[go: up one dir, main page]

CN202488761U - Safe router of mobile self-organized network - Google Patents

Safe router of mobile self-organized network Download PDF

Info

Publication number
CN202488761U
CN202488761U CN 201120449937 CN201120449937U CN202488761U CN 202488761 U CN202488761 U CN 202488761U CN 201120449937 CN201120449937 CN 201120449937 CN 201120449937 U CN201120449937 U CN 201120449937U CN 202488761 U CN202488761 U CN 202488761U
Authority
CN
China
Prior art keywords
node
route
data
hoc network
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201120449937
Other languages
Chinese (zh)
Inventor
戚湧
李千目
侍球干
许雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Nanligong Technology Development Co Ltd
Original Assignee
Wuxi Nanligong Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Nanligong Technology Development Co Ltd filed Critical Wuxi Nanligong Technology Development Co Ltd
Priority to CN 201120449937 priority Critical patent/CN202488761U/en
Application granted granted Critical
Publication of CN202488761U publication Critical patent/CN202488761U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The utility model relates to a safe router of a mobile self-organized network. The safe router includes an input interface, an output interface, a data packet transmitting/exchanging module, and a route processing module. The input interface is used for inputting the route data. The route data is stored in the data packet transmitting/ exchanging module. The data packet transmitting/ exchanging module is bidirectionally connected with the route processing module. The data packet transmitting/ exchanging module transmits and exchanges the data, and then the data is output via the output interface. The effective safe router is based on the dynamic source routing protocol DSR, and the effective safe router expands the safety function of the DSR protocol, fills the security vulnerabilities in previous protocols via the route processing module, and guarantees the most rapid route.

