Adaptive active defense realizing method and system in WSN (wireless sensor network)

A technology of active defense and implementation method, applied in electrical components, wireless communication, network topology, etc., can solve the problems of not considering the active defense of network attacks, unable to solve network attack defense, increase network transmission overhead, etc., to achieve security and robustness Performance improvement, additional transmission consumption reduction, and the effect of life cycle growth

Active Publication Date: 2014-09-03
TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the algorithm-level research of infrastructure security, due to the limited resources of nodes, it is impossible to effectively defend against network attacks. The attacking node will increase the overhead of network transmission
For system-level research, the self-healing system focuses more on the recovery of the bad state of the node itself, but does not consider the active defense against network attacks, so it cannot solve the problem of network attack defense, and its defense is only It is called passive defense; the immune system can well solve the problem of active defense against network attacks, but because the current research only stays at the level of how to correspond to the wireless sensor network and the artificial immune system, many restrictions on the wireless sensor network have not yet been solved. come up with a reasonable solution
Therefore, there is currently a lack of a reasonable mechanism and its system to achieve active defense against network attacks under the premise of low energy consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive active defense realizing method and system in WSN (wireless sensor network)
  • Adaptive active defense realizing method and system in WSN (wireless sensor network)
  • Adaptive active defense realizing method and system in WSN (wireless sensor network)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In WSN, the network attacks on the physical layer and the link layer have been basically solved, but although many solutions have been proposed for the attacks on the network layer, they are basically evasive strategies, and effective security protection cannot be carried out. The essential reason is that it is impossible to determine the source node under attack and to defend on the source node in time. Below we will specifically illustrate the adverse consequences of this evasion strategy on WSNs through greedy destruction attacks.

[0064] figure 1 It is a schematic diagram of data transmission when the existing WSN is not attacked by greed. Such as figure 1 As shown, S is the terminal node, the main task is to forward the command of the terminal PC and send the data transmitted by the node to the terminal PC; nodes 1-9 are general nodes, the main task is to collect data and forward the data packets of neighboring nodes . At this time, node 3 sends data to termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for realizing self-adaptive active defense in a WSN (Wireless Sensor Network), and relates to the WSN field. The method includes the steps of: dividing the nodes in the WSN into different node domains according to predetermined rules; setting the nodes in each node domain as monitoring nodes or general nodes; Whether the data packet is an attack packet, if not, the data packet is forwarded according to the routing path; otherwise, step D is performed; D: the monitoring node judges whether there is a general node in the current node domain, and if it exists, activates the general node in the current node domain The node defends, otherwise, execute step E; E: forward the data packet according to the routing path until it reaches the monitoring node of the next node domain, and execute step D. The method implements active defense for WSN under the premise of low energy consumption through node domain division and setting of monitoring nodes.

Description

technical field [0001] The present invention relates to the technical field of WSN (WirelessSensorNetwork, wireless sensor network), in particular to a method and system for realizing self-adaptive active defense in WSN. Background technique [0002] WSN is a multi-hop self-organizing network formed by a large number of low-cost sensor nodes with sensing, computing, data processing and wireless communication capabilities deployed in the monitoring area through wireless communication. Network security design is a major requirement of WSN, but because WSN has many distinctive features, such as limited communication capability, limited power supply energy, limited computing power and storage space, dense sensor node configuration and flexible network topology, etc., WSN The security design of the network is more stringent than that of the traditional network. [0003] In recent years, there have been many studies on WSN security, which can be simply divided into two categories...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/00H04W84/18H04W12/122
Inventor 任丰原扈煜程鹏何滔
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products