Electric power RPL protocol black hole attack defense method based on cuckoo filter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further elaborated and illustrated below in conjunction with the accompanying drawings and specific embodiments.

[0017] The smart instrument described in this embodiment is a node, which is a device to be connected before accessing the entire network route. The root node knows which devices are trusted, and the trusted device can access the network route through the improved RPL protocol. like figure 1 Shown is the design diagram of the RPL protocol field, except for the optional items, it is a normal field of the RPL protocol. The present invention mainly adds hash table options in the optional items, including hash table option codes, update flags, node IDs, and message Signatures and hash tables.

[0018] A kind of power RPL protocol black hole attack defense method based on the cuckoo filter of the present invention, the steps are as follows:

[0019] Step 1: Initialize the DODAG system, establish the information data of the system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electric power RPL protocol black hole attack defense method based on a cuckoo filter, and belongs to the field of intelligent power grid safety. The method comprises the following steps: firstly, creating a credible node hash table based on a cuckoo filter, wherein the credible node hash table comprises all legal members of an AMI network; and when the DODAG is constructed for the first time, transmitting the trusted device list to each trusted device. When RPL is used for dynamic DODAG construction, by modifying selectable fields of DIO control information and DAOcontrol information in an RPL control message, when equipment network topology changes, equipment identity authentication is carried out, and therefore possible RPL black hole attacks are detected; bypreventing DIO messages sent by malicious nodes, the AMI network can be protected against black hole attacks. Compared with an existing attack detection method, the method is wider in defense range and more effective.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products