吉林大学学报(工学版) ›› 2018, Vol. 48 ›› Issue (4): 1231-1236.doi: 10.13229/j.cnki.jdxbgxb20170975

Previous Articles     Next Articles

Network topology discovery algorithm against routing spoofing attack in Internet of things

FU Wen-bo1, ZHANG Jie1, CHEN Yong-le2   

  1. 1.School of Mathematics and Computer Science, Shanxi Datong University, Datong 037009, China;
    2.College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan 030024, China
  • Received:2017-10-21 Online:2018-07-01 Published:2018-07-01

Abstract: The traditional Network Topology Discovery (NTD) algorithm does not verify the authenticity of data sources, resulting in the possibility of the discovery results being deceived. Therefore, in the internet of things environment, a new NTD algorithm is proposed, which can resist routing spoofing attack. The undirected graph of the internet of things is described, and the PSNP request is used to query the source router of the suspicious routing information, so as to realize the authenticity detection and resist routing proofing attack. The information in SNMP management information base MIB is used to distinguish routers and switches, which provides the basis for network layer topology discovery. The algorithm flow of network layer topology discovery in SNMP protocol is given. The link layer topology discovery process is introduced by combing bridge switching and bridge spanning tree algorithm to realize link layer topology discovery. Experimental results show that the proposed algorithm can effectively resist routing proofing attack and has strong network topology discovery performance.

Key words: computer application, Internet of things environment, routing spoofing, attack, network topology discovery

CLC Number: 

