Malicious anchor node detection method based on isolated forest and sequential probability ratio test

A sequential probability ratio and detection method technology, applied in the direction of location information-based services, security devices, electrical components, etc., can solve the problems of misjudgment, failure to detect malicious anchor nodes, malicious anchor nodes cannot be detected, etc., to achieve detection More, detect real and accurate effect

Active Publication Date: 2019-11-19
SUN YAT SEN UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the proportion of malicious anchor nodes increases, it is likely that the positioning samples participated by malicious anchor nodes fall in the normal samples, so they are misjudged as normal samples, so that some malicious anchor nodes cannot be detected
In addition, existing MNDC algorithms only consider uncoordinated attacks and cannot detect malicious anchor nodes under coordinated attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious anchor node detection method based on isolated forest and sequential probability ratio test
  • Malicious anchor node detection method based on isolated forest and sequential probability ratio test
  • Malicious anchor node detection method based on isolated forest and sequential probability ratio test

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0065] 30 anchor nodes and one target node are randomly deployed in a square area with an area of ​​60m×60m, among which there are 9 malicious anchor nodes. In the simulations performed, the standard deviation σ of the noise is measured under coordinated and non-coordinated attacks n Both are set to 2m, the mean value μ of the attack item under the non-cooperative attack δ Set to 4m.

[0066] The application process is as follows: figure 1 As shown, there are multiple stages.

[0067] The first stage: the isolation forest determines the reference anchor node

[0068] The target node sends out a positioning request, and 30 anchor nodes within its communication range send data to the target node, and the target node obtains the location information of the anchor node and the ranging information between the anchor node and the target node, wherein the ranging information passes through the same A ranging method RSSI (Received Signal Strength Indication) is obtained;

[0069]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious anchor node detection method based on an isolated forest and a sequential probability ratio test. The malicious anchor node detection method combines an isolated forest algorithm and a voting mechanism to obtain reliable information in anchor nodes, and builds a detection model through the reliable information. According to the malicious anchor node detection method, only a single ranging algorithm is needed for ranging, and multiple ranging algorithms do not need to be used for ranging, and meanwhile, the assumption that one of multiple ranging methods is not attacked completely is avoided, so that the malicious anchor node detection method is more suitable for being used in a real field, that is, it does not need to assume that the malicious anchor node detection method is not attacked completely. Normal samples are screened by utilizing an isolated forest, and reference anchor nodes in the normal samples are screened by utilizing a voting mechanism to realize multiple selection, and the reliability of the reference anchor nodes is ensured, so that the subsequent process of obtaining malicious anchor nodes according to the reference anchor nodes is indirectly ensured; and the difference value information is used for sequential probability ratio inspection, so that the detection of malicious anchor nodes is further improved, and the detection accuracy of the anchor nodes is improved, and the final positioning accuracy of subsequent target nodes is also improved.

Description

technical field [0001] The invention relates to the field of wireless sensor networks, more specifically, to a malicious anchor node detection method based on isolated forest and sequential probability ratio test. Background technique [0002] The positioning algorithm adopted by the positioning system of wireless sensor network (WSN) usually uses the anchor node whose position is known as a reference to estimate the position of the position node, which requires the information provided by the anchor node to be completely reliable. However, due to the openness of WSN itself, nodes are likely to suffer from various attacks during the positioning process. Anchor nodes may be affected by the environment or captured by hostile forces and become malicious anchor nodes, affecting the positioning process. The traditional positioning method aims to improve the positioning accuracy and energy efficiency, and does not consider the situation that the network is attacked. Generally, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/12H04W4/02H04W12/122
CPCH04W12/009H04W12/12H04W4/02H04W12/122
Inventor 刘星成彭鋆
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products