Wireless sensor network intrusion tolerance method and system based on tree topology

A wireless sensor network and tree topology technology, applied in wireless communication, network topology, electrical components, etc., can solve the problems of high false alarm rate, false alarm rate time delay, inability to prevent intrusion damage, etc. in the intrusion detection system, and achieve The effect of prolonging the lifetime and reducing network resources

Active Publication Date: 2014-03-26
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the intrusion detection system has problems such as high false alarm rate, false negative rate, and time delay between attack and detec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network intrusion tolerance method and system based on tree topology
  • Wireless sensor network intrusion tolerance method and system based on tree topology
  • Wireless sensor network intrusion tolerance method and system based on tree topology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in detail below with reference to the drawings and embodiments.

[0021] like figure 1 As shown, the intrusion tolerance system involved in the present invention includes: a full channel analyzer, an intrusion detection subsystem, an attack signature matching library, a security management center, a gateway, a backbone node, a redundant node and a member node.

[0022] The full channel analyzer monitors the data traffic and energy information of the entire wireless sensor network, and sends the monitored information to the intrusion detection subsystem;

[0023] Based on the information from the full-channel analyzer, the intrusion detection subsystem conducts real-time data analysis, extracts data features, judges whether it is attacked by intrusion, and reports the judgment result to the security management center;

[0024] The security management center is responsible for allocating the resources required for the entire network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a wireless sensor network tolerance system based on tree topology. The system comprises an intrusion detecting subsystem, a safety management center and an attacking feature matching bank. The intrusion detecting subsystem can judge a network abnormal situation through node flow and energy analysis, and by arranging threshold value warning, results are uploaded to the safety management center at the same time. For the wireless sensor network abnormal situation, attack matching can be carried out through the attacking feature matching bank, meanwhile, corresponding processing is carried out according to attack types, and network lifetime is prolonged. For attacked backbone nodes in a network, a redundant node rousing strategy is used, redundant nodes are roused to take over current attacked nodes, and network normal operation is kept. For attacked member nodes in the network, an isolation burying strategy is used, node ID is recorded, and using by attacking nodes is avoided.

Description

technical field [0001] The invention relates to the technical field of wireless sensor networks, in particular to a wireless sensor network intrusion tolerance technology. Background technique [0002] The wireless sensor network is composed of a large number of cheap miniature sensor nodes, and is deployed in a certain detection area, forming a self-organized multi-hop network through wireless communication; it can complete cooperative perception, collection and processing of network coverage Information about objects in the area and sent to observers etc. However, due to the openness of wireless sensor networks, they are generally deployed in an open environment without monitoring, which makes them face various threats and attacks, and its security issues are particularly important. [0003] In the security technology of wireless sensor networks, security technologies such as network access authentication, key management, access control, and intrusion detection have been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W84/18H04W12/122
Inventor 魏旻王平常亚王维柳乐周勇洪承镐
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products