Sybil node recognition method based on physical layer confidence degree

An identification method and a technology of trust degree, applied in wireless communication, safety devices, electrical components, etc., can solve problems such as single point failure, unavailable detection, low communication and storage overhead, etc., to reduce false alarm rate, low overhead, The effect of reducing system overhead

Active Publication Date: 2016-09-21
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The centralized Sybil attack detection scheme based on channel fingerprints concentrates all calculations and storage on the central node (base station), which has t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sybil node recognition method based on physical layer confidence degree
  • Sybil node recognition method based on physical layer confidence degree
  • Sybil node recognition method based on physical layer confidence degree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Describe technical scheme of the present invention in further detail below in conjunction with accompanying drawing: as figure 1 Shown, a kind of Sybil node identification method based on physical layer degree of trust, it comprises the following steps:

[0031] S1. Node i and node j perform upper-level initial authentication. If the authentication passes, they communicate. If the authentication fails, node i abandons node j and notifies the entire network, where the value of i is 0, 1, 2, 3...; , where the value of j is 0, 1, 2, 3..., and j≠i;

[0032] S2. In time slot k, k=1, 2, 3, ... node i receives the first information packet sent by node j, the sequence number is 0, node i calculates and records the physical channel information of the information packet with sequence number 0 and ID 0 ;

[0033] S3. In time slot k, node i receives the information packet with sequence number t sent by node j, t=1, 2, 3,..., node i calculates and records the channel information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Sybil node recognition method based on the physical layer confidence degree. The method includes the steps that a node i and a node j are subjected to upper-layer initial authentication; the node i calculates and records the physical channel information H0<j> and ID0 of an information package; the information package confidence degree St<k>( i, j) is calculated and stored in a confidence degree list; whether the node confidence degree Sk(i, j) of the node j reaches the confidence threshold eta or not, if not, it is judged that the node j is a Sybil node, the node j is abandoned, and the whole network is notified. The Sybil node recognition method aims to achieve the purposes that the problem of single point failure of a centralized detection scheme of Sybil attack of a wireless sensor network is solved, a witness node in a distributed detection scheme is not needed, the physical channel information serves as an identity index, the confidence degree is established, a system can have certain tolerance, Sybil node recognition complexity is lowered while the false alarm rate is also lowered, and thus precision of Sybil node recognition is improved.

Description

technical field [0001] The invention relates to malicious node identification of a wireless sensor network, in particular to a Sybil node identification method based on physical layer trust degree. Background technique [0002] A wireless sensor network is a multi-hop network realized by a large number of sensor nodes with wireless communication modules by forwarding data to each other. applied. There are two types of identities in a Sybil attack: one is identity forgery and the other is identity theft. After obtaining the ID of the node, the attacker can forge the node and become a forged node in the Sybil attack. The forged node can be detected through the traditional encryption authentication mechanism, but the detection cost is relatively large. Identity theft means that attackers obtain legal identities by attacking, capturing, and embezzling legitimate nodes, which are used to cover Sybil nodes, but traditional identity authentication mechanisms cannot detect the emb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06H04W84/18H04W12/60
CPCH04L63/0876H04L63/101H04L63/1441H04W12/06H04W84/18
Inventor 潘绯文红章露萍张金玲廖润发
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products