Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure clustering routing management method for wireless sensor network

A wireless sensor and network security technology, applied in network topology, security devices, wireless communication, etc., can solve problems such as low success rate, increased network load, and single type of malicious nodes, so as to resist malicious attacks and ensure secure communication Effect

Inactive Publication Date: 2014-01-15
HOHAI UNIV CHANGZHOU
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] 1) The energy consumption of the protocol is too large, which greatly increases the load on the network;
[0013] 2) The type of malicious nodes that the protocol can detect is single, and the success rate is not high;
[0014] 3) While the protocol attaches great importance to the reliable election of cluster head nodes, it ignores the trust management in the case of cluster head "rebellion"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure clustering routing management method for wireless sensor network
  • Secure clustering routing management method for wireless sensor network
  • Secure clustering routing management method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Such as figure 1 The overall framework of the safety clustering routing management method with energy prediction characteristics proposed by the present invention is based on the classic clustering routing protocol LEACH, so the working status of the protocol is the same as that of the LEACH protocol after the clustering is established. basically the same. The outstanding innovation points in the agreement are mainly divided into three parts in the figure to illustrate.

[0054] The first is to establish an intrusion detection mechanism with energy prediction capabilities to identify malicious nodes that have denial of service attacks. If the energy consumption of a certain node is predicted at a certain time in the future, when the time comes, it can be judged whether the node is captured as a malicious node, and at the same time, malicious attacks can be carried out by increasing its own energy. Considering the environment of cluster routing in wireless sensor netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure clustering routing management method for a wireless sensor network. The method is characterized by comprising the following steps: 1) intrusion detection with an energy prediction capability; 2) cluster head selection based on trust; and 3) safe communication guarantee and hostile attack resistance through a secure clustering mechanism based on trust management. By using the method, hostile nodes in a network can be efficiently and correctly detected; in addition, the secure clustering mechanism is established based on trust; on one hand, reliable cluster head selection can be ensured; on the other hand, hostile attack behavior is resisted; therefore, the problems of reduction of communication throughtput rate caused by hostile attack and the like can be solved.

Description

technical field [0001] The invention belongs to the communication security field of wireless sensor networks, and in particular the invention relates to an intrusion detection mechanism with energy prediction capability, a trust-based cluster head election process and a trust management-based security clustering mechanism to resist malicious attacks. Background technique [0002] Due to its highly interdisciplinary nature and broad application prospects, Wireless Sensor Networks has attracted great attention from academia and industry all over the world, and it is an emerging frontier hot research direction. According to the special threats faced by clustering routing protocols in wireless sensor networks, the security technology research content of clustering routing protocols can be divided into two levels: using effective key management technology, and designing effective security routing protocols. Key management technology encrypts the communication between nodes to inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W40/10H04W84/18H04W12/122
CPCY02D30/70
Inventor 韩光洁沈文朱川江金芳董玉慧张娜徐慧慧
Owner HOHAI UNIV CHANGZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products