Movatterモバイル変換


[0]ホーム

URL:


CN108769040B - Method and device for identifying nodes in disguised cluster - Google Patents

Method and device for identifying nodes in disguised cluster
Download PDF

Info

Publication number
CN108769040B
CN108769040BCN201810573856.6ACN201810573856ACN108769040BCN 108769040 BCN108769040 BCN 108769040BCN 201810573856 ACN201810573856 ACN 201810573856ACN 108769040 BCN108769040 BCN 108769040B
Authority
CN
China
Prior art keywords
node
data packet
function value
cluster
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810573856.6A
Other languages
Chinese (zh)
Other versions
CN108769040A (en
Inventor
马书惠
郭志斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co LtdfiledCriticalChina United Network Communications Group Co Ltd
Priority to CN201810573856.6ApriorityCriticalpatent/CN108769040B/en
Publication of CN108769040ApublicationCriticalpatent/CN108769040A/en
Application grantedgrantedCritical
Publication of CN108769040BpublicationCriticalpatent/CN108769040B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention provides a method and a device for identifying nodes in a disguised cluster, which are characterized in that a sending node identifier in a data packet header sent by member nodes in the cluster is changed into a function value, the cluster head nodes send a unified function taking the node identifier as a key word to the member nodes, and the function value is associated with communication time slots of the member nodes. Even if the malicious disguised node knows the member node identification, the malicious disguised node does not know the preset function, and even if the malicious disguised node sends a data packet, the malicious disguised node can be identified by the cluster head node. Even if a malicious masquerading node acquires a correct data packet, a function value is extracted from the data packet, and the communication time slot allocated to the member node is unknown, so that even if the masquerading node transmits the correct data packet, the cluster head node can identify the member node as the masquerading node through the communication time slot. The scheme for identifying the nodes in the disguised cluster is simple to implement, and can effectively identify the malicious disguised nodes, so that the safety and the reliability of communication in the cluster are improved.