Description

A kind of secure router towards mobile ad hoc network
Technical field
The utility model relates to router, especially moves the router in the Ad Hoc network, specifically a kind of secure router towards mobile ad hoc network.
Background technology
At present; It is mobile that Ad Hoc network---MANET (Mobile Ad Hoc network) becomes the focus of wireless network research field just gradually; Move the exclusive characteristic of Ad Hoc network; Make it under attack more easily, the tectonic network security system is also more complicated, and the fail safe of therefore moving Ad Hoc network is a problem very necessary with anxious to be solved.
Router is a part and parcel that moves in the Ad Hoc network, because it has directly determined the realization and the efficient of network function.Many mobile networks' of being applicable to Routing Protocol has been proposed in recent years; Like DSR [88], AODV [89], DSDV [90], OLSR [91] etc.; These Routing Protocols have taken into full account the characteristics of mobile Ad Hoc network when design; But do not consider the factor of secure context, this makes above-mentioned Routing Protocol have major hidden danger at secure context.
Summary of the invention
The purpose of the utility model is to have the problem of major hidden danger to Routing Protocol at secure context, proposes a kind of secure router towards mobile ad hoc network, prevents the forgery of route messages and distorts.
The technical scheme of the utility model is:
A kind of secure router towards mobile ad hoc network; It comprises input interface, output interface, packet forwarding/Switching Module and route processing module; Described input interface is used for the input of route data, is stored to packet forwarding/Switching Module, and packet forwarding/Switching Module is connected with the route processing module is two-way; Packet forwarding/Switching Module is transmitted, is exchanged data, exports through output interface.
The input of the router of the utility model, the network that output interface inserts is for moving Ad Hoc network.
The route processing module of the utility model comprises key distribution module and processor, and the key distribution module is used for the tape swap data are carried out encryption key distribution.
In the mobile ad hoc network of the utility model, main frame all is mobile devices, comprises PDA, pocket computer or palmtop PC.
The beneficial effect of the utility model:
The effective and safe road device of the utility model is to be the basis with dynamic source routing protocol (DSR), and it has expanded the safety function of DSR agreement, has stopped up the security breaches in some agreements of past through the route processing module, and has guaranteed to provide path the most fast.
Description of drawings
Fig. 1 is the theory diagram of the utility model.
Fig. 2 is the BROADCASTING GRAPH of the utility model towards the new node information of the router of Ad Hoc network.
Fig. 3 is the utility model towards the router of the Ad Hoc network processing figure to the new node broadcast message.
Fig. 4 is the discovery figure of the utility model towards the router of Ad Hoc network.
Embodiment
Below in conjunction with accompanying drawing and embodiment the utility model is further described.
As shown in Figure 1; A kind of secure router towards mobile ad hoc network, it comprises input interface, output interface, packet forwarding/Switching Module (model can be CISCO 1841) and route processing module, described input interface is used for the input of route data; Be stored to packet forwarding/Switching Module; Packet forwarding/Switching Module is connected with the route processing module is two-way, and packet forwarding/Switching Module is transmitted, exchanged data, exports through output interface.
The input of the router of the utility model, the network that output interface inserts is for moving Ad Hoc network.
The route processing module of the utility model comprises key distribution module (ESRS) and processor (model can be Motorola 68030), and the key distribution module is used for the tape swap data are carried out encryption key distribution.
In the mobile ad hoc network of the utility model, main frame all is mobile devices, comprises PDA, pocket computer or palmtop PC.
During practical implementation:
The course of work of effective safe route ESRS (Efficient and Secure Routing Scheme) is except that comprising two processes of route discovery similar with DSR and route maintenance; Also comprise and add Ad Hoc network; Set up the process of informational table of nodes, specify these three courses of work below:
(a) set up informational table of nodes
At first, new node adds before the Ad Hoc network, and private key (SK) and PKI PK that it must obtain own node are right, obtains the IP address of oneself then according to formula (1).
sucvID=HMAC-?SHA1-(SHA1(MAC),SHA1(PK)) (1)
Use the MAC Address of node to serve as a mark, then can avoid producing the resource consumption of random number, and MAC Address can increase the possibility that sucvID clashes as the distinctive data of node, also be an aspect of entity authentication simultaneously.
Clash for fear of the IP address configuration, initiate node must use DAD (Duplicate Address Detection) protocol detection repeat to address (RA) (though the probability that clashes is very low).
Secondly, new node need be broadcast to the node that exists in the network with the peculiar information (such as comprising address ip, PKI PK and MAC Address) of oneself.Owing to adopted broadcast mode; Even fault occurred or existed under the situation of certain malicious node at certain bar link of former connection; Each node in the Ad Hoc network also all can be received this broadcast message; As shown in Figure 2: when link broke down between < n 1 >, node 1 can obtain the information of new node n through node 4, and other node is unaffected; When node 1 is malicious node m; It possibly abandon the message of node n, and its downstream node 2 can obtain the information of new node n through node 7, and node 4 can obtain through node 3; If m distorts the message of node n, this message will can not be dropped through the verification of node 2 and 4 so.
After node in the network is received the broadcast message of new node, according to the flow process shown in Fig. 3 the infomational message of new node is handled, through neighbours' study, new node can obtain the information of the original node of network.
(b) safe route discovery
Fig. 4 has showed the topological structure description of safe route finding process.Listed employed symbolic significance in the literary composition in the table 1.
Table 1 symbolic significance instruction card
Symbol Explanation
IPX The IP address of nodes X
Seq The sequence number of banner message
SKX The private key of nodes X
PKX The PKI of nodes X
KSD Shared key between node S, D
[message] SKX Use the private key of nodes X that message is carried out digital signature
[message] PKX Use the PKI of nodes X that message is encrypted
Safe route discovery comprises route requests and route replies again:
Route requests: source node S expectation and destination node D set up communication, but do not have the routing iinformation that arrives destination node D in the buffer memory own, and S will broadcast route request information RREQ, and form is:
RREQ={IPS,IPD,Seq,(route?list),[IPS,IPD,Seq]SKS,[KSD]PKD}
After middle node was received the RREQ message of S node, accomplish two processes that DSR agreement itself requires verification: (1) checked whether oneself has received this message; (2) whether has the path that arrives the specified destination node D of this message in the inspection buffer memory.When not arriving the routing iinformation of the specified destination node of this message in the intermediate node cache table, node is the processing procedure of DSR agreement to the processing procedure of RREQ message.There is the situation of buffering route information for intermediate node, will in route replies, describes.
Route replies: route replies can be divided into again that destination node D returns RREP and intermediate node S returns CREP; Wherein destination node D returns RREP and is: when the route request information RREQ of node S arrived destination node D, node D did following processing: the sequence number of the RREQ that whether once received greater than it of the sequence number in the checking prediction message at first; Retrieve the informational table of nodes of oneself then according to the source node address in the message, thereby obtain the public key information PKS of source node; The digital signature of terminal check source node in RREQ message; If RREQ message is through above-mentioned verification, node D will at first utilize private key deciphering acquisition of oneself and the shared key K SD of node S, return route replies message RREP according to the content of address list in the RREQ message (route list) then, and form is: RREP={IPD, IPS; Seq, (IPF, IPE, IPA); [IPD, IPS, Seq, (IPF; IPE, IPA)] KSD}, otherwise, dropping packets.
Intermediate node S returns CREP: after said process finishes; S ' initiation destination address is the route requests of D, and is as shown in Figure 4, and this moment is because node S has the routing iinformation that arrives destination node D; It just can response buffer route replies message CREP so, and form is:
RREP={IPS,IPS,Seq,(IPF,IPE,IPA,IPS,IPJ),[IPS,IPS,Seq,(IPF,IPE,IPA,IPS,IPJ)]SKS},
At this moment, source node S ' can only be based on PKI to the authentication of intermediate node S.
(c) safe route maintenance
After the completion of route discovery stage; Source node S has obtained every jumping route of destination node D; Then, node S uses the source routing mode to send data, and each node will be responsible for all confirming that data have passed to next node on the way; Be the reliable transmission that A is responsible for A → E link, E is responsible for the reliable transmission of E → F link etc.
If data failed arrives next node; For example because the link fails of F → D; Perhaps because the moving of node F, but make its coverage area that no longer belongs to node D etc., node D will be responsible for sending route RRER (Route Error) message of makeing mistakes to source node S so.The RRER message of sending for node D will comprise: the digital signature [IPD, IPS, IPF, IPJ] of source address IPD, destination address IPS, unreachable node address IPF and node E] SKD].
After RRER message arrived node S, whether node S inspection source node D was the node on the source routing path, then the digital signature of node E is verified.
The utility model does not relate to all identical with the prior art prior art that maybe can adopt of part to be realized.

