Sybil attack node detection method and device considering sensor errors

A technology of witch attack and detection method, applied in security devices, transmission monitoring, transmission systems, etc., can solve the problems of not considering the physical measurement error of sensors, increase communication pressure, leak user privacy, etc., to accelerate intelligent development and improve The effect of driving safety and ensuring rationality

Active Publication Date: 2020-11-10
SOUTHEAST UNIV
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing research on Sybil attack node detection has obvious limitations and deficiencies
First of all, most of the existing research does not take into account the inherent physical measureme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sybil attack node detection method and device considering sensor errors
  • Sybil attack node detection method and device considering sensor errors
  • Sybil attack node detection method and device considering sensor errors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solution of the present disclosure will be described in detail below in conjunction with the accompanying drawings.

[0039] In the description of the present disclosure, it should be understood that the terms "first" and "second" are used for description purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features, Used only to distinguish different components. In this application, "first node" generally refers to all neighbor nodes. Similarly, "first CAM (cooperative awareness message, cooperative awareness information) message" means a cooperative broadcast message broadcast by neighbor nodes in real time; All communication nodes with communication range rationality factor f.

[0040] figure 1 It is a schematic diagram of the disclosed process, such as figure 1 As shown, the normal vehicle node receives the first CAM message broadcast by the first node, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Sybil attack node detection method and device considering sensor errors, relates to the technical field of vehicle-mounted network security, and solves the technical problemthat the detection of a Sybil attack node by a vehicle-mounted network is not accurate enough. The main points of the technical scheme of the invention are that the method comprises the steps that aninformation acquisition device receives a CAM message broadcast by a neighbor node; a pre-detection device fuses sensor errors to judge the rationality of the vehicle node communication range; a preprocessing device performs filtering optimization processing on a node RSSI sequence with a reasonable communication range by using Gaussian filtering; a detection device uses a DTW algorithm to measurethe spatial difference and the time difference between a node RSSI sequence and a moving sequence so as to discover Sybil nodes in neighbor nodes. While malicious behaviors in the vehicle-mounted adhoc network are detected in real time, inherent physical acquisition errors of the sensor are considered, and the rationality of the detection process is improved; the calculation load of the DTW detection algorithm is greatly reduced, and the detection time is shortened.

Description

technical field [0001] The present disclosure relates to the technical field of vehicle network security, in particular to a detection method and device for Sybil attack nodes considering sensor errors. Background technique [0002] As a branch of the Internet of Things, VANET (Vehicular ad-hoc network) is considered to be the basis of vehicle-to-vehicle communication. After the vehicle obtains the state of itself and the environment (such as speed, position, congestion, and sudden accidents, etc.) through various sensors, it stores it in its own database, and continuously broadcasts to the outside while exchanging information with other vehicles. VANET and its applications facilitate people's travel, relieve traffic pressure, and help achieve the goals of accuracy, efficiency, safety, and energy saving. [0003] As more and more VANET products are planned to be put into the market, ensuring their communication security has become a very important issue. Manufacturers not o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04B17/318H04W4/38
CPCH04B17/318H04W4/38H04W12/009
Inventor 殷国栋刘赢庄伟超徐利伟王法安董昊轩薛宏伟胡敬宇
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products