Detection method for wormhole attacks in Ad Hoc network
The invention relates to a wireless network security technology and discloses a detection method for wormhole attacks in an Ad Hoc network. When a node transmits or receives a routing message, time ruler information (Ruler: T0, Gt and delta T) is set up in the routing message, wherein the T0 is init...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
04.04.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention relates to a wireless network security technology and discloses a detection method for wormhole attacks in an Ad Hoc network. When a node transmits or receives a routing message, time ruler information (Ruler: T0, Gt and delta T) is set up in the routing message, wherein the T0 is initial time when the node sets up the time ruler information, the delta T is an allowable time range for the node to transmit information, the Gt is the minimal time interval of the node to continuously transmit route packages to an adjacent node of the node twice; the node sets up and stores the neighbor lists of all nodes adjacent to the node, and receives time ruler calibration marks and neighbor validity marks, and the element items in the lists are the time ruler information (Ruler: T0, Gt and deltaT) of the adjacent nodes. As the dissemination speed of the message between two nodes is determined, the length of a one-hop link through which some message passes can be measured through measuring the dissemination ti |
---|---|
Bibliography: | Application Number: CN201110288362 |