Claims (3)

1. secure router towards mobile ad hoc network; It is characterized in that it comprises input interface, output interface, packet forwarding/Switching Module and route processing module; Described input interface is used for the input of route data, is stored to packet forwarding/Switching Module, and packet forwarding/Switching Module is connected with the route processing module is two-way; Packet forwarding/Switching Module is transmitted, is exchanged data, exports through output interface.
2. the secure router towards mobile ad hoc network according to claim 1 is characterized in that the input of described router, and the network that output interface inserts is for moving Ad Hoc network.
3. the secure router towards mobile ad hoc network according to claim 1 is characterized in that in the described mobile ad hoc network, main frame all is mobile devices, comprises PDA, pocket computer or palmtop PC.
CN 201120449937 2011-11-14 2011-11-14 Safe router of mobile self-organized network Expired - Fee Related CN202488761U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201120449937 CN202488761U (en) 2011-11-14 2011-11-14 Safe router of mobile self-organized network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201120449937 CN202488761U (en) 2011-11-14 2011-11-14 Safe router of mobile self-organized network

Publications (1)

Publication Number Publication Date
CN202488761U true CN202488761U (en) 2012-10-10

Family

ID=46963144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201120449937 Expired - Fee Related CN202488761U (en) 2011-11-14 2011-11-14 Safe router of mobile self-organized network

Country Status (1)

Country Link
CN (1) CN202488761U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780588A (en) * 2014-01-10 2015-07-15 中国电信股份有限公司 Method of controlling adding of sensing node and sink node
US20180330101A1 (en) * 2017-05-15 2018-11-15 International Business Machines Corporation Identifying computer program security access control violations using static analysis

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780588A (en) * 2014-01-10 2015-07-15 中国电信股份有限公司 Method of controlling adding of sensing node and sink node
US20180330101A1 (en) * 2017-05-15 2018-11-15 International Business Machines Corporation Identifying computer program security access control violations using static analysis
US10614224B2 (en) 2017-05-15 2020-04-07 International Business Machines Corporation Identifying computer program security access control violations using static analysis
US10650149B2 (en) * 2017-05-15 2020-05-12 International Business Machines Corporation Identifying computer program security access control violations using static analysis
US10956580B2 (en) 2017-05-15 2021-03-23 International Business Machines Corporation Identifying computer program security access control violations using static analysis
US11163891B2 (en) 2017-05-15 2021-11-02 International Business Machines Corporation Identifying computer program security access control violations using static analysis

Similar Documents

Publication Publication Date Title
Papadimitratos et al. Secure link state routing for mobile ad hoc networks
US7401217B2 (en) Secure routing protocol for an ad hoc network using one-way/one-time hash functions
CN101969661B (en) Method, device and system for transmitting data in mobile Ad hoc network
Saetang et al. Caodv free blackhole attack in ad hoc networks
WO2011121713A1 (en) Node, transfer method, and transfer program
Lu et al. Delay/disruption tolerant network and its application in military communications
CN202488761U (en) Safe router of mobile self-organized network
CN101499942A (en) Method, system and apparatus for seamless switching
CN103108408A (en) Security router orienting to a mobile Ad-Hoc network
CN103095858A (en) Method, network equipment and system of processing messages of address resolution protocol (ARP)
Fang et al. An Energy-efficient Secure AODV Protocol in Industrial Sensor Network
Li et al. A new method to resist flooding attacks in ad hoc networks
Diwaker et al. Detection of blackhole attack In DSR based MANET
CN101835195A (en) A Byzantine Fault Tolerance Method for Improving the Reliability of Wireless Mesh Backbone Network
Baburaj et al. An efficient secure routing mechanism for preventing wormhole and black hole attacks in a trusted DTN environment
Li et al. Domain‐based autoconfiguration framework for large‐scale MANETs
Singh Security Threats and Maintaince in Mobile Adhoc Networks
Wu et al. Routing and data security scheme based on double encryption in mobile ad hoc networks
MS et al. Implementation of Protected Routing to Defend Byzantine Attacks for MANET's.
Wang et al. A transparent cache-based mechanism for mobile ad hoc networks
Rathi et al. A Secure and Fault tolerant framework for Mobile IPv6 based networks
Jing et al. Stable topology support for tracing DDoS attackers in MANET
Soliman et al. Enhancing AODV routing protocol over mobile ad hoc sensor networks
Jara et al. Secure mobility management scheme for 6lowpan id/locator split architecture
Brian et al. Security scheme for mobility management in the internet of things

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121010

Termination date: 20151114

EXPY Termination of patent right or utility model