Wormhole detecting method based on specific triple-jump channel path in wireless sensor network

A wireless sensor and detection method technology, applied in wireless communication, network topology, electrical components, etc., to achieve the effect of high detection rate

Inactive Publication Date: 2012-11-07
HARBIN ENG UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Some solutions require additional equipment such as GPS, directional antenna, etc.
[0006] (2) Some schemes require precise clo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wormhole detecting method based on specific triple-jump channel path in wireless sensor network
  • Wormhole detecting method based on specific triple-jump channel path in wireless sensor network
  • Wormhole detecting method based on specific triple-jump channel path in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention is described in more detail below in conjunction with accompanying drawing example:

[0029] According to the legal topology characteristics of the specific 3-hop path in the wireless sensor network, it is judged whether there is an abnormal specific 3-hop path in the network (that is, a specific 3-hop path that violates the legal topology characteristics). If an abnormal specific 3-hop path is found in the network, it is determined that the network is under wormhole attack.

[0030] Firstly, the definition of specific 3-hop paths, the legal topological characteristics of specific 3-hop paths and the definition of abnormal specific 3-hop paths are given.

[0031] It is known that the shortest path length between node q and node s is 2 hops. If there is a path satisfying the following conditions in their common neighbors (denoted as G(q,s)), we call this path a specific 3 hops path (denoted as S3HP).

[0032] S3HP required conditions:

[0033] (1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a wormhole detecting method based on a specific triple-jump path in a wireless sensor network. The method comprises the following steps that (1) in a network initializing stage, each node acquires a one-jump neighbor list and a two-jump neighbor list, and then transmits the neighbor list to one-jump neighbor nodes and two-jump neighbor nodes through a whole network; (2) each node in the network maintains a topology table, and the one-jump neighbor list transmitted by the one-jump neighbor nodes and two-jump neighbor nodes is recorded into the topology table when being received by each node; and (3) each node in the network firstly carries out attack judging, then locates wormholes and takes a corresponding measure according to an attack judging result, and finally deletes a false-neighbor found after location of the wormholes in a neighbor list of a current node. The invention relates to the distributed and practical wormhole detecting method with no need of support of special hardware equipment. The method is used for intrusion detection of the wireless sensor network, and has a better safety protection effect.

Description

technical field [0001] The invention relates to an intrusion detection method for a wireless sensor network. Background technique [0002] A wireless sensor network is composed of a large number of sensor nodes. Multi-hop wireless communication is used between nodes that are not within the communication range of each other, and each node has the function of routing and forwarding. Since wireless sensor networks are often in an open application environment, the network is vulnerable to various attacks. A wormhole is a tunnel formed by two distant malicious nodes. The malicious node at one end of the wormhole captures the data packets sent by the surrounding nodes, and then transmits them to the other end of the wormhole through the tunnel. After these data packets are received by the malicious nodes at the far end, they are replayed to the nearby area. Wormholes cause wrong routes to be established between nodes by transmitting wrong neighbor information. [0003] like f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W24/00H04W84/18H04W12/121H04W12/122
Inventor 姚念民张强马海峰
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products