Secure routing method for converged network of wireless sensor network and computer network

A technology of wireless sensor network and fusion network, which is applied in the field of secure routing of wireless sensor network and computer network fusion network, can solve the problems of limited research work, achieve the effects of prolonging the life span, resisting selective forwarding attacks, and expanding the scale

Inactive Publication Date: 2011-07-20
NO 61 INST OF GENERAL STAFF
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, a lot of research work is still focused on the WSN routing protocol itself, and there is not much research work on the routing algorithm for the integration of wireless sensor networks and computer networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure routing method for converged network of wireless sensor network and computer network
  • Secure routing method for converged network of wireless sensor network and computer network
  • Secure routing method for converged network of wireless sensor network and computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Figure 5 The secure routing method of wireless sensor network and computer network fusion network of the present invention is shown, comprising the following steps:

[0067] A) the whole fusion network is divided into several clusters, each cluster includes a cluster head node and some member nodes selected before each round of communication;

[0068] B) After the cluster is established, the aggregation node starts and establishes the multi-hop multi-path of the inter-cluster nodes by broadcasting the routing discovery packet (Route-Find-Pkt);

[0069] C) The cluster head node monitors the forwarding behavior of the neighbor cluster head node, and adjusts the trust value of the neighbor cluster head node according to the monitoring result, and the sink node collects the trust value information reported by each cluster head node in the network, and real-time Evaluate the running status of each cluster head node, and generate notification messages of different levels ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure routing method for a converged network of a wireless sensor network and a computer network, which comprises the following steps: the entire converged network is divided into a plurality of clusters, wherein each cluster comprises a cluster head node selected before each turn of communication and a plurality of member nodes; after the clusters are established, a sink node initiates and establishes a multihop multipath for nodes among clusters by broadcasting a Route-Find-Pkt; and the cluster head node monitors the forwarding behavior of a neighbor cluster head node and adjusts the belief value of the neighbor cluster head node according to a monitoring result, and the sink node collects the belief value information notified by each cluster head node in the network, estimates the running status of each cluster head node in real time, generates different grades of notification messages according to an estimation result, and notifies each cluster head node. Under the premise of fully considering security factors, the converged network can effectively defend various attacks in a sustainable energy consumption range by fully relying on the information processing ability of the computer network.

Description

technical field [0001] The invention relates to network communication technology, in particular to a safe routing method for a wireless sensor network and a computer network fusion network, which is used to solve various security threats faced by the network, so that the network can provide reliable services for users. Background technique [0002] WSN is a comprehensive intelligent information system integrating information collection, information transmission and information processing (such as figure 1 shown). As early as 1999, the American "Business Weekly" rated "networked micro-sensor technology" as one of the 21 most important technologies in the 21st century. In February 2003, the US magazine "MIT Technology Review" listed WSN as the top ten emerging technologies that will change the world in the future. The American "Business Weekly" magazine published in August 2003 published an article in its "Future Technology Special Edition", pointing out that utility computi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W40/02H04W84/18H04L12/56H04L29/06H04L45/16
CPCY02D30/70
Inventor 徐启建吴作顺王伟超
Owner NO 61 INST OF GENERAL STAFF
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products