  • TP393.07
[1] 郑杰, 李建平. 物联网传感网络路由改进设计算法研究[J]. 科技通报, 2017, 33(3):92-95.
Zheng Jie,Li Jian-ping.Research on improved design algorithm of internet of things sensor network[J]. Bulletin of Science and Technology, 2017, 33(3):92-95.
[2] 杨秀清, 陈海燕. 光通信技术在物联网中的应用[J]. 中国光学, 2014, 7(6): 889-896.
Yang Xiu-qing, Chen Hai-yan.Application of optical communication technique in the Internet of Things[J]. Chinese Optics, 2014, 7(6): 889-896.
[3] 于婷婷, 马晓波, 王晓娟. 基于移动代理的无线自组网络拓扑发现算法研究[J]. 现代电子技术, 2016, 39(18):39-42.
Yu Ting-ting,Ma Xiao-bo,Wang Xiao-juan.Research of mobile agent based topology discovery algorithms in wireless Ad hoc network[J]. Modern Electronics Technique, 2016, 39(18):39-42.
[4] 曾光, 陈性元, 杜学绘,等. 基于多子网交汇点的以太网物理拓扑发现算法[J]. 计算机科学, 2014, 41(5):173-177.
Zeng Guang,Chen Xing-yuan,Du Xue-hui, et al.Physical topology discovery algorithm for Ethernet based on intersection of multi-subnet[J]. Computer Science, 2014, 41(5):173-177.
[5] 李智楠, 杨晓冬. 基于可靠路径稳定性估计的MANET路由发现算法研究[J]. 通信学报, 2016, 37(8):119-128.
Li Zhi-nan,Yang Xiao-dong.Routing discovery algorithm based on reliable path stability estimation in MANET[J]. Journal on Communications, 2016, 37(8):119-128.
[6] 邹柯, 姚英彪. 抵御欺骗攻击的DV-Hop安全定位算法[J]. 传感技术学报, 2017, 30(4):603-610.
Zou Ke,Yao Ying-biao.DV-Hop secure localization algorithm against spoofing attack[J]. Chinese Journal of Sensors and Actuators, 2017, 30(4):603-610.
[7] 李祝红, 赵灿明, 石滚,等. 动态网络环境下的链路层拓扑发现算法[J]. 计算机系统应用, 2015, 24(10):122-128.
Li Zhu-hong,Zhao Can-ming,Shi Gun, et al.Link-layer topology discovery algorithm under dynamic networking environments[J]. Computer Systems & Applications, 2015, 24(10):122-128.
[8] 吴辰文, 茹俊年, 刘香丽,等. 基于丢包率的多播网络拓扑推断算法[J]. 计算机工程与应用, 2014, 50(13):118-120.
Wu Chen-wen, Ru Jun-nian, Liu Xiang-li,et al.Algorithm of multicast network topology inference based on packet loss rate[J]. Computer Engineering, 2014, 50(13):118-120.
[9] 张宾, 刁兴春, 刘艺,等. 基于AFT满足下行约束的物理拓扑发现方法[J]. 电子学报, 2016, 44(8):1864-1872.
Zhang Bin,Diao Xing-chun,Liu Yi,et al.A physical topology discovery method based on AFT of downstream constraint[J]. Acta Electronica Sinica, 2016, 44(8):1864-1872.
[10] 石佳玉, 吴辰文, 孔德弟,等. 基于叶节点DFS序列的网络拓扑推断算法[J]. 计算机工程与设计, 2014, 35(2):411-415.
Shi Jia-yu,Wu Chen-wen,Kong De-di,et al.Network topology inference method based on DFS sequence[J]. Computer Engineering and Design, 2014, 35(2):411-415.
[11] 宋钰, 关文静, 何小利. 动态传感网络主节点恶意攻击检测仿真[J]. 计算机仿真, 2014, 31(10):326-329.
Song Yu,Guan Wen-jing,He Xiao-li.Simulation on the malicious attack detection of major node of dynamic sensor network[J]. Computer Simulation, 2014, 31(10):326-329.
[12] 贺筱军, 李为民, 黄仁全,等. 基于攻击策略的复杂网络拓扑结构优化模型[J]. 电讯技术, 2014, 54(9):1286-1291.
He Xiao-jun,Li Wei-min,Huang Ren-quan,et al.An optimization topological structure model for complex network based on attack strategy[J]. Telecommunication Engineering, 2014, 54(9):1286-1291.
[13] 毕娟, 秦志光. 基于概率主题模型的社交网络层次化社区发现算法[J]. 电子科技大学学报, 2014, 43(6):898-903.
Bi Juan, Qin Zhi-guang.Hierarchical community discovery for social networks based on probabilistic topic model[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(6):898-903.
[14] 李黎, 郑庆华, 管晓宏,等. 基于有限资源提升网络可生存性的拓扑重构方法[J]. 物理学报, 2014, 63(17):1-11.
Li Li,Zheng Qing-hua,Guan Xiao-hong,et al.A topological reconfiguration method for enhancing networks survivability with limited resources[J]. Acta Physica Sinica, 2014, 63(17):1-11.
[15] 赵文涛, 赵好好, 孟令军. 基于相关拓扑势的社团发现算法[J]. 计算机应用与软件, 2017, 34(1):258-262.
Zhao Wen-tao,Zhao Hao-hao,Meng Ling-jun.Community detection algorithm based on interrelated topological potential[J]. Computer Applications and Software, 2017, 34(1):258-262.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[14] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
[15] ZHAO Hong-wei, LIU Yu-qi, TE Ri-gen, CHEN Chang-zheng, ZANG Xue-bai. New compression algorithms based on finite sequence [J]. 吉林大学学报(工学版), 2018, 48(3): 882-886.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Guo Kong-hui;Wang Shuang;Ding Hai-tao;Zhang Jian-wei . Elastic coupling characteristic of unsymmetrical rubber bushings of rear suspension[J]. 吉林大学学报(工学版), 2007, 37(06): 1225 -1228 .
[2] HE Lei,ZONG Chang-fu,TIAN Cheng-wei,WU Ren-jun,Zhang Tai-wu. DC motor fault diagnosis and fault tolerance control method for steer-by-wire car[J]. 吉林大学学报(工学版), 2011, 41(03): 608 -612 .
[3] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[4] CHU Liang, WANG Yan-bo, QI Fu-wei, ZHANG Yong-sheng. Control method of inlet valves for brake pressure fine regulation[J]. 吉林大学学报(工学版), 2013, 43(03): 564 -570 .
[5] LI Jing, WANG Zi-han, YU Chun-xian, HAN Zuo-yue, SUN Bo-hua. Design of control system to follow vehicle state with HIL test beach[J]. 吉林大学学报(工学版), 2013, 43(03): 577 -583 .
[6] ZHU Jian-feng, LIN Yi, CHEN Xiao-kai, SHI Guo-biao. Structural topology optimization based design of automotive transmission housing structure[J]. 吉林大学学报(工学版), 2013, 43(03): 584 -589 .
[7] HU Xing-jun, LI Teng-fei, WANG Jing-yu, YANG Bo, GUO Peng, LIAO Lei. Numerical simulation of the influence of rear-end panels on the wake flow field of a heavy-duty truck[J]. 吉林大学学报(工学版), 2013, 43(03): 595 -601 .
[8] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[9] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[10] MA Wan-jing, XIE Han-zhou. Integrated control of main-signal and pre-signal on approach of intersection with double stop line[J]. 吉林大学学报(工学版), 2013, 43(03): 633 -639 .