Wireless sensor network clone node identifying method based on physical channel information and credibility

A wireless sensor and physical channel technology, applied in the security field of wireless sensor networks, can solve the problems of reducing security, achieve the effect of improving accuracy, reducing system complexity, and reducing false alarm rate

Active Publication Date: 2016-08-17
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The deterministic detection communication overhead is small, but at the same time, because the attacker knows the pre-set witness node, the clone node can be protected by attacking the witness node, thus reducing the security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network clone node identifying method based on physical channel information and credibility
  • Wireless sensor network clone node identifying method based on physical channel information and credibility
  • Wireless sensor network clone node identifying method based on physical channel information and credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings, but the protection scope of the present invention is not limited to the following.

[0031] Such as figure 1 As shown, the wireless sensor network clone node identification method based on physical channel information and trust degree includes the following steps:

[0032] S1: Node i (i=1, 2, 3,...) and node j (j≠i, j=1, 2, 3,...) adopt any existing upper-layer authentication method, such as an authentication method based on PKI, Perform initial authentication. If the authentication is passed, then communicate. If the authentication fails, node i abandons node j and informs the entire network;

[0033] S2: Node i receives the first information packet sent by node j, the format of the information packet is {ID, pilot, T, message}, where ID is the identity ID of node j, pilot is the pilot, and T is the timestamp , Message is data information, n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network clone node identifying method based on physical channel information and credibility. The wireless sensor network clone node identifying method is used for solving the single-point invalidation problem of a clone node intensive type detecting scheme of a wireless sensor network; a witness node in a distribution type detecting scheme is not needed; the credibility is established by utilizing the physical channel information, and certain tolerance is achieved; while the clone node identifying complexity is reduced, a false alarm rate is further reduced, so that the clone node identifying precision is improved.

Description

Technical field [0001] The invention relates to the security technology of a wireless sensor network, in particular to a wireless sensor network clone node identification method based on physical channel information and trust. Background technique [0002] A wireless sensor network is a multi-hop network composed of a large number of sensor nodes with wireless communication modules, which are realized by forwarding data to each other. The network has the characteristics of self-organization and strong survivability. It has been used in many fields of military and civilian use. It was applied. Because wireless sensor nodes perform wireless communication in an open environment, and have the characteristics of limited energy, limited computing power, and low storage capacity, they are vulnerable to malicious attacks. [0003] There are malicious node attacks such as clone node attacks in wireless sensor networks, leading to DoS attacks or other serious security problems. Parno et al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W16/18H04W24/00H04W84/18
CPCH04W16/18H04W24/00H04W84/18
Inventor 潘绯文红张金玲章露萍廖润发
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products