Node trust management system in wireless sensor network

A wireless sensor and trust management technology, applied in wireless communication, network topology, electrical components, etc., can solve problems such as network paralysis, low trust value, and packet forwarding failure.

Inactive Publication Date: 2011-02-16
GUILIN UNIV OF ELECTRONIC TECH
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the network deployment environment is poor, most of the normal nodes have low trust value due to frequent packet loss, data packet forwarding failure and other reasons, and are excluded from the nodes participating in the task.
3) Short-lived noise interference attacks will cause network paralysis
Noise interference attacks will cause network nodes to fail to transmit and forward data packets. The direct impact is that the trust value of all nodes in the noise-affected area will drop. After the noise is eliminated, normal nodes will not be able to perform tasks for a long time, causing the network in the noise-affected area paralyzed state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node trust management system in wireless sensor network
  • Node trust management system in wireless sensor network
  • Node trust management system in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] The technical solution adopted by the present invention is that in the system, the monitoring dog module is connected with the environment detection module and the state evaluation module, and the environment detection module is connected with the state evaluation module, the trust establishment module and the malicious node judgment module in sequence, such as figure 1 .

[0100] The specific steps of the system work are as follows:

[0101] The first step is initialization. First preset system parameters ξ 0 , R 0 , R 1 , β 1,1-J , β 2,1-J , β 3,1-J , β 4,1-J ,P thr 、C thr 、r 0 . Divide each time slice cycle into a supervision phase and a trust evaluation phase. Such as figure 2As shown, in the monitoring phase, the monitoring subsystem is run, that is, its component module—the monitoring dog module is run. In the stage of trust evaluation, run the trust evaluation subsystem, that is, run its component modules—environment detection module, state eval...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a node trust management system in a wireless sensor network, in which a monitor dog module is connected with an environmental detection module and a state evaluation module, the environmental detection module is sequentially connected with the state evaluation module, a trust setup module and a malicious node judgment module, and a node operation monitor subsystem initiates the monitor dog module at the monitor stage during system operation in order to monitor and judge whether a variety of behaviors of adjacent nodes are malicious or normal. At the stage of trust evaluation, a trust evaluation subsystem is initiated, an operation monitor subsystem is suspended, and a new trustable node list and a new non-trustable node list are generated. Compared with the currenttrust management of wireless network for predicating node state based on node working ability, the sensor network node trust system having the framework and implementation mechanism based on node state evaluation can effectively identify malicious nodes and be free from the interference and influence from deployment environment.

Description

technical field [0001] The invention relates to a wireless sensor network, in particular to a node trust management system in a wireless sensor network. Background technique [0002] Wireless sensor network is a special Ad-hoc network composed of a large number of cheap and unreliable sensor nodes. It has a wide range of applications in military and civilian fields, such as battlefield surveillance, environmental monitoring and disaster relief. It is currently a very active Research areas. Sensor networks are often deployed in battlefield environments or environments where physical protection cannot be implemented, and nodes are easily captured. If the captured nodes are not identified in time, such nodes injected with malicious code will intentionally generate discarding, replaying, modifying and Malicious behavior such as forging data packets to achieve the purpose of disrupting the normal operation of the network and impairing the quality of service of the network. Trad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W84/18H04W24/04
Inventor 李小龙黄廷磊刘洋
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products