Method for detecting network anomaly of wireless sensor based on trust evaluation

A wireless sensor and detection method technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as failure to consider the reliability of recommended nodes, high misjudgment rate, and inability to detect attack types well

Inactive Publication Date: 2012-11-28
HUNAN UNIV
View PDF2 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The shortcoming of this model is that there are requirements for the distribution of nodes in the network, that is, it is assumed that the nodes in the network obey the normal distribution, etc.
The disadvantage of this model is that it cannot detect new attack types

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting network anomaly of wireless sensor based on trust evaluation
  • Method for detecting network anomaly of wireless sensor based on trust evaluation
  • Method for detecting network anomaly of wireless sensor based on trust evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] Such as figure 2 As shown, node i in the figure conducts trust evaluation on node j, and the dotted circle represents the transmission range of the node. Node j must be within the communication range of node i. And node i only receives recommendation information about node j from recommending nodes R1, R2, R3, that is, common neighbor nodes of node i and node j. This is because the more hops the evaluation node receives from the evaluation node's recommendation information, the lower its authenticity. In order to prevent internal attacks such as bad mouth attacks, the trust model in the present invention only receives recommended information with a total hop count of two hops (the recommended information within the range of one hop is essentially direct monitoring information).

[0068] The trust model of the present invention consists of 5 stages. Including monitoring stage, fuzzy stage, DS fusion stage, recommendation information processing stage, judgment stage. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting network anomaly of a wireless sensor based on trust evaluation. The method comprises a monitoring step, a fuzzification step, a DS fusion step, a recommended information processing step, and a determining step. A main process is collecting node behavior characteristics, calculating a trust value thereof through a fuzzy theory and a DS evidence theory, determining node operating states by a judging mechanism, and finding malicious nodes, so that effectiveness of data collected by network is ensured. Through monitoring behavior of evaluated nodes, abnormal nodes existed in the network are detected, and the abnormal nodes are broadcasted to neighbor nodes so as to prevent the abnormal nodes destroy normal operation of the whole network.

Description

technical field [0001] The invention relates to a trust evaluation-based wireless sensor network anomaly detection method, which belongs to the security fields of wireless sensor networks and the Internet of Things. Background technique [0002] As an important branch of wireless communication, wireless sensor network is the core technology of the Internet of Things. It has achieved remarkable results and is widely used in military, transportation, agriculture and medical treatment. A wireless sensor network usually consists of a large number of sensor nodes, which are responsible for data sensing, collection or relay processing of received information. Due to the long-term exposure of the wireless sensor network to the natural environment and the inherent vulnerability of the open spectrum itself, the reliability of wireless transmission becomes extremely fragile. In military applications, sensing nodes are often distributed in war zones for a long time, which will undoubt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W24/00H04W12/122H04W12/68
Inventor 伍仁勇邓学肖长清李仁发
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products