Description

Method and device for identifying nodes in disguised cluster
Technical Field
The invention relates to the technical field of communication, in particular to a method and a device for identifying nodes in a disguised cluster.
Background
After a stable cluster topology is formed, generally, one cluster includes a cluster head node and member nodes, the cluster head node and the member nodes perform normal data packet transmission, and the member nodes send data packets to the cluster head node, so that the cluster head node forwards the data packets. The data packet includes a sending node identifier (i.e., a member node identifier), a receiving node identifier (i.e., a cluster head node identifier), and a data payload (i.e., data content).
However, some nodes outside the cluster intercept the information of the member nodes in the cluster, such as member identifiers, and carry the intercepted information of the member nodes in the data packet header, so as to pretend the member nodes in the cluster to perform communication, thereby forwarding some false information through the cluster head nodes.
Therefore, a solution for identifying nodes in a disguised cluster is needed to solve the above problems.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a method and a device for identifying a pretended cluster node, which are used for solving the problem that an out-cluster node pretends to be a member node in a cluster for communication.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides a method for identifying nodes in a disguised cluster, which is applied to a cluster comprising cluster head nodes and member nodes, wherein the cluster head nodes are stored with node identifications, function values of preset functions and corresponding relations of communication time slots, and the communication time slots are distributed to the member nodes by the cluster head nodes and are sent to the corresponding member nodes; the preset function is a function related to node identification, and the function value in the corresponding relation is obtained by calculating the cluster head node; the method comprises the following steps:
receiving a data packet sent by a member node, and determining a function value according to a communication time slot for receiving the data packet and the corresponding relation;
analyzing the data packet to obtain a function value carried in a packet header, wherein the function value is obtained by calculation of a member node sending the data packet;
and judging whether the member nodes are disguised cluster nodes or not according to the function values acquired from the data packet and the determined function values.
Preferably, the node identifier includes a cluster head node identifier and a member node identifier; the packet header of the data packet carries a function value of a sending node and a function value of a receiving node, wherein the sending node is a member node for sending the data packet, and the receiving node is a cluster head node for receiving the data packet;
the determining, according to the function value obtained from the data packet and the determined function value, whether the member node is a pretended cluster node specifically includes:
and judging whether the function value of the sending node acquired from the data packet is the same as the function value of the determined member node, and whether the function value of the receiving node acquired from the data packet is the same as the function value of the cluster head node determined according to the corresponding relation, wherein if at least one of the function values is different, the member node sending the data packet is a disguised intra-cluster node.
Preferably, the node identifier includes multiple bits, and the preset function is a sum of values of the bits of the node identifier.
Further, the method for identifying nodes in the disguised cluster further comprises the following steps: and if the member node is judged to be the disguised intra-cluster node, discarding the data packet.
Further, the method for identifying nodes in the disguised cluster further comprises the following steps:
and updating the preset function according to a preset updating period, and/or distributing communication time slots for each member node according to a preset distribution period.
The present invention also provides a cluster head node, including: the device comprises a distribution module, a sending module, a calculation module, a storage module, a receiving module, a searching module, an analysis module and a judgment module;
the distribution module is used for distributing communication time slots for each member node;
the sending module is used for sending the communication time slot distributed by the distributing module to the corresponding member node;
the calculation module is used for calculating a function value of a preset function, wherein the preset function is a function related to the node identification;
the storage module is used for storing the corresponding relation among the node identification, the function value of the preset function and the communication time slot;
the receiving module is used for receiving a data packet sent by a member node;
the searching module is used for determining a function value according to the communication time slot of the data packet received by the receiving module and the corresponding relation;
the analysis module is used for analyzing the data packet to obtain a function value carried in a packet header, wherein the function value is obtained by calculation of a member node sending the data packet;
and the judging module is used for judging whether the member nodes are disguised cluster nodes or not according to the function values obtained from the data packet and the determined function values.
Preferably, the node identifier includes a cluster head node identifier and a member node identifier; the packet header of the data packet carries a function value of a sending node and a function value of a receiving node, wherein the sending node is a member node for sending the data packet, and the receiving node is a cluster head node for receiving the data packet;
the judging module is specifically configured to judge whether a function value of a sending node obtained from the data packet is the same as a function value of a determined member node, and whether a function value of a receiving node obtained from the data packet is the same as a function value of a cluster head node determined according to the corresponding relationship, and if at least one of the function values is different, the member node sending the data packet is a disguised intra-cluster node.
