Secure clustering routing management method for wireless sensor network
A wireless sensor and network security technology, applied in security devices, network topology, wireless communication, etc., can solve problems such as low success rate, aggravated network load, neglect of trust management, etc., to ensure secure communication and resist malicious attacks Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] like figure 1 The overall framework of the safety clustering routing management method with energy prediction characteristics proposed by the present invention is based on the classic clustering routing protocol LEACH, so the working status of the protocol is the same as that of the LEACH protocol after the clustering is established. basically the same. The outstanding innovation points in the agreement are mainly divided into three parts in the figure to illustrate.
[0054] The first is to establish an intrusion detection mechanism with energy prediction capabilities to identify malicious nodes that have denial of service attacks. If the energy consumption of a certain node is predicted at a certain time in the future, when the time comes, it can be judged whether the node is captured as a malicious node, and at the same time, malicious attacks can be carried out by increasing its own energy. Considering the environment of cluster routing in wireless sensor networks...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com