Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for tolerating malicious nodes in wireless sensor network

A technology of wireless sensor and sensor network, applied in the field of wireless communication and network security, can solve the problems of inability to achieve the purpose of attack, impossible to achieve unlimited energy and resources, not established, etc.

Inactive Publication Date: 2014-03-05
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, malicious nodes in some wireless sensor network models are assumed to have unlimited energy and resources, but this assumption is often not true in practical applications. In the actual wireless sensor deployment scenario, unlimited energy and resources are almost impossible. Realized, this is only applicable to wired network scenarios
Therefore, for malicious nodes, there is also the situation that when the energy is exhausted and cannot work
[0006] The attack methods of malicious nodes in the sensor network include selective forwarding, data tampering, replay and DOS attacks, etc. If malicious nodes want to carry out the above attacks, when there is data packet transmission in the network, the radio frequency circuit must be in working condition, otherwise unable to achieve the purpose of the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for tolerating malicious nodes in wireless sensor network
  • Method for tolerating malicious nodes in wireless sensor network
  • Method for tolerating malicious nodes in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings.

[0029] Such as figure 1 Shown is a flow chart of a malicious node tolerance method in a wireless sensor network in a clustering network, including the following steps:

[0030] (1) The base station sends an attack tolerance command to the entire network, and the command message is transmitted in the network in a flooding manner, and each normal node in the sensor network is ready to enter the attack tolerance state from the normal working state after receiving the command;

[0031] (2) The normal node i (i=1,2,...N) enters the attack tolerance state, and N represents the number of nodes in the wireless sensor network. Node i sets two timers T respectively i1 and T i2 , and a random number of wake-ups W i , where W i Determined according to the number of attacking nodes in the network, when the attacking nodes are uncertain, set W i = 3, W i As the number of atta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for tolerating malicious nodes in a wireless sensor network. According to the method for tolerating the malicious nodes in the wireless sensor network, a traditional safety protection method based on an encryption model, an authentication model and a trust model is changed, and an active protection method which is achieved in a mode of actively destroying the malicious nodes is adopted to achieve the purpose of attack tolerance. The energy of the malicious nodes is consumed by transmitting nonsignificant data in the network, in an attack tolerance state, normal nodes generate energy consumption only when data are sent, the malicious nodes are in a radio frequency working state all the time, and small energy consumption of all the normal nodes is exchanged for the large energy consumption of the malicious nodes so that the malicious node can not work. By the adoption of the method for tolerating the malicious nodes in the wireless sensor network, the malicious nodes are effectively prevented on the premise that the normal data communication of the wireless sensor network is guaranteed, and a new idea is provided for the safety communication of the wireless sensor network.

Description

technical field [0001] The invention relates to a malicious node attack tolerance method in a wireless sensor network, belonging to the fields of wireless communication and network security. Background technique [0002] In recent years, with the development and integration of technologies such as sensors, computers, wireless communications, and micro-electromechanical systems, wireless sensor networks (WSN: wireless sensor networks) have emerged. People can finally monitor the external environment in real time and realize large-scale, automated information. collection. WSN has broad application prospects in military and civilian fields such as military reconnaissance, environmental monitoring, medical monitoring, space exploration, urban traffic management, and warehouse management. [0003] A wireless sensor network is composed of a large number of sensor nodes with limited battery energy, computing power, storage capacity, and communication capabilities. If the network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W84/18H04W12/122
Inventor 姜禹黄杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products