Method for selecting IDA (intrusion detection agent) start strategies of wireless sensor network

A wireless sensor network, intrusion detection technology, applied in wireless communication, advanced technology, security devices, etc., can solve problems such as multiple computing and energy resources, shortening the life cycle of wireless sensor networks, etc.

Inactive Publication Date: 2016-02-03
SHAOXING UNIVERSITY
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, compared with the existing network, the sensor nodes have great shortcomings in terms of computing power, storage capacity, and communication bandwidth, and running the intrusion detection agent itself needs to consume more computi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for selecting IDA (intrusion detection agent) start strategies of wireless sensor network
  • Method for selecting IDA (intrusion detection agent) start strategies of wireless sensor network
  • Method for selecting IDA (intrusion detection agent) start strategies of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further elaborated below through specific embodiments. Examples will help to better understand the present invention, but the present invention is not limited only to the following examples.

[0037] Such as figure 1 As shown, the present invention adopts a cluster structure to form an interconnected hierarchical wireless sensor network, which includes common nodes and cluster head nodes. All cluster-head nodes form high-level nodes in the hierarchy, while all common nodes form low-level nodes. In such a hierarchical structure, ordinary nodes gather data through their cluster head nodes and transmit data to the base station through other cluster heads. At the same time, because the intrusion detection agent has been pre-configured on the cluster head node, when the intrusion detection agent residing on the cluster head node is started, it will have the function of intrusion detection.

[0038] exist figure 1 In , legal sensor nodes inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for selecting IDA (intrusion detection agent) start strategies of a wireless sensor network. Aiming at the wireless sensor network adopting a cluster structure and in view of the detection rate and false alarm rate of IDA, data transmission reliability of the wireless sensor network, the success attack rate of attacker and other factors, the method calculates the "attack" probability of a malicious node and the "start" probability of the IDA by virtue of a game model between a "signaling game" establishing node and the IDA so that the benefit of the IDA in the strategy selection between " start" and " not start" is maximized, so as to provide the optimal strategy for determining when to start the IDA. The method not only ensures the safe wireless sensor network, but also enables the IDA not to be in a "start" state all the time, thereby saving energy comsumption used for running the IDA and prolonging the lifetime of the wireless sensor network.

Description

technical field [0001] The invention relates to the field of intrusion detection in network security technology, in particular to a method for selecting a starting strategy of a wireless sensor network intrusion detection agent. Background technique [0002] As a task-oriented network, wireless sensor network not only needs to transmit data, but also needs to collect and integrate data, and coordinate tasks to be controlled. How to ensure the confidentiality of task execution, the reliability of data generation, the efficiency of data fusion, and the security of data transmission has become a comprehensive consideration of wireless sensor network security issues. It can be said that security issues are a very key factor restricting the development of wireless sensor networks. [0003] At present, the mechanisms to ensure network security mainly include two major mechanisms: prevention and detection. The prevention mechanism mainly provides data confidentiality, integrity a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W12/121
CPCH04W12/12Y02D30/70
Inventor 沈士根黄龙军范恩胡珂立
Owner SHAOXING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products