Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed intrusion detection method in wireless sensor network

A wireless sensor and intrusion detection technology, applied in data exchange networks, transmission systems, digital transmission systems, etc., can solve the problems of no intrusion detection, can not meet the requirements of wireless sensor network intrusion detection, etc., to reduce the amount of calculation.

Inactive Publication Date: 2008-10-15
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] After searching the literature of the existing technology, it is found that the Chinese patent application number is 200710019976.3, and the name is "Hybrid Intrusion Detection Method for Wireless Sensor Networks", which describes a method based on multiple intrusion detection methods such as: based on clustering, based on distance for detection concentration The intrusion detection method of wireless sensor network with type intrusion or distributed intrusion, this method is only a centralized detection method, and does not do intrusion detection for the characteristics of discrete data and continuous data, and cannot meet the requirements of wireless sensor networks. Real-time intrusion detection requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed intrusion detection method in wireless sensor network
  • Distributed intrusion detection method in wireless sensor network
  • Distributed intrusion detection method in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0025] In this embodiment, a Matlab program is used to simulate a wireless sensor network, and all sensor nodes are equal in status, and all participate in data collection and routing and forwarding functions. In addition to storing data and network logs, each sensor node also stores the information of neighbor nodes (one hop) and the joint distribution probability model of local network log data. In order to meet the real-time requirements, the sensor network nodes first run the apriori algorithm on the non-invasive data to obtain the frequency table of each item and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting distributed intruding, which is used in a wireless sensor network. A frequent item set detecting method is used in a node of a sensor for detecting abnormality degree of discrete web log data and a method of joint probability distribution calculation is used for detecting the abnormality degree of successional web log data; if the node of the sensor judges that the whole data is abnormal intruding data, the node sends the suspicion data to the neighboring node of the sensor for verification; if the neighboring node also judges that the suspicion data is the intruding data, then the node of the sensor marks the data as the intruding data and starts to detect the next data. The method combines the distributed technology and the intruding detecting technology and reduces the calculation quantity and communication quantity of each node by the cooperation among nodes of the sensor network. An intruding movement is distinguished by analyzing the local web log data and reported to a system as an alarm, so as to realize the security purpose of protecting the wireless sensor network from various new and old attacks.

Description

technical field [0001] The invention relates to a security protection method of a wireless sensor network, in particular to a distributed intrusion detection method in a wireless sensor network. Background technique [0002] With the rapid development of wireless sensor network applications, network security issues are increasingly important. While firewalls are an effective first line of defense in detecting intrusions in wired networks, there is no such tool in wireless networks. Because wireless transmission is subject to packet loss and signal blocking. The security of each sensor node is important to maintain the security integrity of the entire network. Today, as wireless sensor networks are used more and more widely, users need an effective network security measure. [0003] Intrusion detection technology is one of the key technologies to protect network security. Intrusion Detection System IDS (IntrusionDetection System) is a system that can detect network intrus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 杨杰陈雷
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products