Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack and defense methods for malicious programs in multi-stage wireless rechargeable sensor networks

A sensor network, wireless sensor technology, applied in the field of sensor networks

Active Publication Date: 2022-05-06
GUANGZHOU UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the fight against malicious programs, the industry has not exactly introduced the energy state of nodes as a state into the malicious program propagation model, and analyzed the optimal attack and defense strategy based on the model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack and defense methods for malicious programs in multi-stage wireless rechargeable sensor networks
  • Attack and defense methods for malicious programs in multi-stage wireless rechargeable sensor networks
  • Attack and defense methods for malicious programs in multi-stage wireless rechargeable sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The present invention will be further described below in conjunction with drawings and embodiments.

[0067] This scheme proposes to divide the energy state of the wireless rechargeable sensor network into high and low states. The nodes in the high energy state have susceptible nodes, infected nodes and repair full energy nodes (R), and the nodes in the low energy state are the corresponding nodes in the low energy state. Energy state (L) of the node. The normal operation of wireless rechargeable sensor network will consume energy. At the same time, under the attack of malicious programs, the infected nodes will increase the frequency of information collection, increase the frequency of information transmission and increase the transmission radius due to running malicious programs, which will consume the energy of sensor nodes faster. Therefore, it is very meaningful to propose the energy state of the sensor network. At the same time, charging is further considered. I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a multi-stage wireless rechargeable sensor network attack and defense method for malicious programs, including: S1, establishing a solar energy supplementary device arranged in a rechargeable wireless sensor network, and mathematically describing the solar charging model; The solar energy supplementary device includes the state of being able to capture solar energy and the state of not being able to capture solar energy; S2, the flow chart of establishing a rechargeable wireless sensor network that can be infected with malicious programs by time, and describing the flow chart by differential equations; S3, the establishment of time by time Corresponding cost function, at the same time establish the Hamilton function of the corresponding period; S4, according to the bilateral maximum principle of the differential game, classify and find the optimal attack and defense strategy of the wireless sensor network for the malicious program, which is very important for the wireless rechargeable sensor The energy captured in the grid is solar energy, tidal energy and other energy with periodic changes, which has great guiding significance.

Description

technical field [0001] The invention relates to the technical field of sensor networks, in particular to a multi-stage wireless rechargeable sensor network attack and defense method for malicious programs. Background technique [0002] With the continuous upgrading of wireless sensor network technology, its application level is becoming more and more extensive, such as military field, medical and health, smart home, environmental monitoring, building safety, earthquake monitoring, intelligent transportation, deep sea monitoring, etc., This will bring huge economic benefits. However, due to the structural characteristics of wireless sensor networks, if there are no defense measures, malicious programs will quickly infect the entire network, and the resulting network paralysis and information leakage will cause huge economic losses. At the same time, in the battlefields of both the enemy and us, aiming at the sensor network deployed by the enemy to monitor our area, we use th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04W4/38H04W12/122H04W84/18
CPCH04L63/145H04W4/38H04W84/18H04W12/122
Inventor 刘贵云彭百豪钟晓静舒聪唐冬向建化
Owner GUANGZHOU UNIVERSITY