Network trust state acquisition method based on active message detection

A technology for obtaining methods and messages, which is applied to services based on specific environments, wireless communication, and vehicle wireless communication services. The effect of data waiting delay and improving data processing rate

Pending Publication Date: 2022-08-02
CENT SOUTH UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its purpose is to overcome the factors of poor network performance such as low data collection rate, high data processing delay, and high cost of drone flight caused by traditional solutions that do not consider trust factors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network trust state acquisition method based on active message detection
  • Network trust state acquisition method based on active message detection
  • Network trust state acquisition method based on active message detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033]In the open network environments such as forests, oceans, deserts, etc., a large number of sensor devices are deployed to monitor the environment and upload the sensed data to the data center for processing. However, considering the cost, the communication range of some sensor devices is small, only tens of meters. Therefore, the data on these devices can only be collected and processed through drones as a relay layer. In addition, the network environment in which these devices are deployed is open, therefore, they are inevitably attacked from the outside and become malicious devices. These malicious devices will discard all received data messages, thus affecting the transmission of data and seriously affecting the completion rate of data. To sum up, there is an urgent need for a real-time and efficient method for acquiring and evaluating network trust, so that data can be transmitted in a reliable route.

[0034] In order to make the UAV complete the data processing a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network trust state acquisition method based on active message detection. According to the method disclosed by the invention, when the equipment generates data, a data trust detection identification message consisting of a data number, data generation time, a data deadline, a data position and an identifier bit is routed to a network boundary in four directions through adjacent equipment. Therefore, when the unmanned aerial vehicle receives the data trust detection and identification message, the unmanned aerial vehicle not only can complete data collection at a specified position, but also can obtain a trusted route and evaluate and update the equipment trust degree of the route, and in addition, the unmanned aerial vehicle can also deduce a transmission area of the data trust detection and identification message to other directions. And when the unmanned aerial vehicle does not receive the message after passing through the data trust detection to identify the transmission area of the message, the malicious equipment exists in the area. According to the method, the area where the malicious equipment is located is identified by adopting a near-hop method, and the equipment trust degree in the area is re-evaluated so as to reduce the trust value of the equipment. Therefore, the unmanned aerial vehicle continuously adjusts the track according to the trust updating result, so that an untrusted area is avoided, more data trust detection and identification messages are received, and collection of more data is completed.

Description

technical field [0001] The invention belongs to the field of trusted network construction of the Internet of Things, and particularly relates to a network trust state acquisition method based on active message detection in an open network. Background technique [0002] With the rapid development of electronic information technology, the Internet of Things has become one of the hottest topics in academia and industry. More and more sensor devices with rich sensing devices are flexibly deployed in the areas that need to be monitored to sense and collect data, so as to control and process the monitored objects. And, with the development of 6G technology, more and more sensor devices are distributed over a wide area in order to remotely monitor specific processes in the work area. However, in view of the openness of the IoT network, some devices are easily attacked and become malicious devices, such as black hole attacks, gray hole attacks, DoS attacks, node replication, Sybil ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/122H04W4/38H04W4/40
CPCH04W12/122H04W4/38H04W4/40Y02D30/70
Inventor 白静刘安丰贺佳贝
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products