Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mixed intrusion detection method of wireless sensor network

A technology of wireless sensor and intrusion detection, which is applied in the direction of data exchange network, transmission system, digital transmission system, etc., and can solve problems such as wireless sensor network security attacks

Inactive Publication Date: 2009-03-18
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its goal is to use a simple method to solve the security attack problem of wireless sensor networks that cannot be effectively solved by intrusion prevention technology while consuming as few nodes and network resources as possible.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mixed intrusion detection method of wireless sensor network
  • Mixed intrusion detection method of wireless sensor network
  • Mixed intrusion detection method of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] Assume that within a short period of time after the wireless sensor network is deployed, there are no malicious nodes in the network; each node saves its own neighbor table (reachable by one hop) and neighbor table through the neighbor discovery process; the base station keeps The topology of the entire network; the data contains the identity information of the source and target nodes.

[0081] For the convenience of description, we divide the attacks that wireless sensor networks are vulnerable to into external attacks and internal attacks, and accordingly illustrate the specific implementation of the above hybrid intrusion detection method.

[0082] 1. Intrusion detection of external attacks

[0083] External attacks against wireless sensor networks mainly occur at the data link layer, including collision attacks, unfair competition, resource exhaustion attacks, and integrity attacks.

[0084] Collision attack: When the channel is not idle, malicious nodes intentiona...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to one wireless sensor network mixture intruding test method, which comprises the following steps: integrating multiple test method based on host machine, network, integration and abnormal mode, wherein, according to wireless sensor network property and outer and inner attack and distributing the test task onto sensor points, cluster point and base station point combined with host machine and network.

Description

technical field [0001] The invention is a security protection scheme of a wireless sensor network, which is mainly used to solve various security attacks and security problems suffered by the wireless sensor network, and belongs to the application field of wireless sensor network and information security cross technology. Background technique [0002] Wireless sensor network is a new type of network formed by self-organization of a large number of cheap low-power sensor nodes through wireless multi-hop, widely used in military, medical health, industrial control, environmental monitoring, smart home and other important important occasion. Sensor nodes have the characteristics of small size, poor computing, communication and storage capabilities, powered by disposable batteries that cannot be replaced, and are often deployed in unattended open and harsh environments. Compared with traditional networks and general self-organizing networks (Ad Hoc networks), it is more vulnera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06H04L12/28
Inventor 王汝传赵奇陈志叶宁孙力娟黄海平
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products