Node collaboration based Sybil attack detection method

An attack detection and node technology, applied in the cross technology application of information security, the field of wireless sensor network, can solve the problem of not considering the node transmission power, Sybil node missed detection and false detection, etc., to extend the network life cycle and reduce false detection. The effect of missing detection and improving detection efficiency

Active Publication Date: 2014-10-29
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is: the present invention provides a Sybil attack detection method based on node cooperation, which solves the real environmental conditions that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node collaboration based Sybil attack detection method
  • Node collaboration based Sybil attack detection method
  • Node collaboration based Sybil attack detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

[0041] 1. Analysis of RSSI secondary difference in power controllable WSN

[0042] Suppose S is a malicious node, S i and S p is two Sybil nodes forged by it, and their respective neighbor monitoring node sets are respectively and o j and O k is S i and S p The public monitoring node of O j , Sybil attack such as figure 1 shown. When the malicious node S uses S i When the identity broadcasts the Hello neighbor message to the neighbor node, based on the large-scale transmission model O j The calculated RSSI value is:

[0043] P ij [ dBm ] = P i ( d 0 ) [ dBm ] - 10 γ log ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a node collaboration based Sybil attack detection method in a power controllable WSN (Wireless Sensor Network) and belongs to the network security technical field. The node collaboration based Sybil attack detection method comprises facing the real network environment which comprises the path loss and shadow fading and is a large scale propagation model to analyze a secondary difference value of an RSSI (Received Signal Strength Indicator) and providing a Sybil node identification algorithm according to the characteristic that the secondary difference value of the RSSI is not affected by changes of the node transmission power, wherein the Sybil node identification algorithm distinguishes whether two nodes are two Sybil identities which are forged through a malicious node or not through the mutual collaboration of public monitoring nodes of the two ordinary nodes. According to the node collaboration based Sybil attack detection method, the characteristics of the secondary difference value of the RSSI and the monitoring node cooperation scheme are combined and accordingly the detection efficiency of Sybil attacks in the power controllable WSN is improved and the network life cycle can be extended.

Description

technical field [0001] The invention belongs to the cross-technical application fields of wireless sensor networks and information security, and in particular relates to a Sybil attack detection method based on node cooperation. Background technique [0002] Sybil attack refers to an attack method in which an attacker makes a legitimate node a malicious node by capturing sensor nodes or listening to a large number of communication messages, and then appears in front of other nodes in the network with multiple false identities. Among them, the node identity forged by malicious nodes is called Sybil node. Early Sybil attacks appeared in P2P networks. Due to the lack of trusted authority centers in distributed networks, a legitimate physical node is easily captured by Sybil attacks, and the reputation system in P2P networks is destroyed by forging peer node identities. , and similar problems also exist in wireless sensor networks. Sybil attack is one of the most important int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12
CPCY02D30/70
Inventor 程春玲钱雅秋
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products