Preferably, the node identifier includes multiple bits, and the preset function is a sum of values of the bits of the node identifier.
Further, the cluster head node further includes a processing module, and the processing module is further configured to discard the data packet when the judging module judges that the member node is a disguised intra-cluster node.
Further, the cluster head node further includes an updating module, and the updating module is configured to update the preset function according to a preset updating period; and/or the presence of a gas in the gas,
the distribution module is further configured to distribute communication time slots to the member nodes according to a preset distribution cycle.
The method and the device for identifying the disguised cluster nodes convert the sending node identification in the data packet header sent by the member nodes in the cluster into the function value, send the function taking the node identification as the key word to the member nodes by the cluster head nodes, and associate the function value with the communication time slot of each member node. Even if the malicious disguised node knows the member node identification, the malicious disguised node does not know the preset function, and even if the malicious disguised node sends a data packet, the malicious disguised node can be identified by the cluster head node. Even if a malicious masquerading node acquires a correct data packet, a function value is extracted from the data packet, and the communication time slot allocated to the member node is unknown, so that even if the masquerading node transmits the correct data packet, the cluster head node can identify the member node as the masquerading node through the communication time slot. The scheme for identifying the nodes in the disguised cluster is simple to implement, and can effectively identify the malicious disguised nodes, so that the safety and the reliability of communication in the cluster are improved.
Drawings
Fig. 1 is a schematic diagram of a cluster topology provided in an embodiment of the present invention;
fig. 2 is a flowchart of a method for identifying a node in a masquerading cluster according to an embodiment of the present invention;
fig. 3 is a second flowchart of a method for identifying a node in a masquerading cluster according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a cluster head node according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
The invention provides a method for identifying nodes in a disguised cluster, which is applied to a cluster comprising a cluster head node and member nodes, wherein the topological structure of the cluster is shown in figure 1. After a stable cluster relationship is formed between a cluster head node and a plurality of member nodes, a corresponding relationship among a node identifier, a function value of a preset function, and a communication time slot is stored in the cluster head node, taking the topology structure shown in fig. 1 as an example, the corresponding relationship is shown in table 1:
TABLE 1
Figure BDA0001686728340000041
In the embodiment of the present invention, the node identifier is composed of multiple digits, the preset function is a hash function, and may be a function related to the node identifier, specifically, a sum of numerical values of each digit of the node identifier, and the cluster head node calculates a function value of each member node. The communication time slots of the member nodes are distributed and transmitted to the corresponding member nodes by the cluster head node, and each member node can comprise a plurality of communication time slots.
The method for identifying nodes in a masquerading cluster according to the present invention is described in detail below with reference to fig. 1 and 2. As shown in fig. 2, the method comprises the following steps:
step 201, receiving a data packet sent by a member node.
Specifically, after the intra-cluster communication is started, the cluster head node receives a data packet sent by the member nodes in the cluster.
The existing data packet includes: the structure of fields such as the sending node identification, the receiving node identification, the data content and the like is as follows:
transmitting node Identification (ID)Receiving node Identification (ID)Data content
The data packet in the invention comprises: the structure of fields such as the function value of the sending node, the function value of the receiving node, the data content and the like is as follows:
Figure BDA0001686728340000051
the sending node is a member node for sending the data packet, and the receiving node is a cluster head node. Because the cluster head node sends the preset function to each member node, each member node can respectively calculate the function value of the receiving node and the function value of the sending node according to the identification of the cluster head node and the self identification, and carries the function values in the packet head of the data packet to send to the cluster head node so as to identify the disguised node by the cluster head node.
Step 202, determining a function value according to the communication time slot for receiving the data packet and the corresponding relation.
Specifically, when a cluster head node receives a data packet sent by a member node, a communication time slot for receiving the data packet is determined, a corresponding relationship (namely table 1) between the node identifier, a function value of a preset function and the communication time slot is inquired according to the communication time slot, and a corresponding function value is determined, wherein the function value is the function value of the member node sending the data packet.
Step 203, parsing the data packet to obtain a function value carried in the packet header.
Specifically, the cluster head node parses the data packet to obtain a function value carried in the packet header, where the function value may include a function value of the sending node and a function value of the receiving node, and both the function value of the sending node and the function value of the receiving node are calculated by the member node that sends the data packet.
And 204, judging whether the member nodes are disguised cluster nodes or not according to the function values acquired from the data packet and the determined function values.
