Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal node detection method based on multiple integrity remote attestation

A remote certification and node detection technology, applied in electrical components, wireless communication, network topology, etc., can solve problems such as inaccurate abnormal sensor nodes, and achieve the effect of avoiding collusion attacks

Active Publication Date: 2017-06-09
THE PLA INFORMATION ENG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problem of inaccurate detection of abnormal sensor nodes in the prior art when the neighbor nodes are not completely credible, the present invention proposes an abnormal node detection method based on multiple integrity remote proofs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal node detection method based on multiple integrity remote attestation
  • Abnormal node detection method based on multiple integrity remote attestation
  • Abnormal node detection method based on multiple integrity remote attestation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Example 1: Combining Figure 1-Figure 8 , an abnormal node detection method based on multiple integrity remote certification, characterized in that, comprising the following steps:

[0060] S11: Randomize the node image file, the specific steps of randomizing the node image file include:

[0061] S21: The sink node implants the session key into the basic area of ​​the end node;

[0062] S22: The sink node randomly inserts tracking probes and trajectory trackers into the node software;

[0063] S23: The sink node adopts the method of confusing instructions to confuse the node software and generate a mirror image file;

[0064] S24: Each terminal node applies for and installs the image file of the node from the sink node.

[0065] Specifically: in order to prevent an attacker from capturing information of all nodes by capturing one node, there should be differences between nodes. For this reason, the present invention proposes randomization of node image files to gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to a node abnormity detection method technology field in monitoring areas, to be specific, relates to an abnormal node detection method based on multiple integrity remote attestation. The abnormal node detection method comprises steps that a node mirror image document is randomized; the node is verified and attested by adopting a remote attestation protocol method; an interpellation problem aiming at the node is built by adopting an integrity measuring method; integration of a plurality of opinions is executed by adopting a subjective logic consensus rule, and an expected value corresponding to the opinion is calculated. The abnormal node detection method is advantageous in that collusive attacks of a few abnormal nodes are prevented; every node has the unique mirror image document, and by adopting the various integrity measuring methods, outputs of different metrics are provided during the inputs of the same metric; an answer to the interpellation problem provided by the mirror image document of each node only can be known by the corresponding node easily, and cannot be known by other nodes easily. All of neighbors of a target node participate in the detection, and therefore the attempt of the few abnormal nodes conspiring to deceive sink nodes is hard to realize.

Description

technical field [0001] The invention belongs to the technical field of abnormal detection methods for wireless sensor nodes in a monitoring area, and in particular relates to an abnormal node detection method based on multiple integrity remote proofs. Background technique [0002] The wireless sensor network is composed of a large number of cheap micro-nodes deployed in the monitoring area and connected through a wireless communication network to form an ad hoc wireless network. Different sensor nodes perceive different types of data. Some sensor nodes are specially used to sense temperature, some are used to sense humidity, some sense pressure, and some sense multiple types of data. Different sensors are suitable for different application scenarios, typically a sensor system used to detect coal mine gas concentration. At present, sensor networks have been widely used in social life. [0003] There are various architectures for wireless sensor networks. A basic network fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/04H04W84/18
CPCH04W12/12H04W24/04H04W84/18
Inventor 周洪伟原锦辉吴果秦晰方青坡
Owner THE PLA INFORMATION ENG UNIV