Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method of Enhancing Source Node Security in Wireless Sensor Networks

A wireless sensor and source node technology, applied in the field of communication, can solve problems such as easy to be distinguished, poor source node security protection, reduce false news, etc., and achieve the effect of enhancing security

Inactive Publication Date: 2019-01-15
DALIAN MARITIME UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the false message is sent near the shortest path from the source node to the base station, so that the attacker hovers near the shortest path, and it is easy to trace the source node through the shortest path, which has poor security protection for the source node; secondly, the real , False messages are easily distinguished due to unencrypted or inconsistent lengths, further reducing the probability of false messages inducing attackers to stay away from the source node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Enhancing Source Node Security in Wireless Sensor Networks
  • A Method of Enhancing Source Node Security in Wireless Sensor Networks
  • A Method of Enhancing Source Node Security in Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] In the embodiment of the present invention, when the system is initialized, each node is pre-deployed to a designated location, and each node is pre-loaded with a location table T, which stores location information of the entire network nodes and base stations. Wherein, T includes N entries, each entry corresponds to the location information of a node, and each entry includes two fields: node number and node location. For example, an entry is , which represents a node numbered M, whose position is l.

[0048] In the embodiment of the present invention, when the system is initialized, each node is preloaded with two preset values ​​k and d. Among them, k represents the sum of the number of selected pseudo-source nodes and proxy source nodes. d is a threshold, which is used to select a pseudo-source node and a proxy source node, so that the distance between the pseudo-source node and the source node and the distance between the proxy source node and the source node are gre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for enhancing the security of a source node in a wireless sensor network. The method includes the following steps: S101: determining the node closest to the monitoring target as the source node; Select the corresponding proxy source node and pseudo-source node; S103: the source node notifies the pseudo-source node to send false messages; S104: the source node periodically sends event messages to the base station; the pseudo-source node Periodically send fake messages to the base station; S105: If the monitored target leaves the monitoring range of the source node, execute step S106; otherwise, execute step S104; S106: stop the source node and the false source node respectively The event message and the fake message are sent. This method can increase the probability that an attacker is induced to a false source node by false news, makes the attacker far away from the source node, and enhances the security of the source node.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for enhancing the security of source nodes in a wireless sensor network. Background technique [0002] The line sensor network is composed of a large number of sensor nodes and a base station deployed in the monitored area. The nodes form a multi-hop, self-organizing network through wireless communication. Its purpose is to cooperatively perceive, collect and process information in the network coverage area The information of the perceived object is sent to the base station, and finally the base station sends it to the user. [0003] In sensor networks, due to the impact of nodes on computing power, node power supply capabilities, etc., traditional security mechanisms cannot be applied to its low-power, low-computing working methods. Most of the sensor network nodes are deployed in unattended areas, making the sensor network vulnerable to various attacks. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/00H04W84/18H04W12/122
CPCH04W12/00H04W12/12H04W24/00H04W84/18
Inventor 陈娟林正奎陈余庆苏统华
Owner DALIAN MARITIME UNIVERSITY