Specifically, the cluster head node compares the function value obtained from the data packet with the function value found in table 1, and determines whether the member node that sent the data packet is a masquerading node.
The specific implementation of step 204 is described in detail later in conjunction with fig. 3.
The execution sequence of step 202 and step 203 is not limited, and may be executed synchronously.
It can be seen from the above step 201 and 204 that, in the present invention, the cluster head node allocates a communication time slot for each member node in the cluster and sends a preset function to each cluster head node, so that each member node communicates with the cluster head node according to its own communication time slot, and calculates a function value and carries it in a data packet header, the cluster head node records the node identifier of each node, the function value of the preset function and the corresponding relationship of the communication time slot, when the member node communicates with the cluster head node, the cluster head node judges whether the member node is a disguised cluster internal node by comparing the locally stored function value with the function value obtained from the data packet sent by the member node; in the scheme of the invention, the sending node identification in the data packet header sent by the member nodes in the cluster is changed into the function value, the cluster head nodes send the unified function taking the node identification as the key word to the member nodes, and the function value is associated with the communication time slot of each member node. Even if the malicious disguised node knows the member node identification, the malicious disguised node does not know the preset function, and even if the malicious disguised node sends a data packet, the malicious disguised node can be identified by the cluster head node. Even if a malicious masquerading node acquires a correct data packet, a function value is extracted from the data packet, and the communication time slot allocated to the member node is unknown, so that even if the masquerading node transmits the correct data packet, the cluster head node can identify the member node as the masquerading node through the communication time slot. The scheme for identifying the nodes in the disguised cluster is simple to implement, and can effectively identify the malicious disguised nodes, so that the safety and the reliability of communication in the cluster are improved.
Further, after determining whether the member node is a disguised intra-cluster node according to the function value obtained from the data packet and the determined function value (i.e., step 204), the method may further include the following steps:
and step 205, if the member node is judged to be the disguised intra-cluster node, discarding the data packet.
And after the cluster head node judges that the node sending the data packet is the disguised intra-cluster node, discarding the data packet so as to ensure the safety and reliability of intra-cluster communication.
It should be noted that, in order to further improve the security and prevent the preset function and/or the communication time slot from being illegally acquired, the cluster head node may further periodically update the preset function and/or periodically reallocate the communication time slot to each member node. The update period of the preset function and the allocation period of the communication time slot are greater than the communication period, and may be multiple communication periods, for example, the update period of the preset function and the allocation period of the communication time slot may be the same or different.
The following describes in detail the process of identifying the disguised intra-cluster node by the cluster head node with reference to fig. 3. As shown in fig. 3, the process includes the following steps:
step 301, determining whether the function value of the sending node obtained from the data packet is the same as the function value of the determined member node, and whether the function value of the receiving node obtained from the data packet is the same as the function value of the cluster head node determined according to the corresponding relationship, if at least one of the function values is different, executing step 302; otherwise, step 303 is performed.
Specifically, the cluster head node compares the locally stored function value of the member node and the function value of the cluster head node with the function value of the member node carried in the data packet (i.e., the function value of the sending node) and the function value of the cluster head node (i.e., the function value of the receiving node), and if at least one of the locally stored function value of the member node and the function value of the member node carried in the data packet and the locally stored function value of the cluster head node and the function value of the cluster head node carried in the data packet is different, the member node is determined to be a member node in the disguised cluster (i.e., step 302); if the locally stored function value of the member node and the locally stored function value of the cluster head node are respectively the same as the function value of the member node and the function value of the cluster head node carried in the data packet, it is determined that the member node is a normal member node (i.e., step 303).
Usually, the cluster head node compares the function value of the member node in table 1 with the function value of the sending node obtained from the data packet, and if the two are different, the member node sending the data packet can be directly determined to be the disguised intra-cluster node; if the two are the same, further comparing the function value of the cluster head node in the table 1 with the function value of the receiving node obtained from the data packet; if the two are the same, the member node sending the data packet can be determined to be a normal member node, otherwise, the member node is a disguised intra-cluster node.
Step 302, determining that the member node sending the data packet is a disguised intra-cluster node.
Step 303, determining that the member node sending the data packet is a normal member node.
Generally, the data packets sent by the nodes in the disguised cluster have the following formats:
the first format is as follows:
the header of the data packet only carries the node identifier and does not carry the function value, and the cluster head node can identify the node as a disguised intra-cluster node through step 301. The data packet of the first format is the existing data packet, and the structure is as follows:
