A routing method based on reputation evaluation of a wireless sensor network node

A wireless sensor and network node technology, applied in wireless communication, data exchange network, transmission system, etc., can solve problems such as routing information attack, node energy exhaustion, hello flood attack, etc., to improve the success rate and prevent malicious nodes The effect of the attack

Active Publication Date: 2019-06-11
ANHUI UNIVERSITY OF ARCHITECTURE
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The damage caused by the use of captured nodes to participate in normal communication will eventually lead to node energy exhaustion and routing black holes caused by node black hole attacks, false routing information attacks, selective forwarding attacks, Sybil attacks, hello flood attacks, fake response attacks and Key point attacks and other new types of attacks
[0006] To sum up, the security mechanism of traditional password security authentication alone cannot solve the internal attack security problem of wireless sensor network in the current open environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A routing method based on reputation evaluation of a wireless sensor network node
  • A routing method based on reputation evaluation of a wireless sensor network node
  • A routing method based on reputation evaluation of a wireless sensor network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] Such as figure 1 As shown, the present invention provides a routing method for wireless sensor network node reputation evaluation, characterized in that the method includes the following steps:

[0024]S1, based on the AOMDV multipath routing protocol, the routing vector model of the source node and the destination node in the wireless sensor network is established, and the source node floods and sends the routing request RREQ to the destination node;

[0025] S11, the source node floods and broadcasts the route establishment request of RREQ. After receiving the RREQ, the intermediate node establishes a reverse path with the source node, and checks whether it belongs to the destination node. If not, it broadcasts the received RREQ to the adjacent node RREQ;

[0026] S12, if an intermediate node receives the same RREQ, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a routing method based on reputation evaluation of a wireless sensor network node. By studying a wireless sensor network, and based on an AOMDV multipath routing protocol, The method comprises the steps of establishing a routing vector model, an energy assessment model and a communication trust model respectively by combining a bayes algorithm, analyzing the influence of routing vector factors, communication factors and energy factors in the wireless sensor nodes on the reputation of the wireless sensor nodes through the models, and objectively selecting safe and efficient wireless sensor routing nodes, so that the wireless sensor network can identify attack nodes in the multi-factor network more effectively; the malicious node attacks are prevented, the success rateof data transmission is improved, the internal attack security problem which cannot be solved by a traditional password security authentication security mechanism is solved, and the internal attack security of the wireless sensor network in an open environment is more hierarchical.

Description

technical field [0001] The invention belongs to the technical field of wireless sensor networks, in particular to a routing selection method based on reputation evaluation of wireless sensor network nodes. Background technique [0002] The sensor network combines sensor technology, communication technology and computer technology to realize the collection, transmission and processing of information. It will have a profound impact on the future human life style and is considered to be one of the most important technologies in the 21st century. Wireless sensor networks appeared at the end of the 20th century. In 1998, the concept of "smart dust" proposed by the US Department of Defense began, which opened the prelude to the research of wireless sensor networks; Applied research in the military. The U.S. Department of Defense, various military departments, the U.S. Intel Corporation, the U.S. Microsoft Corporation and other giants in the information industry have also started ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/10H04L12/721H04L12/711H04W40/02H04L45/247
Inventor 钟娟章曙光王立新沈庆伟程远孙全玲吴一尘
Owner ANHUI UNIVERSITY OF ARCHITECTURE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products