A joint intrusion detection method for wsns based on dangerous multi-agent

An intrusion detection, multi-agent technology, applied in advanced technology, security devices, electrical components, etc., can solve the problems of increasing network communication load, long training time, and large training overhead, saving detection energy consumption, enhancing detection efficiency, The effect of extending the operating life

Active Publication Date: 2017-04-12
SOUTHEAST UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the previous WSNs intrusion detection method based on the dangerous multi-agent system, the nodes receiving the dangerous signal in the dangerous domain need to collect network-related antigen information, and the nodes that perceive and send out the dangerous signal need to centralize the extracted antigen information. Intrusion detection uses a self / non-self detection method that requires a large number of sample training. This method needs to obtain a large number of original antigens, and the training time is long and the training cost is large.
At the same time, the transmission of a large amount of antigen information will increase the communication load of the network and the communication consumption of nodes.
The node in the network that perceives danger corresponds to the "suffering node" in the biological immune system. It is a node that is on the verge of extinction and must be damaged in terms of node resources. If the node continues to perform expensive detection operations, obviously is unreasonable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A joint intrusion detection method for wsns based on dangerous multi-agent
  • A joint intrusion detection method for wsns based on dangerous multi-agent
  • A joint intrusion detection method for wsns based on dangerous multi-agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] The embodiment is named DT-MASC. In order to verify the functional characteristics of DT-MASC, it will be simulated and compared with the master-slave multi-agent detection scheme DT_MAS based on risk theory and the typical multi-agent detection scheme MAIDS. The comparison performance includes the detection rate and detection of energy consumption, the simulation platform is OMNET++, and the main parameter settings of the simulation scene are shown in Table 2.

[0078] Table 2 Simulation experiment parameters

[0079]

[0080]

[0081] According to the simulation parameters in Table 2, the nodes are randomly deployed in the network, and the location of malicious nodes can be randomly selected according to the simulation needs. By adjusting the number of malicious nodes to adjust the intensity of network malicious attacks, the detection performance of each intrusion detection scheme under different attack intensities is studied, and each data is the average value ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a WSNs united intrusion detection method based on multiple danger agents. One IDS agent is implanted on each node in the WSNs, a peer-peer relation is built between the IDS agents, the nodes perceiving the danger are set to be the main IDS agents, other nodes for detection in the danger areas are set to be the local IDS agents, and each IDS agent comprises a plurality of function agents. The local IDS agents are responsible for collecting local data and detecting abnormal data, and the main IDS agents are responsible for processing a detection result in a concentrated mode and finally determining the malicious nodes. The method fully considers the characteristics of the WSNs, the detection efficiency is improved, the detection energy consumption of the whole network is saved, and the service life of the network is prolonged.

Description

technical field [0001] The invention relates to the technical field of WSNs security, in particular to a method for combined intrusion detection of WSNs based on dangerous multi-agents. Background technique [0002] WSNs intrusion detection technology is mainly researched from the two aspects of detection system and detection algorithm, trying to reduce energy consumption while enhancing the effectiveness and security of intrusion detection by designing an intrusion detection system or intrusion detection algorithm suitable for WSNs characteristics. According to the relationship between detection nodes, WSNs intrusion detection system is mainly divided into three types: distributed, peer-to-peer collaborative and hierarchical. Among them, a single node in the distributed system is equipped with a complete intrusion detection system, and each node does not cooperate with each other, and performs intrusion behavior detection independently, while the peer-to-peer collaborative ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04L29/06
CPCY02D30/70
Inventor 黄杰张莎王恩飞陈磊孙熊陈叶荣张丽
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products