Efficient and energy-saving link safety method in wireless sensor network

A wireless sensor, high-efficiency and energy-saving technology, applied in security devices, wireless communication, energy-saving ICT, etc., can solve the problem of reduced utilization of network resources, reduce computing load, prevent replay attacks and denial of service attacks, and improve availability Effect

Inactive Publication Date: 2010-09-01
BEIJING UNIV OF TECH
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of application layer security strategy can only guarantee end-to-end security, and the intermediate nodes will still be threatened by various attacks, such as replay attacks, DoS denial of service attacks, etc., resulting in tampered tra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient and energy-saving link safety method in wireless sensor network
  • Efficient and energy-saving link safety method in wireless sensor network
  • Efficient and energy-saving link safety method in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0053] The wireless sensor network in this embodiment (the network topology is as Figure 4 Shown) It is composed of 8 MICAz sensor nodes and 1 base station (the base station is composed of 1 MICAz processor / RF board and 1 MIB520USB PC gateway connected) of Crossbow Company in the United States. It adopts the installed MoteView client monitoring software The IBM PC gathers data collected by sensor nodes, including temperature (unit: degrees Celsius), relative humidity (unit: %), and light (unit: lumens per square meter). The encryption algorithm used in the embodiment is the RC5 algorithm.

[0054] 1. Neighbor list establishment phase

[0055] In the initialization phase of the network, each node needs to form a route to the base station. In the process of forming the route, each node also establishes a neighbor relationship and establishes a neighbor list. This embodiment adopts Figure 4 The method shown obtains the route and establishes the neighbor list at the same time.

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an efficient and energy-saving link safety method in a wireless sensor network, belonging to the cross technical field of a wireless sensor network and information safety. The invention establishes a neighbor list in which parameters used by the link safety method are stored. The invention adopts a method of encrypting sequence number fields at the header of a data frame, frame check sequence fields and a network grouping part together, can prevent malicious nodes from intercepting and analyzing flow of data of the wireless sensor network, and can confront active attacks of replay, denial of service, and the like initiated by the malicious nodes. The invention carries out link encryption under the condition of not changing the IEEE 802.15.4 general-purpose data frame structure, thus being simple and easy in use. The whole scheme comprises three stages of establishing the neighbor list, forwarding data and maintaining the neighbor list. Because the neighbor list has ingenious design, the three stages ensure that the sensor nodes have low expenses on computation, communication and storage, thus the invention is very suitable for the wireless sensor network with limited resources.

Description

technical field [0001] The invention is a method for realizing link security by using the neighbor list established between single-hop nodes, which is used to prevent malicious nodes from eavesdropping on wireless sensor network data and flow analysis, and to resist active attacks initiated by malicious nodes, belonging to wireless sensor Network and information security cross-technical application fields. Background technique [0002] Sensor nodes can be used to detect information such as temperature, humidity, light, and pressure in the surrounding environment. A wireless sensor network composed of multiple sensor nodes and base stations is usually deployed in forests, farmland, and civil buildings to collect information that people are interested in. Since wireless sensor networks use wireless links for data transmission, and the resources of sensor nodes are very limited, complex security mechanisms cannot be used, so wireless sensor networks face many security threats a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W40/24H04W12/03H04W12/122
CPCY02B60/50Y02D30/70
Inventor 何泾沙张兴韦潜孙旭光
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products