Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious Anchor Node Detection Method Based on Isolation Forest and Sequential Probability Ratio Test

A technology of sequential probability ratio and detection method, applied in the direction of location information-based services, electrical components, security devices, etc., can solve the problems of misjudgment, inability to detect malicious anchor nodes, malicious anchor nodes cannot be detected, etc., to achieve detection Real and accurate, detect more effect

Active Publication Date: 2021-01-26
SUN YAT SEN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the proportion of malicious anchor nodes increases, it is likely that the positioning samples participated by malicious anchor nodes fall in the normal samples, so they are misjudged as normal samples, so that some malicious anchor nodes cannot be detected
In addition, existing MNDC algorithms only consider uncoordinated attacks and cannot detect malicious anchor nodes under coordinated attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious Anchor Node Detection Method Based on Isolation Forest and Sequential Probability Ratio Test
  • Malicious Anchor Node Detection Method Based on Isolation Forest and Sequential Probability Ratio Test
  • Malicious Anchor Node Detection Method Based on Isolation Forest and Sequential Probability Ratio Test

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0065] 30 anchor nodes and one target node are randomly deployed in a square area with an area of ​​60m×60m, among which there are 9 malicious anchor nodes. In the simulations performed, the standard deviation σ of the noise is measured under coordinated and non-coordinated attacks n Both are set to 2m, the mean value μ of the attack item under the non-cooperative attack δ Set to 4m.

[0066] The application process is as follows: figure 1 As shown, there are multiple stages.

[0067] The first stage: the isolation forest determines the reference anchor node

[0068] The target node sends out a positioning request, and 30 anchor nodes within its communication range send data to the target node, and the target node obtains the location information of the anchor node and the ranging information between the anchor node and the target node, wherein the ranging information passes through the same A ranging method RSSI (Received Signal Strength Indication) is obtained;

[0069]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious anchor node detection method based on an isolated forest and a sequential probability ratio test. The method combines an isolated forest algorithm and a voting mechanism to obtain reliable information in the anchor node, and uses the reliable information to establish a detection model. This method only needs a single ranging algorithm for ranging, and does not need to use multiple ranging algorithms for ranging. At the same time, it avoids the assumption that one of the various ranging methods is not attacked at all, and is more suitable for real field applications. use, i.e. no need to assume complete invulnerability. Use the isolated forest to screen normal samples, and the voting mechanism to screen reference anchor nodes in normal samples to achieve multiple selections to ensure the reliability of reference anchor nodes, thereby indirectly ensuring the subsequent process of obtaining malicious anchor nodes based on reference anchor nodes; also using the difference The information is subjected to sequential probability ratio inspection to further improve the detection of malicious anchor nodes, improve the detection accuracy of anchor nodes, and also improve the accuracy of the final location of subsequent target nodes.

Description

technical field [0001] The invention relates to the field of wireless sensor networks, more specifically, to a malicious anchor node detection method based on isolated forest and sequential probability ratio test. Background technique [0002] The positioning algorithm adopted by the positioning system of wireless sensor network (WSN) usually uses the anchor node whose position is known as a reference to estimate the position of the position node, which requires the information provided by the anchor node to be completely reliable. However, due to the openness of WSN itself, nodes are likely to suffer from various attacks during the positioning process. Anchor nodes may be affected by the environment or captured by hostile forces and become malicious anchor nodes, affecting the positioning process. The traditional positioning method aims to improve the positioning accuracy and energy efficiency, and does not consider the situation that the network is attacked. Generally, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/12H04W4/02H04W12/122
CPCH04W12/009H04W12/12H04W4/02H04W12/122
Inventor 刘星成彭鋆
Owner SUN YAT SEN UNIV