Method for detecting Sybil attack

A sybil attack and detection threshold technology, applied in electrical components, wireless communication, network topology, etc., to achieve the effect of reducing energy consumption

Inactive Publication Date: 2009-07-08
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Simultaneous attack: The attacker may try to use all the identities it owns to participate in network communication at the same time. However, for a specific physical device, at a certain moment, it can only have one identity, and the attacker can use different identities by recycling. , and form the illusion of using multiple IDs at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting Sybil attack
  • Method for detecting Sybil attack
  • Method for detecting Sybil attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The new scheme is divided into four stages: cluster head election, cluster establishment, time slot allocation and data transmission. In order to express the detection algorithm with the formula conveniently, table 1 shows some parameters used when the algorithm is realized.

[0041] Table 1 Parameters used by the detection algorithm

[0042]

[0043] (1) Cluster head election stage

[0044] The candidate cluster head node broadcasts its own information to the whole network, announcing itself as the cluster head node. At the same time, only one cluster head node can broadcast its own information. Candidate cluster head node H broadcasts message {sequence|ID in plaintext H} Give yourself the surrounding nodes, tell the current round number sequence and cluster head ID H .

[0045] 1) At this time, the cluster head node detection algorithm is carried out. Suppose a cluster head node communicates directly with more than four member nodes: cluster head node u i To...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Directed towards solving the problem of the Sybil attack faced by wireless sensor network routing protocol, the invention provides a method for detecting Sybil attack. In a way of carrying along with detection parameter message at the end of a data packet at the protocol execution stage, the method makes a synthetic judgment about the Sybil attack in the wireless sensor network through node energy and received signal strength value, and raises the detection precision through the mutual supervision between cluster-head nodes and member nodes. The invention provides a practical and feasible method for detecting Sybil attack for network, in particular for sensor network, and can effectively raise the safety of wireless sensor network, such as the detection to routing, resource distribution and deviant behavior, etc. The scheme has the advantages of simple realization, high detection rate and strong anti-attack ability, etc.

Description

technical field [0001] The invention is a new method for detecting Sybil (sorceress) attack in information network, especially wireless sensor network routing protocol, and belongs to the technical field of computer and information security. Background technique [0002] A wireless sensor network is a peer-to-peer network temporarily formed by mobile nodes without prior network infrastructure construction. It is a self-organizing and self-managing network. Each node in the network can join and exit at any time, the topology changes frequently, and because the communication coverage of each node is small, the communication between nodes often needs to go through multi-hop forwarding of other nodes. These characteristics make sensor networks not only have various threats such as information leakage, information tampering, replay attacks, and denial of service faced by general wireless networks, but also face sensor nodes that are easy to be physically manipulated by attackers,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W84/18
Inventor 杨庚曹晓梅陈伟陈建新朱薇
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products