Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trust Value Management Method of Sensor Nodes in Wireless Sensor Networks Based on Tree Topology Structure of IPv6

A sensor node, wireless sensor technology, applied in wireless communication, network topology, data exchange network, etc., can solve problems such as energy consumption, low accuracy of evaluation results, and single evaluation dimension.

Inactive Publication Date: 2016-08-03
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 4. Sybil attack: The attack node uses a variety of identity information to deceive other neighbor nodes, so that other nodes preferentially choose this node for routing, and then carry out other attack behaviors;
[0015] 6. Energy exhaustion attack: Since new nodes need to be dynamically added to the wireless sensor network, and after the new node joins the network, it will interact with its neighbor nodes through the "HELLO" message. The attack node uses this process to continuously send a large number of "HELLO" information, neighbor nodes need to respond to a large number of "HELLO" information, the energy is continuously consumed, and finally the battery is quickly exhausted
However, in the process of evaluating the trust value of sensor nodes, the evaluation dimension used is relatively single, which leads to low accuracy and poor reliability of the evaluation results of trust value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust Value Management Method of Sensor Nodes in Wireless Sensor Networks Based on Tree Topology Structure of IPv6
  • Trust Value Management Method of Sensor Nodes in Wireless Sensor Networks Based on Tree Topology Structure of IPv6
  • Trust Value Management Method of Sensor Nodes in Wireless Sensor Networks Based on Tree Topology Structure of IPv6

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0062] The trust value management method of sensor nodes in the wireless sensor network based on the tree topology of IPv6, it comprises the following steps:

[0063] S1: The trust value evaluation is performed periodically between the sensor nodes, and the cycle length is Δt;

[0064] S2: Each sensor node reports the evaluation result of its trust value to the neighbor node to the data aggregation Sink node;

[0065] S3: The data aggregation Sink node synthesizes the trust value evaluation results of all neighbor nodes for a certain sensor node and the trust value evaluation results of the data aggregation Sink node for the sensor node according to the received trust value evaluation results;

[0066] The trust value evaluation includes a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trust value management method of sensor nodes in a wireless sensor network based on an IPv6 tree topology, comprising the following steps: periodic trust value evaluation is performed between sensor nodes; each sensor node reports its For the evaluation result of the trust value of the neighbor node; the evaluation result of the trust value of all neighbor nodes for a certain sensor node and the evaluation result of the trust value of the Sink node for the sensor node; the evaluation of the trust value includes at least intimacy, loyalty, power consumption and The degree of cooperation in four dimensions. The invention combines the four dimensions of intimacy, loyalty, power consumption and cooperation to evaluate the node trust value, and the trust value evaluation result has high accuracy and reliability; the attack node is detected in time and processed to ensure the sensor network The security and reliability of data communication; reduce the occupation of network resources by security algorithms, and have a good adaptability to dynamically changing network topologies.

Description

technical field [0001] The invention relates to a method for managing trust value of sensor nodes in a wireless sensor network based on IPv6 tree topology. Background technique [0002] At present, wireless sensor networks have gradually become a research hotspot in the academic circles, and have received extensive attention from the industry. Although due to technical constraints, the large-scale commercial application of wireless sensor networks is not mature enough, but due to its extremely broad application prospects, many research institutions and companies in many countries around the world have invested a lot of energy in related research. Work. Especially in recent years, with the decrease of computing cost and the shrinkage of microprocessor size, some wireless sensor networks have been put into use. Among them, typical applications include: environmental monitoring and protection, using wireless sensors to collect environmental data, monitoring pollutant emission...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/753H04L29/06H04L12/24H04L29/08H04W24/04H04W84/18
CPCY02D30/70
Inventor 秦智冯钢秦爽
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products