Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient and energy-saving link safety method in wireless sensor network

A wireless sensor, high-efficiency and energy-saving technology, applied in security devices, wireless communication, energy-saving ICT, etc., can solve the problem of reduced utilization of network resources, reduce computing load, prevent replay attacks and denial of service attacks, and improve availability Effect

Inactive Publication Date: 2010-09-01
BEIJING UNIV OF TECH
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of application layer security strategy can only guarantee end-to-end security, and the intermediate nodes will still be threatened by various attacks, such as replay attacks, DoS denial of service attacks, etc., resulting in tampered transmission in the network. After the message is received by the base station, the error cannot be found through message verification code verification, random number comparison, etc., which greatly reduces the utilization rate of network resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient and energy-saving link safety method in wireless sensor network
  • Efficient and energy-saving link safety method in wireless sensor network
  • Efficient and energy-saving link safety method in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The wireless sensor network in this embodiment (the network topology diagram is as follows Figure 4 As shown) is composed of 8 MICAz sensor nodes and 1 base station (the base station is composed of 1 MICAz processor / radio frequency board connected with 1 MIB520USB PC gateway) from Crossbow Company in the United States, using the MoteView client monitoring software installed The IBM PC aggregates the data collected by the sensor nodes, including temperature (unit: Celsius), relative humidity (unit: %), and illumination (unit: lumens per square meter) data. The encryption algorithm used in the embodiment is the RC5 algorithm.

[0054] 1. Neighbor list establishment phase

[0055] In the initialization phase of the network, each node needs to form a route to the base station, and each node also establishes a neighbor relationship and a neighbor list accordingly during the route formation process. This embodiment adopts Figure 4 The shown method gets the route and buil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an efficient and energy-saving link safety method in a wireless sensor network, belonging to the cross technical field of a wireless sensor network and information safety. The invention establishes a neighbor list in which parameters used by the link safety method are stored. The invention adopts a method of encrypting sequence number fields at the header of a data frame, frame check sequence fields and a network grouping part together, can prevent malicious nodes from intercepting and analyzing flow of data of the wireless sensor network, and can confront active attacks of replay, denial of service, and the like initiated by the malicious nodes. The invention carries out link encryption under the condition of not changing the IEEE 802.15.4 general-purpose data frame structure, thus being simple and easy in use. The whole scheme comprises three stages of establishing the neighbor list, forwarding data and maintaining the neighbor list. Because the neighbor list has ingenious design, the three stages ensure that the sensor nodes have low expenses on computation, communication and storage, thus the invention is very suitable for the wireless sensor network with limited resources.

Description

technical field [0001] The invention is a method for realizing link security by using the neighbor list established between single-hop nodes, which is used to prevent malicious nodes from eavesdropping on wireless sensor network data and flow analysis, and to resist active attacks initiated by malicious nodes, belonging to wireless sensor Network and information security cross-technical application fields. Background technique [0002] Sensor nodes can be used to detect information such as temperature, humidity, light, and pressure in the surrounding environment. A wireless sensor network composed of multiple sensor nodes and base stations is usually deployed in forests, farmland, and civil buildings to collect information that people are interested in. Since wireless sensor networks use wireless links for data transmission, and the resources of sensor nodes are very limited, complex security mechanisms cannot be used, so wireless sensor networks face many security threats a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W40/24H04W12/03H04W12/122
CPCY02B60/50Y02D30/70
Inventor 何泾沙张兴韦潜孙旭光
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products