Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wireless network attack detection method based on mathematical morphology

A mathematical morphology, wireless network technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of high layout cost and computational overhead, high key energy consumption, security restrictions, etc., to reduce the layout cost and Calculation overhead, simple calculation method, and the effect of reducing detection cost

Inactive Publication Date: 2017-05-10
GUANGZHOU INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the encryption method, the distribution of the key often consumes a lot of energy, the scalability and adaptability are low, and the required layout cost and calculation overhead are too large. However, with the authentication method, the computing power of the nodes is limited, and the shared key is relatively fragile.
Generally speaking, using encryption or authentication methods in the current technology to ensure the security of data transmission has high computational complexity and energy consumption, and high system cost, and the above two methods cannot realize the detection of intrusion attacks. When a "spy" node appears in a wireless sensor network, the attack of this node cannot be monitored in real time, so its security is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless network attack detection method based on mathematical morphology
  • A wireless network attack detection method based on mathematical morphology
  • A wireless network attack detection method based on mathematical morphology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to facilitate the following description, first give the following noun explanation:

[0029] LQI: Link Quality Indicator, stands for link quality indicator, used to indicate the level of communication connection strength, the unit is dBm. LQI can be directly read in the header file of each data packet received. It is a parameter sent by default when sending data. Its data is easy to collect and extract, and it is an integer between 0-255.

[0030] Reference figure 1 The present invention provides a wireless network attack detection method based on mathematical morphology, including:

[0031] S1. Use a preset sampling rate to separately collect link quality indicator parameters generated by each node of the wireless network when transmitting data;

[0032] S2. The obtained link quality indicator parameters of each node are drawn in sequence on a two-dimensional coordinate system to form a step curve diagram;

[0033] S3. Use the erosion calculation in mathematical morpho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless network attack detection method based on mathematical morphology. The link quality indicator parameters of the nodes are sequentially drawn on the two-dimensional coordinate system to form a ladder curve; the erosion operation in mathematical morphology is used to gradually erode the ladder curve of each node, and the particle fraction of each erosion is calculated at the same time; Calculate the cumulative distribution function of all particle fractions of each node and draw the obtained cumulative distribution function on a two-dimensional coordinate system to obtain a particle distribution step curve; according to the obtained particle distribution step curve of each node, it is judged in real time whether the node is affected by attack. The invention can monitor the attack on the wireless network in real time, has high security, and has a simple calculation method, reduces the detection cost, and can be widely used in the security monitoring field of the wireless network.

Description

Technical field [0001] The invention relates to the field of network attack detection, in particular to a wireless network attack detection method based on mathematical morphology. Background technique [0002] At present, the method usually adopted to solve the security problem of wireless sensor network is encryption or authentication. Encryption can ensure that even if the attacker obtains the transmitted ciphertext message, he cannot crack the plaintext message, while authentication can ensure that the message comes from a legitimate node and verify whether the message has been modified. However, with encryption methods, key distribution often consumes more energy, has low scalability and adaptability, and requires too much deployment cost and computational overhead. However, with authentication methods, nodes have limited computing power and shared keys are relatively fragile. . In general, the encryption or authentication methods in the current technology are used to ensu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W12/121
Inventor 王砚文吴晓鸰陈海南曾德文王慰
Owner GUANGZHOU INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products