transmitting node Identification (ID)Receiving node Identification (ID)Data content
And a second format:
the packet header of the data packet only carries the function value of the sending node (i.e. the function value of the member node), but does not carry the function value of the cluster head node, and the cluster head node can also identify that the node is the disguised intra-cluster node through step 301. The data packet structure of format two is as follows:
Figure BDA0001686728340000081
in order to clearly illustrate the technical solution of the present invention, the solution of the present invention is described in detail with a specific example in conjunction with the schematic diagram of the cluster topology of fig. 1.
As shown in fig. 1, the cluster head node is labeled 1253, and the labels of the 4 member nodes are: 1567, 1678, 1247, 1647. The cluster head node issues a hash function to each member node, wherein the hash function is the sum of values of each bit of the node identifier, that is, y is x1+ x2+ x3+ x4, and x1, x2, x3 and x4 are values of 1 st, 2 nd, 3 th and 4 th bits of the node identifier, respectively. Thus, the function value hash (1567) of the member node 1 becomes 19, the function value hash (1678) of the member node 2 becomes 22, the function value hash (1247) of the member node 3 becomes 14, and the function value hash (1647) of the member node 4 becomes 18.
The cluster head node allocates communication time slots for the 4 member nodes, specifically, allocates communication time slots of 1, 5, 9, and 13 for the member node identified as 1567, allocates communication time slots of 2, 6, 10, and 14 for the member node identified as 1678, allocates communication time slots of 3, 7, 11, and 15 for the member node identified as 1247, and allocates communication time slots of 4, 8, 12, and 16 for the member node identified as 1647. The cluster head node generates a corresponding relationship among the node identifier, the function value of the preset function and the communication time slot, and the corresponding relationship is stored in the cluster head node in a table 2 manner.
TABLE 2
Figure BDA0001686728340000091
After the cluster communication starts, the cluster head node receives a data packet sent by the member nodes in the cluster, determines a communication time slot for receiving the data packet, and determines a function value of the member nodes and a function value of the cluster head node according to the communication time slot lookup table 2. And the cluster head node analyzes the data packet to obtain the function value of the member node and the function value of the cluster head node carried in the packet header. And comparing the function value of the member node obtained by the lookup table 2 with the function value of the member node obtained from the data packet, comparing the function value of the cluster head node obtained by the lookup table 2 with the function value of the cluster head node obtained from the data packet, if at least one of the function values is different from the function value of the cluster head node, determining that the member node sending the data packet is a disguised intra-cluster node, and discarding the data packet.
Based on the same technical concept, an embodiment of the present invention further provides a cluster head node, as shown in fig. 4, where the cluster head node may include: anallocation module 40, a sendingmodule 41, acalculation module 42, astorage module 43, a receiving module 44, asearch module 45, ananalysis module 46 and a judgment module 47.
The allocatingmodule 40 is configured to allocate a communication timeslot for each member node.
The sendingmodule 41 is configured to send the communication timeslot allocated by the allocatingmodule 40 to the corresponding member node.
Thecalculation module 42 is configured to calculate a function value of a preset function, where the preset function is a function related to the node identifier.
Thestorage module 43 is configured to store a correspondence between the node identifier, the function value of the preset function, and the communication time slot.
The receiving module 44 is configured to receive a data packet sent by a member node.
The searchingmodule 45 is configured to determine a function value according to the communication time slot of the data packet received by the receiving module 44 and the corresponding relationship.
The analyzingmodule 46 is configured to analyze the data packet to obtain a function value carried in the packet header, where the function value is calculated by a member node that sends the data packet.
The judging module 47 is configured to judge whether the member node is a disguised intra-cluster node according to the function value obtained from the data packet and the determined function value.
Preferably, the node identifier includes a cluster head node identifier and a member node identifier; the packet header of the data packet carries a function value of a sending node and a function value of a receiving node, the sending node is a member node sending the data packet, and the receiving node is a cluster head node receiving the data packet.
The determining module 47 is specifically configured to determine whether the function value of the sending node obtained from the data packet is the same as the function value of the determined member node, and whether the function value of the receiving node obtained from the data packet is the same as the function value of the cluster head node determined according to the corresponding relationship, and if at least one of the function values is different, the member node sending the data packet is a disguised intra-cluster node.
Preferably, the node identifier includes multiple bits, and the preset function is a sum of values of the bits of the node identifier.
Further, the cluster head node further includes aprocessing module 48, and theprocessing module 48 is further configured to discard the data packet when the determining module 47 determines that the member node is a disguised intra-cluster node.
Further, the cluster head node further includes an updatingmodule 49, and the updatingmodule 49 is configured to update the preset function according to a preset updating period. And/or the presence of a gas in the gas,
the allocatingmodule 40 is further configured to allocate a communication timeslot to each member node according to a preset allocation period.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

