Unlock instant, AI-driven research and patent intelligence for your innovation.

Security analysis method for wireless sensor network

A wireless sensor and analysis method technology, applied in the field of Internet of Things security, can solve the problem that detection ability cannot be checked and guaranteed, and achieve the effect of improving reliability, improving versatility, and expanding expression ability

Inactive Publication Date: 2017-09-01
TIANJIN UNIV
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Researchers can only construct attackers based on their own understanding, and detection capabilities cannot be tested and guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security analysis method for wireless sensor network
  • Security analysis method for wireless sensor network
  • Security analysis method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to solve the problem that there are many wireless sensor network protocols, manual analysis can only analyze a certain protocol each time; the present invention uses the improved AWN language to formalize the wireless sensor network protocol modeling, and uses a general model analysis method to solve all protocol analysis question. Expand the behavior description capabilities of the original AWN language, such as intra-node process concurrency and conditional execution, to improve the versatility of the AWN language, so that the improved AWN language can describe all protocol models. For each attack type, a corresponding detection method is generated. In the selection of detection methods, try to generate detection methods based on misuse cases. The misuse case-based approach is more targeted to each attack, with higher detection rate and less energy consumption.

[0082] The present invention will be described in further detail below in conjunction with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security analysis method for a wireless sensor network. The method comprises the following steps: step 1, performing extension design for an AWN formal language; step 2, performing formal description for a wireless sensor network protocol (AODV) based on the extended AWN formal language; step 3, constructing and analyzing a wireless sensor network AODV protocol model; step 4, generating an attacker model; and step 5, generating corresponding detection methods, wherein the corresponding detection methods include a misuse case based detection method and an anomaly detection method. Compared with the prior art, by adopting the security analysis method disclosed by the invention, the universality of detection results can be enhanced, and the formal AWN modeling language can be improved; a method for analyzing protocol weakness can be provided; and an attack detection method with strong pertinence and low energy consumption can be automatically generated.

Description

technical field [0001] The invention belongs to the security field of the Internet of Things, and in particular relates to a security analysis method of a wireless sensor network. Background technique [0002] As an important component and technical support of the Internet of Things, wireless sensor networks have drawn more and more attention to their security. Wireless sensor network is different from wired network, because of its protocol diversity and network dynamics, network security is greatly threatened. The existing wireless sensor network security detection systems do not formally analyze the protocol, nor do in-depth research on the attack types. As a result, the types of attacks it detects are not comprehensive enough, and the reliability of detection results is poor. Existing security detection methods are limited by specific protocols, each method can only target one protocol, and it is difficult to transplant and apply to other protocols. [0003] The networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04W24/06H04W4/00
Inventor 李晓红刘云昊郭奇
Owner TIANJIN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More