Novel method for detecting Sybil attack in Internet of Things

A new method, the technology of the Internet of Things, applied in the direction of electrical components, sustainable buildings, transmission systems, etc., to achieve the effect of reducing energy consumption, reducing energy consumption, and improving safety performance

Inactive Publication Date: 2014-04-02
CHINA MCC17 GRP
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Simultaneous attack: The attacker may try to use all the identities it owns to participate in network communication at the same time. However, for a specific physical device, at a certain moment, it can only have one identity, and the attacker can use different identities by recycling. , and form the illusion of using multiple IDs at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel method for detecting Sybil attack in Internet of Things
  • Novel method for detecting Sybil attack in Internet of Things
  • Novel method for detecting Sybil attack in Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] According to the signal strength of the receiving node to calculate the position of the node, it can be judged whether a Sybil attack has occurred in the Internet of Things. Assume the following network environment: a two-dimensional flat cluster head network; all nodes have the same initial energy, computing power, and communication capabilities; once the node is deployed, its position is fixed; the network is safe before the node initialization is completed . The following describes the detection method of Sybil attack.

[0028] In the Jakes channel space of the Internet of Things, the signal strength received by the receiving antenna is the transmit-receive distance d function, the received signal strength of the node is:

[0029] (1)

[0030] In the formula, is the transmitted signal strength ( ), assuming that the transmit and receive antenna gains are both 1, is the channel gain following the Rayleigh distribution, H is the impulse r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a novel method for detecting a Sybil attack in the Internet of Things. According to the method, the Sybil attack in the Internet of Things is judged comprehensively according to the energy of a node and the intensity value of a received signal by adopting a method of carrying detection parameters at the tail part of a data packet in a protocol implementation stage, and the detection precision is improved by the mutual supervision of a cluster head node and a member node. A practical and feasible method for detecting the Sybil attack is provided for networks, particularly the Internet of Things, the safety of the Internet of Things can be improved effectively, such as routing, resource allocation, abnormal behavior detection. The novel method has the advantages of easiness in implementation, high detection efficiency, high anti-attack capacity and the like.

Description

technical field [0001] The invention relates to a new method for detecting Sybil attacks on information networks, especially routing protocols of the Internet of Things, and belongs to the technical field of Internet of Things security applications. Background technique [0002] The Internet of Things is a peer-to-peer network that can be temporarily formed by mobile nodes without prior network infrastructure construction. It is a self-organizing and self-managing network. Each node in the network can join and exit at any time, the topology changes frequently, and because the communication coverage of each node is small, the communication between nodes often needs to go through multi-hop forwarding of other nodes. These characteristics make the Internet of Things not only have various threats such as information leakage, information tampering, replay attacks, and denial of service faced by general wireless networks, but also face nodes that are easily manipulated by attacker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCY02B60/50
Inventor 王江涛
Owner CHINA MCC17 GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products