Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed detection data error attack defense method based on trust evaluation mechanism

A technology for detecting data and evaluating mechanisms, applied in data exchange networks, digital transmission systems, electrical components, etc., to solve problems such as limited computing power, storage space, battery energy, insecurity, and unrealistic access to global network information.

Active Publication Date: 2020-04-10
ZHEJIANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above defense methods face many limitations in practical application: the local information of nodes is limited, and it is neither realistic nor safe for each node to obtain global network information; node resources are limited, and each node’s computing power, storage space, battery power, etc. Resources are limited; the network topology is uncertain, and the actual network topology may not meet the requirements of the above detection methods
Moreover, the above defense methods only detect whether there is an attacker or identify malicious nodes, but the wrong data that was injected still remains, resulting in deviations between the convergence results and the real convergence results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed detection data error attack defense method based on trust evaluation mechanism
  • Distributed detection data error attack defense method based on trust evaluation mechanism
  • Distributed detection data error attack defense method based on trust evaluation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be described in further detail below with reference to the accompanying drawings and examples.

[0054] Such as figure 1 As shown, in the distributed detection system, multiple sensor nodes are randomly distributed in a certain area to detect the target. The target to be detected is figure 1 As shown in the star, the nodes are as figure 1 shown in the circle. Deploy N sensor nodes (N=10 in this example) in the system, wherein there are N 1 malicious nodes (N in this example 1 =3), such as figure 1 Shown in the dotted circle.

[0055] Such as figure 2 As shown, this example is implemented through the following steps:

[0056] Step 1. The sensor node perceives the target signal to obtain measurement data. After sampling M times (M=20 in this example), the local measurement data obtained by N nodes sensing the target signal are respectively y 1 ,y 2 ,...,y N , let the initial state value of node i be x i (0)=y i .

[0057] Step 2....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed detection data error attack defense method based on a trust evaluation mechanism. An existing defense method is limited by many conditions, and the convergence and the convergence precision of a distributed system cannot be ensured. According to the node state updating rule and the neighbor node information in the distributed system, the state constraint rangecan be obtained. The credibility of the neighbor node is evaluated by observing whether the state of the neighbor node is within a constraint range. The method comprises the following steps: sensinga target to obtain measurement data, detecting the abnormal behavior of a neighbor node, evaluating the trust degree of the neighbor node, identifying the identity of the neighbor node, adjusting thefusion weight, executing a consistency algorithm to update the node state and add compensation data. The credibility is evaluated only by utilizing data provided by local and single-hop neighbors, sothat malicious nodes are identified and isolated, and error data injected by the malicious nodes are offset through a recovery mechanism. The method has the advantages of being low in calculation complexity, free of network global information, capable of guaranteeing convergence precision and the like.

Description

technical field [0001] The invention belongs to the field of distributed information processing, in particular to the field of distributed detection in distributed information processing, and relates to a distributed detection data error attack defense method based on a trust evaluation mechanism. Background technique [0002] Distributed detection is one of the important applications of distributed information processing. Distributed detection means that the sensor nodes in the distributed network complete the detection task in a cooperative manner: the nodes first perceive the target to obtain measurement data, then exchange data with each other and perform data fusion through a consensus protocol, and finally judge whether the target is in the area of ​​interest . Distributed detection improves the detection accuracy and detection efficiency of the system as a whole. [0003] However, due to the open nature of distributed systems, sensor nodes are vulnerable to attacks ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/12H04L63/1425H04L63/1441
Inventor 陈惠芳谢磊郑晓雁
Owner ZHEJIANG UNIV