Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-link wireless ad hoc network and security defense method in emergency scene

A wireless ad hoc network and security defense technology, applied in the field of network security, can solve problems affecting normal communication, nodes being invaded, and alarm response information not arriving in time

Active Publication Date: 2020-10-23
XIDIAN UNIV
View PDF16 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the intrusion detection device captures abnormal data in the network, after the detection of the deep neural network, and determines the abnormality, the alarm response module is started, and the alarm response information is transmitted to the node that has been invaded by the abnormal data through the wireless link. In this process, the transmission time caused by the difference in physical location and the wireless link that becomes redundant and inefficient due to the transmission of all kinds of information may cause the alarm response information to not arrive in time, resulting in the situation that the node has been invaded ; There is only one intrusion detection device in the mobile ad hoc network, and the device is independent of other nodes in the network. Once the device is attacked by a malicious person, it will cause paralysis of the entire network security defense function and affect normal communication; the invention only Improvements have been made to the intrusion detection rate, without considering data tampering during transmission and malicious actors forging identities to join the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-link wireless ad hoc network and security defense method in emergency scene
  • Double-link wireless ad hoc network and security defense method in emergency scene
  • Double-link wireless ad hoc network and security defense method in emergency scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:

[0058] refer to figure 1 , the dual-link wireless ad hoc network in the emergency scenario includes: including M mobile nodes N={n 1 ,n 2 ,...,n i ,...,n M}, M≥3, where n i Indicates the i-th mobile node, 1≤i≤M, in this embodiment, M=18, each mobile node serves as both a source node and a destination node of other mobile nodes, and an intermediate node between two mobile nodes , a first link for transmitting security defense messages and a second link for transmitting other messages, public keys and encrypted AES keys not belonging to security defense messages are set between any two mobile nodes;

[0059] The first link is set to be independent of the second link, and the two parties do not affect each other, and transmit their respective information independently. At the same time, because only security defense messages are transmitted o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a double-link wireless ad hoc network and a security defense method in an emergency scene. In order to comprehensively improve the security defense capability of the wireless ad hoc network in an emergency scene, the security defense method comprises the following steps that: a source node sends a key and other encrypted and digitally signed messages which do not belong toa security defense message through a second link; a destination node detects an abnormal message from the acquired effective message through a feature matching module and a supervision engine module,filters the abnormal message through a TCP / IP filter module, and quickly broadcasts features of the novel abnormal message through a first link; the new node of the double-link wireless ad hoc networkto be added in the emergency scene checks the identity and the hardware state through the supervision engine module, authorizes the new node without abnormality, and broadcasts authorization result information through the first link; and the other nodes receiving the broadcast information add the features of the novel abnormal message to the own abnormal message feature library and agree to add the new node.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a wireless ad hoc network and a security defense method, in particular to a dual-link wireless ad hoc network and a security defense method in an emergency scene. Background technique [0002] In man-made or natural emergency situations, it is necessary to temporarily build an emergency communication network to ensure rescue and necessary communication. As emergency communication can be applied in more and more scenarios, how to better protect it has become an urgent problem that emergency communication faces. The wireless ad hoc network has been widely used in emergency communication because it does not rely on basic communication facilities and can form a network at any time. Wireless ad hoc network is a decentralized distributed network. The network topology changes randomly. Each node in the network can act as a mobile terminal with transceiver function and a router w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L29/06H04W12/12H04W84/18
CPCH04L63/1441H04L63/1416H04L9/0631H04W84/18H04L9/0825H04L9/3247H04W12/108H04W12/03H04W12/088H04W12/121G06N3/08H04W12/009G06N3/04H04L9/3249
Inventor 程文驰陈春华王慕尧
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products