Distributed detection data error attack defense method based on trust evaluation mechanism
A technology for detecting data and evaluating mechanisms, applied in data exchange networks, digital transmission systems, electrical components, etc., to solve problems such as residual erroneous data, not necessarily reachable, and uncertain network topology.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The present invention will be described in further detail below with reference to the accompanying drawings and examples.
[0054] Such as figure 1 As shown, in the distributed detection system, multiple sensor nodes are randomly distributed in a certain area to detect the target. The target to be detected is figure 1 As shown in the star, the nodes are as figure 1 shown in the circle. Deploy N sensor nodes (N=10 in this example) in the system, wherein there are N 1 malicious nodes (N in this example 1 =3), such as figure 1 Shown in the dotted circle.
[0055] Such as figure 2 As shown, this example is implemented through the following steps:
[0056] Step 1. The sensor node perceives the target signal to obtain measurement data. After sampling M times (M=20 in this example), the local measurement data obtained by N nodes sensing the target signal are respectively y 1 ,y 2 ,...,y N , let the initial state value of node i be x i (0)=y i .
[0057] Step 2....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


