Attack and defense methods for malicious programs in multi-stage wireless rechargeable sensor networks
A sensor network, wireless sensor technology, applied in the field of sensor networks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] The present invention will be further described below in conjunction with drawings and embodiments.
[0067] This scheme proposes to divide the energy state of the wireless rechargeable sensor network into high and low states. The nodes in the high energy state have susceptible nodes, infected nodes and repair full energy nodes (R), and the nodes in the low energy state are the corresponding nodes in the low energy state. Energy state (L) of the node. The normal operation of wireless rechargeable sensor network will consume energy. At the same time, under the attack of malicious programs, the infected nodes will increase the frequency of information collection, increase the frequency of information transmission and increase the transmission radius due to running malicious programs, which will consume the energy of sensor nodes faster. Therefore, it is very meaningful to propose the energy state of the sensor network. At the same time, charging is further considered. I...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