Translated fromChinese
1.一种识别伪装簇内节点的方法,其特征在于,所述方法应用于包括簇头节点和成员节点的簇内,所述簇头节点内存储有节点标识、预设函数的函数值和通信时隙的对应关系,所述通信时隙是所述簇头节点为各成员节点分配的,并发送给相应的成员节点;所述预设函数为关于节点标识的函数,所述对应关系内的函数值是所述簇头节点计算得到的;所述方法包括:1. a method for identifying a node in a disguised cluster is characterized in that, the method is applied in the cluster comprising a cluster head node and a member node, and the cluster head node stores the function value of node identification, preset function and The correspondence between the communication time slots, the communication time slots are allocated by the cluster head node for each member node, and sent to the corresponding member nodes; the preset function is a function related to the node identification, and the corresponding relationship The function value of is calculated by the cluster head node; the method includes:接收成员节点发送的数据包,根据接收所述数据包的通信时隙和所述对应关系确定函数值;Receive the data packet sent by the member node, and determine the function value according to the communication time slot for receiving the data packet and the corresponding relationship;解析所述数据包,以获取包头中携带的函数值,所述函数值是发送所述数据包的成员节点计算得到的;Parsing the data packet to obtain the function value carried in the packet header, where the function value is calculated by the member node that sent the data packet;根据从所述数据包中获取到的函数值和确定出的函数值,判断所述成员节点是否为伪装簇内节点。According to the function value obtained from the data packet and the determined function value, it is determined whether the member node is a node in a fake cluster.2.如权利要求1所述的方法,其特征在于,所述节点标识包括簇头节点标识和成员节点标识;所述数据包的包头携带有发送节点的函数值和接收节点的函数值,所述发送节点为发送所述数据包的成员节点,所述接收节点为接收所述数据包的簇头节点;2. The method according to claim 1, wherein the node identification includes a cluster head node identification and a member node identification; the packet header of the data packet carries the function value of the sending node and the function value of the receiving node, so The sending node is a member node that sends the data packet, and the receiving node is a cluster head node that receives the data packet;所述根据从所述数据包中获取到的函数值和确定出的函数值,判断所述成员节点是否为伪装簇内节点,具体包括:The determining whether the member node is a node in a fake cluster according to the function value obtained from the data packet and the determined function value specifically includes:判断从所述数据包中获取到的发送节点的函数值和确定出的成员节点的函数值是否相同,以及,从所述数据包中获取到的接收节点的函数值和根据所述对应关系确定出的所述簇头节点的函数值是否相同,若至少一个不同,则所述发送所述数据包的成员节点为伪装簇内节点。Judging whether the function value of the sending node obtained from the data packet is the same as the function value of the determined member node, and the function value of the receiving node obtained from the data packet is determined according to the corresponding relationship. Whether the output function values of the cluster head node are the same, and if at least one is different, the member node that sends the data packet is a node in the fake cluster.3.如权利要求1所述的方法,其特征在于,所述节点标识包括多位,所述预设函数为节点标识的各位数值之和。3 . The method of claim 1 , wherein the node identifier includes multiple bits, and the preset function is the sum of the values of each bit of the node identifier. 4 .4.如权利要求1所述的方法,其特征在于,所述方法还包括:若判断出所述成员节点为伪装簇内节点,则丢弃所述数据包。4 . The method according to claim 1 , further comprising: discarding the data packet if it is determined that the member node is a masquerading intra-cluster node. 5 .5.如权利要求1-4任一项所述的方法,其特征在于,所述方法还包括:5. The method of any one of claims 1-4, wherein the method further comprises:根据预设的更新周期更新所述预设函数,和/或,根据预设的分配周期为所述各成员节点分配通信时隙。The preset function is updated according to a preset update period, and/or a communication time slot is allocated to each member node according to a preset allocation period.6.