Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi-path safety topology control method with intrusion tolerance capacity

A topology control, multi-path technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as wireless communication being easily interfered, computing power, memory, energy resources being limited, and the network being vulnerable to malicious attacks.

Active Publication Date: 2018-11-23
ZHEJIANG SCI-TECH UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a wireless self-organizing communication network composed of different types of sensor nodes, HWSNs can better reflect the heterogeneity and polymorphism of the physical world, but most heterogeneous nodes still have limited computing power, memory, energy and other resources. And it is often placed in an open environment, causing wireless communication to be easily interfered, making the network extremely vulnerable to malicious attacks, and posing a serious threat to network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-path safety topology control method with intrusion tolerance capacity
  • Multi-path safety topology control method with intrusion tolerance capacity
  • Multi-path safety topology control method with intrusion tolerance capacity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to describe the technical content of the present invention more clearly, further description will be given below with reference to specific embodiments.

[0050] In order to solve the above technical problems, the present invention provides a multi-path security topology control method with intrusion tolerance, including cluster head selection, clustering, route establishment and data transmission. Combine below Figures 1 to 3 These three steps are introduced separately.

[0051] like figure 1 As shown, the multi-path security topology control method with intrusion tolerance of the present invention, after the preprocessing is completed from the network operation, selects the cluster head according to the following steps:

[0052] Step 1: Calculate the optimal number of clusters k of the network using the N-order nearest neighbor analysis method opt ;

[0053] Step 2: Calculate the cluster head selection probability of nodes according to the parameters inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-path safety topology control method with intrusion tolerance capacity, which comprises the steps of: cluster head selection, i.e., determining an optimal cluster number according to an initialization parameter, calculating cluster head election probabilities and cluster head competition radii, and determining cluster head nodes; clustering, i.e., selecting to add non-cluster-head nodes into an optimal cluster according to residual energy and node distance information of a cluster head which sends out an invitation; routing establishment, i.e., enabling a sourcenode to establish a single hop of single path by adopting direct communication or establish multiple hops of paths by adopting an indirect communication mode according to different transmission distances with target nodes, and storing routing information; and data transmission, i.e., enabling the source node to carry out patch transmission on data to the target nodes according to the establishedpath by combining (k, n) threshold secret sharing scheme. According to the invention, in a case that a malicious node exists in a network and a data transmission path is damaged, normal transmission of the data can be ensured so as to achieve effects of balancing energy consumption and prolonging the life cycle of the network.

Description

technical field [0001] The invention relates to the technical field of wireless sensor networks, in particular to a multi-path security topology control method with intrusion tolerance capability. Background technique [0002] With the development of network informatization, people have a higher pursuit of the popularization and facilitation of communication, and the development and expansion of the Internet of Things has become an inevitable trend of the times. The application of Heterogeneous Wireless Sensor Networks (HWSNs) plays a crucial role in the development of the Internet of Things. As a wireless self-organizing communication network composed of different types of sensor nodes, HWSNs can better reflect the heterogeneity and polymorphism of the physical world, but most of the heterogeneous nodes still have limited resources in terms of computing power, memory, and energy. It is often placed in an open environment, causing wireless communication to be easily interfe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/02H04W40/04H04W40/10H04L12/751H04L12/715H04L45/02
CPCH04L45/02H04L45/46H04W40/02H04W40/04H04W40/10
Inventor 洪榛叶蕾周丽丹
Owner ZHEJIANG SCI-TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products