A Defense Method for Selective Forwarding Attacks in Sensor Networks

A sensor network and selective technology, applied in the direction of data exchange network, transmission system, digital transmission system, etc., can solve the problems of limited ability to resist attacks, damage data transmission, etc., to reduce reception delay, improve security performance, and prevent tampering The effect of packets

Inactive Publication Date: 2012-02-08
宁波中科集成电路设计中心有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to be able to effectively resist the loss of data packets, "A efficient countermeasure to the selective forwarding attack in wireless sensor networks [C]," in TENCON 2007-2007 IEEE Region 10 Conference, pp.1-4, 2007. (proposed at the 2007 TENCON conference "An Effective Method for Responding to Selective Forwarding Attacks in Wireless Sensor Networks") proposes to use multi-path routing to defend against selective forwarding attacks, but its ability to resist attacks is limited. When a malicious node appears on each path, it can Completely destroy data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Defense Method for Selective Forwarding Attacks in Sensor Networks
  • A Defense Method for Selective Forwarding Attacks in Sensor Networks
  • A Defense Method for Selective Forwarding Attacks in Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0023] A defense method for selective forwarding attacks in a sensor network, the sensor network includes a plurality of identical sensor nodes randomly deployed in a monitoring area with high density, and once deployed, the sensor nodes will not move any more; Communication radius, the use of the same sensor nodes is beneficial for the expansion of large-scale sensor networks and facilitates the management of sensor networks. The same sensor nodes form a wireless ad hoc network in a self-organizing manner. The wireless ad hoc network is connected to a safe and trusted base station. All sensor nodes transmit the perceived data to the base station. Each sensor node has a unique and The key shared by the base station, so that when attacked by a malicious node, the sensor network will only disclose the key of the attacked sensor node without affe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for defending selective transmission attack in a sensor network, which includes the following steps: a sensor node establishes a neighbor table of the sensor node; the sensor node divides sensed perception data into a plurality of data pieces according to a polynomial principle, and the data pieces generate polynomial values by polynomial calculation; the polynomial values are transmitted to a base station along a plurality of different paths according to a multipath data transmission mechanism; the base station receives the polynomial values according to the polynomial principle, then analyzes and restores the original perception data. The method of the invention has the advantages that the perception data are divided into smaller data pieces, and different polynomial values are generated by the polynomial calculation so that a transmission node cannot acquire the content, thus reducing the data communication volume and the receiving delay and preventing the malign mode from falsifying a data package; when the multipath data transmission mechanism is used for transmitting the data package, a next jump node is dynamically selected from the neighbor table to transfer the data package, thus increasing the attacking difficulty of the malign nodes.

Description

technical field [0001] The invention relates to a security technology in a sensor network, in particular to a defense method for selective forwarding attacks in a sensor network. Background technique [0002] The acquisition of information is the premise of realizing informatization, and an important tool for obtaining information about the physical environment is the sensor. Traditional sensors form a sensor network through a bus. In practical applications, many data acquisition systems have the characteristics of large acquisition range, numerous acquisition points, and difficult wiring. This traditional sensor network is difficult to meet the application requirements. At present, breakthroughs have been made in information transmission and processing technology. With the rapid development of microelectronics technology and the increasingly mature technology, sensors are also developing in the direction of integration, miniaturization, and intelligence. In this way, a wir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L12/28H04L12/56H04L29/06
Inventor 潘勇谢磊徐勇军
Owner 宁波中科集成电路设计中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products