一种簇头节点,其特征在于,包括:分配模块、发送模块、计算模块、存储模块、接收模块、查找模块、解析模块和判断模块;6. A cluster head node, comprising: an allocation module, a transmission module, a calculation module, a storage module, a reception module, a search module, an analysis module and a judgment module;所述分配模块用于,为各成员节点分配通信时隙;The allocation module is used for allocating communication time slots for each member node;所述发送模块用于,将所述分配模块分配的通信时隙发送给相应的成员节点;The sending module is configured to send the communication time slot allocated by the allocation module to the corresponding member node;所述计算模块用于,计算预设函数的函数值,所述预设函数为关于节点标识的函数;The calculation module is used for calculating a function value of a preset function, where the preset function is a function related to node identification;所述存储模块用于,存储节点标识、预设函数的函数值和通信时隙的对应关系;The storage module is used for storing the corresponding relationship between the node identifier, the function value of the preset function and the communication time slot;所述接收模块用于,接收成员节点发送的数据包;The receiving module is used for receiving data packets sent by member nodes;所述查找模块用于,根据所述接收模块接收所述数据包的通信时隙和所述对应关系确定函数值;The search module is configured to determine a function value according to the communication time slot of the data packet received by the receiving module and the corresponding relationship;所述解析模块用于,解析所述数据包,以获取包头中携带的函数值,所述函数值是发送所述数据包的成员节点计算得到的;The parsing module is used for parsing the data packet to obtain a function value carried in the packet header, where the function value is calculated by the member node that sends the data packet;所述判断模块用于,根据从所述数据包中获取到的函数值和确定出的函数值,判断所述成员节点是否为伪装簇内节点。The judging module is used for judging whether the member node is a fake cluster node according to the function value obtained from the data packet and the determined function value.7.如权利要求6所述的簇头节点,其特征在于,所述节点标识包括簇头节点标识和成员节点标识;所述数据包的包头携带有发送节点的函数值和接收节点的函数值,所述发送节点为发送所述数据包的成员节点,所述接收节点为接收所述数据包的簇头节点;7. cluster head node as claimed in claim 6, is characterized in that, described node identification comprises cluster head node identification and member node identification; The packet header of described data packet carries the function value of sending node and the function value of receiving node , the sending node is a member node that sends the data packet, and the receiving node is a cluster head node that receives the data packet;所述判断模块具体用于,判断从所述数据包中获取到的发送节点的函数值和确定出的成员节点的函数值是否相同,以及,从所述数据包中获取到的接收节点的函数值和根据所述对应关系确定出的所述簇头节点的函数值是否相同,若至少一个不同,则所述发送所述数据包的成员节点为伪装簇内节点。The judging module is specifically used for judging whether the function value of the sending node obtained from the data packet is the same as the function value of the determined member node, and whether the function value of the receiving node obtained from the data packet is the same Whether the value is the same as the function value of the cluster head node determined according to the corresponding relationship, and if at least one is different, the member node sending the data packet is a node in the fake cluster.8.如权利要求6所述的簇头节点,其特征在于,所述节点标识包括多位,所述预设函数为节点标识的各位数值之和。8 . The cluster head node according to claim 6 , wherein the node identifier comprises multiple bits, and the preset function is the sum of the values of each bit of the node identifier. 9 .9.如权利要求6所述的簇头节点,其特征在于,还包括处理模块,所述处理模块还用于,当所述判断模块判断出所述成员节点为伪装簇内节点时,丢弃所述数据包。9. The cluster head node according to claim 6, further comprising a processing module, the processing module is further configured to, when the judgment module judges that the member node is a disguised intra-cluster node, discard all the data package.10.如权利要求6-9任一项所述的簇头节点,其特征在于,还包括更新模块,所述更新模块用于,根据预设的更新周期更新所述预设函数;和/或,10. The cluster head node according to any one of claims 6-9, further comprising an update module, wherein the update module is used to update the preset function according to a preset update cycle; and/or ,所述分配模块还用于,根据预设的分配周期为所述各成员节点分配通信时隙。The allocation module is further configured to allocate communication time slots to the member nodes according to a preset allocation period.
CN201810573856.6A2018-06-062018-06-06Method and device for identifying nodes in disguised clusterActiveCN108769040B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810573856.6ACN108769040B (en)2018-06-062018-06-06Method and device for identifying nodes in disguised cluster

