Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure interference resistant method for wireless sensor network system

A wireless sensor network and system security technology, which is applied in the field of system security and anti-jamming for wireless sensor network applications, can solve problems such as external network interference, and achieve the effect of reducing network damage.

Inactive Publication Date: 2008-10-15
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, large-scale engineering structure monitoring systems are often in harsh working environments, and there are various possibilities of external network interference. The safety and anti-interference performance of the monitoring system is very important for the realization of system functions and long-term stable work. Therefore, effective system security anti-interference design The method and its implementation are very important for the application and promotion of wireless sensor network technology
Through searching, there are currently no relevant patents related to the safe and anti-jamming design method of wireless sensor network systems at home and abroad

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure interference resistant method for wireless sensor network system
  • Secure interference resistant method for wireless sensor network system
  • Secure interference resistant method for wireless sensor network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as figure 1 As shown, the unique real-time key (ERTK) scheme of the present embodiment includes three kinds of network nodes with different functions: sensor node, cluster head node and base station node, each sensor node and cluster head node have at least two independently reaching base station respectively The independent anti-jamming routing path of the node includes the following steps:

[0033] The first step: Encrypting the sensor nodes: before the deployment of the wireless sensor network, configure a unique network identifier and an initial unique real-time key for each sensor node, and the initial unique real-time key is randomly generated by the base station node;

[0034] The second step: the cluster head node monitors the sensor nodes, and if an abnormal event is detected in the nodes in the cluster head, the abnormal event is reported to the base station node;

[0035] The third step: the base station node generates a unique real-time key update comm...

Embodiment 2

[0039] Such as figure 2As shown, the wireless sensor network system security anti-jamming method of this embodiment includes the following steps:

[0040] The first step: Encryption of sensor nodes: Before network deployment, each sensor node in each subnet is configured with a unique network identifier and a unique real-time key, and an initial backbone network / subnet multi-key is established. The initial backbone network / subnet The subnet multi-key is randomly generated by the base station node;

[0041] The second step: the cluster head nodes in each subnet monitor the sensor nodes therein, and if an abnormal event is detected in the sensor node in the cluster head, the abnormal event is reported to the relay node;

[0042] The third step: the relay node generates the backbone network / subnet multi-key update command according to the abnormal event and transmits it to the base station node;

[0043] The fourth step: the base station node generates a new backbone network / s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safe and anti-interference method for wireless sensor network systems, which encrypts each network node aiming at application requirements of the wireless sensor networks with low energy consumption and low time delay; furthermore, each network node in the method is provided with at least two routing paths independently reaching a network base station; when compromising behaviors such as external optional transmission of a network and data modification, etc. occur, the network nodes choose the safe routing path. The invention is a novel safe and anti-interference method which combines network encryption and independent network route and is applied to wireless sensor networks; the application system of the wireless sensor networks developed by the method has the advantages of low power consumption, low time delay and long-term stability.

Description

1. Technical field [0001] The invention relates to a network security anti-jamming method, in particular to a system security anti-jamming method oriented to wireless sensor network applications. 2. Background technology [0002] Intelligent wireless sensor network technology integrates the three major technologies of advanced sensors, embedded computing, and wireless communication, which can realize uninterrupted sensing, distributed processing and monitoring of physical parameters such as temperature, humidity, light, displacement and noise. Wireless signal transmission, and constitute an intelligent wireless network application system. In recent years, researchers at home and abroad have carried out extensive research on the application of wireless sensor networks, covering a wide range of application fields, such as military enemy monitoring, wild animal monitoring, smart home, medical condition monitoring, engineering structure monitoring, and precision agriculture. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 袁慎芳吴键尚盈丁建伟李耀曾
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS