Unlock instant, AI-driven research and patent intelligence for your innovation.

A clone detection method with low storage requirements in wireless sensor networks

A wireless sensor and detection method technology, applied in wireless communication, transmission system, advanced technology, etc., can solve problems such as difficulties, central detection failure, detection failure, etc., and achieve the effect of reducing storage capacity and network life

Inactive Publication Date: 2019-05-28
CENT SOUTH UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The cloning problem is a kind of problem: the attacker obtains all the information of these nodes by breaking through some nodes in the network, and then clones these information into multiple copies and copies them to multiple sensor nodes.
[0004] From the above, we can see that the most critical issues of clone detection are: (1) How to select the witness node
(3) The clone detection route should not be able to be calculated by the attacker in advance, otherwise, the attacker can intercept the detection route in advance and make the detection invalid
But the deficiency of the central protocol research is: if the adversary captures the base station information or interferes with the communication of the base station, then the central detection fails
In this way, what the node obtains after passing the mapping function is only the area where the witness node is located, but the specific witness nodes are not known, so it is relatively difficult for an attacker to break through all the witness nodes in this area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A clone detection method with low storage requirements in wireless sensor networks
  • A clone detection method with low storage requirements in wireless sensor networks
  • A clone detection method with low storage requirements in wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings and examples.

[0035] In this example, if figure 1 As shown, the embodiment of the present invention is a clone detection method with low storage requirements in a wireless sensor network. The method of the present invention includes two parts: (1) the witness information of the node is stored in the nodes on multiple discrete arc-shaped paths along the circumferential direction On the above, the angle formed between any arc segment and the center of the circle should not repeat as much as possible, and the position of the arc path from the center of the network is random. This ensures that the attacker cannot determine the location of the witness node, thereby ensuring that the witness node is not attacked and has strong security. (2) When a node performs clone detection, multiple detection routes are initiated along the radial direction of the network, and the distanc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a clone detection method with low storage requirements in a wireless sensor network, which consists of two parts: (1) Creation of witness nodes: the witness information of each node is stored in multiple discrete circular arcs along the circumferential direction On the node of the path; the angle between any arc segment and the center of the circle should not be repeated as much as possible, and the position of the arc path from the center of the network is random. In this way, the attacker cannot determine the location of the witness node and is difficult to launch an attack, which has strong security. (2) When a node performs clone detection, multiple detection routes are initiated along the radial direction of the network, and the distance between any two detection routes is less than the length of the witness node arc, so as to ensure that the detection route will definitely meet the witness node, thus get tested. The innovation of the method of the present invention lies in that the circular arc paths and detection routes of the witness nodes are evenly distributed in the whole network so as to fully utilize the storage space and remaining energy of the regional nodes of the remote base station.

Description

technical field [0001] The invention belongs to the field of wireless network data security, and in particular relates to a clone detection method with low storage requirement, how to detect whether nodes in the network are cloned. Background technique [0002] A wireless sensor network is a wireless network composed of a large number of sensor nodes that communicate with each other through multi-hop wireless links and in a self-organizing and multi-hop manner. It can be widely used in industrial monitoring, agriculture, civil, environmental monitoring, battlefield It is considered to be one of the key basic technologies of the future important Internet of Things network in various special environments and applications such as , marine, and fire. The security of wireless sensor networks is an important research topic. Among them, the cloning problem is an important security problem in wireless sensor networks, and its research is of great significance. [0003] The cloning...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/12H04W40/20H04W12/126
CPCH04L63/1408H04L63/1441H04W12/12H04W40/20Y02D30/70
Inventor 刘安丰淡州阳贺晟刘语欣
Owner CENT SOUTH UNIV