Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Integrated detection method of edge side cloned node based on counterpropagation neural network

A back-propagation and neural network technology, applied in the field of edge-side clone node integration detection, can solve the problems of increasing network transmission load, clone detection delay, and increasing central network computing load.

Active Publication Date: 2018-11-30
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it not only increases the computing load of the central network, but also increases the network transmission load and the delay of clone detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated detection method of edge side cloned node based on counterpropagation neural network
  • Integrated detection method of edge side cloned node based on counterpropagation neural network
  • Integrated detection method of edge side cloned node based on counterpropagation neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0091] Such as figure 1 As shown, the present invention is implemented in a network of terminals, nodes, and edge-side computing nodes with legitimate data sources. Clone node attack means that the attacker captures a legitimate data source node and obtains legal information such as its identity ID and key, and clones multiple clone nodes with the same ID at different physical locations in the network, thereby attacking the network. Way. The characteristic of the clone node is that the data sources with the same identity ID are located in different physical locations. The clone detection of the present invention is implemented on the computing nodes at the edge side, and clone attack detection is performed on the data source nodes. In th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an integrated detection method of an edge side cloned node based on a counterpropagation neural network. The method comprises the following steps: S1. collecting, by an edge side computing node, a data set; S2. training and testing a BPNN by using the data set; S3. waiting for a new information packet; S4. extracting channel information from the information packet, storingreference channel information, and calculating a channel difference value; S5. accumulating the credibility of each node; S6. inputting the credibility of each node into the BPNN to judge whether a clone attack exists; and S7. if no clone attack exists, updating the reference channel information, and if the clone attack exists, sending a clone attack alarm. According to the integrated detection method disclosed by the invention, integrated detection is performed on a data source node on the edge side node by using the BPNN, meanwhile whether the clone attack exists in multiple nodes, thus improving the detection efficiency of the cloned node and reducing the network transmission load and the load of a central network. According to the integrated detection method disclosed by the invention,the influence of random noise of a channel is also reduced by accumulating the credibility and classifying the BPNN, and the accuracy of the detection of the cloned node is improved.

Description

technical field [0001] The present invention relates to the security protection of terminals or nodes, in particular to an integrated detection method for edge side clone nodes based on backpropagation neural network. Background technique [0002] The principle of the clone node attack is that the attacker captures the legal nodes in the network and obtains all their legal information, copies several nodes with the same ID and key information, and puts these clone nodes in different locations in the network to launch the attack . Because the cloned node has the same ID and key information as the legitimate node, it is difficult for the traditional cryptography-based authentication mechanism to detect the cloned node. How to quickly and efficiently detect clone nodes and isolate them has become the key to preventing clone node attacks. [0003] The principle of the clone detection scheme based on channel information is that if the same ID corresponds to different physical l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1408
Inventor 潘绯廖润发文红
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products