A Malicious Node Tolerance Method in Wireless Sensor Networks

A wireless sensor and sensor network technology, applied in the field of wireless communication and network security, can solve problems such as failure to establish, failure to achieve the purpose of attack, failure to work, etc.

Inactive Publication Date: 2016-08-03
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, malicious nodes in some wireless sensor network models are assumed to have unlimited energy and resources, but this assumption is often not true in practical applications. In the actual wireless sensor deployment scenario, unlimited energy and resources are almost impossible. Realized, this is only applicable to wired network scenarios
Therefore, for malicious nodes, there is also the situation that when the energy is exhausted and cannot work
[0006] The attack methods of malicious nodes in the sensor network include selective forwarding, data tampering, replay and DOS attacks, etc. If malicious nodes want to carry out the above attacks, when there is data packet transmission in the network, the radio frequency circuit must be in working condition, otherwise unable to achieve the purpose of the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Malicious Node Tolerance Method in Wireless Sensor Networks
  • A Malicious Node Tolerance Method in Wireless Sensor Networks
  • A Malicious Node Tolerance Method in Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings.

[0029] Such as figure 1 Shown is a flow chart of a malicious node tolerance method in a wireless sensor network in a clustering network, including the following steps:

[0030] (1) The base station sends an attack tolerance command to the entire network, and the command message is transmitted in the network in a flooding manner, and each normal node in the sensor network is ready to enter the attack tolerance state from the normal working state after receiving the command;

[0031] (2) The normal node i (i=1,2,...N) enters the attack tolerance state, and N represents the number of nodes in the wireless sensor network. Node i sets two timers T respectively i1 and T i2 , and a random number of wake-ups W i , where W i Determined according to the number of attacking nodes in the network, when the attacking nodes are uncertain, set W i = 3, W i As the number of atta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious node tolerance method in a wireless sensor network, which changes the traditional security protection method based on encryption, authentication and trust model, and actively protects by actively destroying malicious nodes to achieve the purpose of attack tolerance. The energy of malicious nodes is consumed by transmitting meaningless data in the network. In the state of attack tolerance, normal nodes only generate energy consumption when sending data, while malicious nodes are always in the radio frequency working state. With the small energy consumption of all normal nodes In exchange for the large energy consumption of malicious nodes so that they cannot work. On the premise of ensuring the normal data communication of the sensor network, the effective protection of malicious nodes is completed, which provides a new idea for the secure communication of the wireless sensor network.

Description

technical field [0001] The invention relates to a malicious node attack tolerance method in a wireless sensor network, belonging to the fields of wireless communication and network security. Background technique [0002] In recent years, with the development and integration of sensor, computer, wireless communication, micro-electromechanical and other technologies, wireless sensor networks (WSN: wireless sensor networks) have emerged. People can finally monitor the external environment in real time and realize large-scale and automatic information collection. WSN has broad application prospects in military and civilian fields such as military reconnaissance, environmental monitoring, medical monitoring, space exploration, urban traffic management, and warehouse management. [0003] A wireless sensor network is composed of a large number of sensor nodes with limited battery energy, computing power, storage capacity, and communication capabilities. If the network nodes are un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W84/18H04W12/122
Inventor 姜禹黄杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products