Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting Sybil attack in underwater wireless sensor networks

An underwater sensor and intrusion detection technology, applied in network topology, wireless communication, electrical components, etc., can solve the problems of high energy consumption, large storage resources and energy overhead, and inability to use energy to supplement energy, etc., to ensure safety and good performance. Expansion effect

Active Publication Date: 2013-09-11
HOHAI UNIV CHANGZHOU
View PDF13 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Limitation of node hardware resources
The hardware conditions of the sensor node itself are limited, such as storage space, computing power, etc. At the same time, the sensor node is deployed underwater and cannot use existing energy sources to supplement energy, and underwater acoustic communication has higher transmission power than electromagnetic wave communication, and consumes more energy;
[0005] (2) Safety issues of underwater nodes
This method can effectively detect witch nodes, but the disadvantage is that the energy overhead is large and the network life is shortened
[0015] (1) Inter-node key technology, distributed hash table identity registration technology, node location confirmation technology, trusted code certification technology, etc., have a large cost in terms of storage resources and energy, and low timeliness is not conducive to resource constraints sensor network;
[0016] (2) Supporting hardware conditions such as omnidirectional antennas and signal receivers with high clock accuracy are required, which greatly increases the cost of the network and the complexity of implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting Sybil attack in underwater wireless sensor networks
  • Method for detecting Sybil attack in underwater wireless sensor networks
  • Method for detecting Sybil attack in underwater wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] specific implementation

[0067] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, the specific implementation, structure, features and effects of the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments. back.

[0068] The essence of sybil attack is that sybil nodes act as legitimate nodes by forging false identities or stealing the identities of legitimate nodes, and put these nodes into the network, receive information from source nodes or intermediate nodes, and tamper with information such as coordinates, hops, and routes at will Or discard the data, so that the information cannot be safely and correctly transmitted to the destination node, which seriously affects the security positioning, geographic location routing, multi-path and topology structure of the underwater sensor network.

[0069] According to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting Sybil attack in underwater wireless sensor networks. The method includes three steps: by the aid of anchor nodes, (1) identifying suspicious nodes: identifying the suspicious nodes in the networks according to received information packets; (2) determining Sybil nodes: calculating state evaluation values of the suspicious nodes and determining the Sybil nodes by means of comparing with position information of the suspicious nodes; (3) separating the Sybil nodes: reporting the Sybil nodes to base stations which delete the Sybil nodes from the networks. The method has the advantages that hostile Sybil attack can be effectively detected, safety of the networks can be guaranteed, and hardware conditions for the nodes neither are limited strictly nor limited by specific information or specific nodes and have good expansibility.

Description

technical field [0001] The invention belongs to the field of underwater sensor network communication security, in particular to a method for detecting witch node intrusion in an underwater sensor network. Background technique [0002] Underwater Wireless Sensor Networks (UWSNs for short) is proposed for applications in underwater environments. UWSNs are composed of a large number of underwater sensor nodes and form a distributed self-organizing wireless communication network through underwater acoustic wireless communication. The underwater sensor nodes cooperatively monitor and collect data information, and after fusion processing, transmit it to the surface base station, and then transmit it to the user through radio frequency communication or wired communication. Due to the characteristics of distributed and low cost, UWSNs can provide better technical support and information platforms for the promotion of marine environment management, resource protection, disaster moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W84/18H04W12/121
Inventor 韩光洁李勋钱爱华朱川江金芳张晨语江旭
Owner HOHAI UNIV CHANGZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products