Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensing data error attack detection method based on random sampling consistency

A random sampling and sensing data technology, which is applied in the direction of services, security devices, and electrical components based on specific environments, can solve the problems of high cost of deploying trusted nodes, large amounts of data, and the number and location of effective trusted nodes to be studied. Achieve the effect of improving system robustness and reducing communication overhead

Active Publication Date: 2018-09-28
ZHEJIANG UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The training data of the classifier does not need to be marked in advance, but it is required that the training data cannot be mixed with wrong data, and a large amount of data is required for training
The defense method based on reputation feedback needs to first calculate the initial credibility of the node, and then evaluate the final credibility according to the credibility feedback of the diagnosis sequence and Bayesian rule, so as to adjust the classification of normal nodes and malicious nodes, but it needs Preserve historical information, and attackers may destroy the reputation mechanism
The defense method of deploying trusted nodes is to deploy trusted nodes in the network on the basis of the reputation mechanism, and make the reputation evaluation value reach a consensus among all sensor nodes through reputation propagation, which improves the stability of the reputation mechanism , but the cost of deploying trusted nodes is high, and the number and location of effective trusted nodes still need to be studied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensing data error attack detection method based on random sampling consistency
  • Sensing data error attack detection method based on random sampling consistency
  • Sensing data error attack detection method based on random sampling consistency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The technical solution of the present invention will be described in detail below with reference to the accompanying drawings and examples.

[0056] as attached figure 1 As shown, the system model of this embodiment is: there is a target in the network, as shown in the attached figure 1 As shown by the star in the middle; 10 sensor nodes are deployed in the network, as shown in the attached figure 1 As shown in the middle circle, the numbers are 1, 2, ..., 10. The attacker successfully captured the nodes numbered 1 to 3, making them malicious nodes, and the malicious nodes are as attached figure 1 Shown in the dotted circle. Nodes numbered 4 to 10 are normal nodes, as attached figure 1 Shown in solid circle. The power of the measurement noise at node i In this instance i=1,2,...,10. The distance d between node i and the target i And the distances are not equal to each other, in this example d 1 to d 10 1.5, 1.8, 2, 2.2, 2.5, 2.8, 3, 3.2, 3.6, 4 respectively...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a sensing data error attack detection method based on random sampling consistency. The existing method needs mass of training data and is large in computation and communication expenditure. A malicious node can be effectively identified by using node location information and the signal propagation characteristic, and the method comprises the following steps: acquiring a target signal by a sensor node, collecting measurement data, and estimating the target state and identifying the malicious node, and finally comparing the target state estimation value with the preset threshold to judge whether the target is existent; the step of identifying the malicious node comprises the following steps: randomly extracting partial measurement data to estimate the target state parameter by mainly using random voting thought, and assessing the model parameter by using all measurement data, thereby finding out the optimal solution with the highest score, and identifying the node not supporting the optimal solution as the malicious node, and isolating the malicious node. The detection method disclosed by the invention is simple in operation and easy to realize; the communication expenditure is reduced since the measurement data only needs to be collected once; the applicable range is large, and the method can be used for detecting the sensing data error attack of different types.

Description

technical field [0001] The invention belongs to the field of wireless network security of communication technology, in particular to the field of distributed detection in information processing, and relates to a detection method for sensing data error attack based on random sampling consistency. Background technique [0002] Distributed detection is an important branch of distributed information processing. Distributed detection means that multiple sensor nodes in the network first measure the signal sent by the target, then fuse the observed data or local judgment results, and finally make a judgment on whether the target is in the area of ​​interest. In the distributed system structure, the identity of the sensor nodes is equal, and the load of each communication link is basically balanced, which can effectively reduce the communication cost, reduce the calculation burden, reduce the energy consumption of nodes, and avoid network congestion problems; and the distributed sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04L29/06H04L29/08H04W4/38H04W12/122
CPCH04L63/1416H04W12/12H04L67/12H04W4/38
Inventor 谢磊陈惠芳郑晓雁
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products