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810573856.6ACN108769040B (en)2018-06-062018-06-06Method and device for identifying nodes in disguised cluster

Publications (2)

Publication NumberPublication Date
CN108769040A CN108769040A (en)2018-11-06
CN108769040Btrue CN108769040B (en)2021-03-19

Family

ID=63999052

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810573856.6AActiveCN108769040B (en)2018-06-062018-06-06Method and device for identifying nodes in disguised cluster

Country Status (1)

CountryLink
CN (1)CN108769040B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101594271A (en)*2008-05-272009-12-02华为技术有限公司 Establishment and working methods of wireless ad hoc networks and related networks and equipment
CN102395161A (en)*2011-10-282012-03-28中国科学院深圳先进技术研究院Method and system for wireless network transmission scheduling
CN104272700A (en)*2012-05-012015-01-07贺利实公司Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques
CN104284387A (en)*2014-09-192015-01-14南京邮电大学 A Clustering Routing Method for Mobile Sensor Networks
CN104822143A (en)*2015-05-042015-08-05东南大学Source node position privacy protection method with anti-flow-analysis-attack function

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7298716B2 (en)*2003-11-062007-11-20Lucent Technologies Inc.Clustering based load adaptive sleeping protocol for ad hoc networks
KR100628296B1 (en)*2003-12-182006-09-27한국전자통신연구원 How to Analyze Network Attacks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101594271A (en)*2008-05-272009-12-02华为技术有限公司 Establishment and working methods of wireless ad hoc networks and related networks and equipment
CN102395161A (en)*2011-10-282012-03-28中国科学院深圳先进技术研究院Method and system for wireless network transmission scheduling
CN104272700A (en)*2012-05-012015-01-07贺利实公司Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques
CN104284387A (en)*2014-09-192015-01-14南京邮电大学 A Clustering Routing Method for Mobile Sensor Networks
CN104822143A (en)*2015-05-042015-08-05东南大学Source node position privacy protection method with anti-flow-analysis-attack function

Also Published As

Publication numberPublication date
CN108769040A (en)2018-11-06

Similar Documents

PublicationPublication DateTitle
CN109257834B (en)Networking method of mesh wireless sensor network based on Thread protocol
CN106878199B (en)Configuration method and device of access information
CN109714274B (en)Method for acquiring corresponding relation and routing equipment
WO2017148158A1 (en)System for home gateway to recognize type of access device using cloud platform
KR20130067134A (en)Communication method, communication apparatus and communication system
JP6195014B2 (en) COMMUNICATION SYSTEM, COMMUNICATION METHOD, RELAY DEVICE, AND COMMUNICATION PROGRAM
CN113612705A (en)Power grid monitoring system data transmission method based on Hash algorithm fragmentation and recombination
CN101360046A (en)Bandwidth resource saving method
WO2017041737A1 (en)Packet processing
CN114423066A (en) Network control method and device for data communication
CN108769040B (en)Method and device for identifying nodes in disguised cluster
CN102883311B (en)OID (object identifier) coding based wireless sensing network equipment addressing method
CN101753456B (en)Method and system for detecting flow of peer-to-peer network
CN107070719A (en)A kind of device management method and device
CN111711708B (en)LoRaWAN terminal equipment address allocation method
KR102683438B1 (en)Apparatus and method for providing security to an end-to-end communication
CN104168151A (en)IPv6-based communication method, monitoring device, gateway and system
CN107257563B (en)Remote low-power-consumption network system and networking method
RU2622788C1 (en)Method for protecting information-computer networks against cyber attacks
CN101414892A (en)Method, system and node equipment for detecting link layer address collision
CN108924843B (en)Intra-cluster communication method and intra-cluster communication device
CN117675095A (en) Communication methods and systems, electronic devices, computer-readable media
CN113395615A (en)Message processing method and device, electronic equipment and readable storage medium
JP2017005516A (en) COMMUNICATION DEVICE, ITS CONTROL METHOD, COMPUTER PROGRAM
US11314414B2 (en)Methods, devices, and computer program products for storage management

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp