Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensor node trust value management method of wireless sensor network of tree topology structure based on Internet protocol (IP) v 6

A sensor node and wireless sensor technology, applied in wireless communication, network topology, data exchange network, etc., can solve problems such as energy consumption, single evaluation dimension, and deception

Inactive Publication Date: 2013-05-08
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 4. Sybil attack: The attack node uses a variety of identity information to deceive other neighbor nodes, so that other nodes preferentially choose this node for routing, and then carry out other attack behaviors;
[0015] 6. Energy exhaustion attack: Since new nodes need to be dynamically added to the wireless sensor network, and after the new node joins the network, it will interact with its neighbor nodes through the "HELLO" message. The attack node uses this process to continuously send a large number of "HELLO" information, neighbor nodes need to respond to a large number of "HELLO" information, the energy is continuously consumed, and finally the battery is quickly exhausted
However, in the process of evaluating the trust value of sensor nodes, the evaluation dimension used is relatively single, which leads to low accuracy and poor reliability of the evaluation results of trust value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensor node trust value management method of wireless sensor network of tree topology structure based on Internet protocol (IP) v 6
  • Sensor node trust value management method of wireless sensor network of tree topology structure based on Internet protocol (IP) v 6
  • Sensor node trust value management method of wireless sensor network of tree topology structure based on Internet protocol (IP) v 6

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings, but the protection scope of the present invention is not limited to the following.

[0062] The trust value management method of sensor nodes in a wireless sensor network based on IPv6 tree topology structure includes the following steps:

[0063] S1: The trust value is evaluated periodically between sensor nodes, and the period length is Δt;

[0064] S2: Each sensor node reports the evaluation result of its trust value to neighbor nodes to the data aggregation sink node;

[0065] S3: The data aggregation sink node combines the trust value evaluation results of all neighbor nodes of a certain sensor node and the trust value evaluation result of the data aggregation sink node for the sensor node according to the received trust value evaluation results;

[0066] The trust value evaluation includes at least any one or more of the trust evaluation di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensor node trust value management method of a wireless sensor network of a tree topology structure based on Internet protocol (IP) v 6. The sensor node trust value management method of the wireless sensor network of the tree topology structure based on the IP v 6 comprises the following steps that trust value estimation is conducted between sensor nodes in a periodicity mode, each sensor node reports a trust value estimation result of a neighbour node to a Sink node, all neighbour node trust value estimation results of a certain sensor node and trust value estimation results of the Sink node on the sensor node are comprehensive, and the trust value estimation at least comprises four dimensions including a proximity index, a loyalty index, a power consumption degree and a cooperation degree. The method combines the four dimensions of the proximity index, the loyalty index, the power consumption degree and the cooperation degree to conduct estimation for the node trust value, the trust value estimation result is high in accuracy and reliability, an attacking node can be timely detected and is conducted processing, safety and reliability of data communications of a sensor network are ensured, occupation of a security algorithm on network resources is reduced, and the sensor node trust value management method has good application for a network topology with dynamic changes.

Description

Technical field [0001] The invention relates to a method for managing trust value of sensor nodes in a wireless sensor network based on an IPv6 tree topology structure. Background technique [0002] At present, wireless sensor networks have gradually become a research hotspot in academia and have received extensive attention from the industry. Although due to technical constraints, the large-scale commercial application of wireless sensor networks is not mature enough, but due to its extremely broad application prospects, many research institutions and companies in many countries around the world have invested a lot of energy in related research. jobs. Especially in recent years, with the decline of computing costs and the shrinking of the size of microprocessors, some wireless sensor networks have been put into use. Among them, typical applications include: environmental monitoring and protection, the use of wireless sensors to collect environmental data, used to monitor the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/753H04L29/06H04L12/24H04L29/08H04W24/04H04W84/18
CPCY02B60/50Y02D30/70
Inventor 秦智冯钢秦爽
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products