Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-collusion attack robust data aggregation method

A data aggregation and anti-collusion technology, applied in data exchange network, digital transmission system, network topology, etc., can solve problems such as common influence, sensor data reliability evaluation, and inability to eliminate influence.

Active Publication Date: 2021-04-09
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One is the discriminant function of the improved iterative filtering algorithm, such as the improved iterative filter based on the Pearson correlation coefficient in the literature "Zhou YB, Lei T, Zhou T. A robust king algorithm to spamming [J]. EPL, 2011, 94 (4)". The discriminant function of the filtering algorithm; this method can prevent the iterative algorithm from quickly converging to the slope value to a certain extent, but it cannot eliminate the influence of the outliers generated by malicious nodes on the algorithm;
[0005] The other is to evaluate the reliability of sensor nodes before the iterative algorithm, such as the literature "Rezvani M, Ignjatovic A, Bertino E, Jha S.Secure Data Aggregation Technique for WirelessSensor Networks in the Presence of Collusion Attacks[J].IEEE TRANSACTIONS ONDEPENDABLE AND SECUR E COMPUTING, 2015,12(1)” proposes an improved iterative method, which performs maximum likelihood estimation on the data before iteration, and uses the estimated reputation vector as the initial iteration vector, but with malicious nodes The number increases, and the method is inevitably affected by outliers in the random noise scene; another example is the literature "Firoozi F, Zadorozhny VI, Li FY. Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks[J].IEEE SENSORS JOURNAL,2018,18(15)" is based on the subjective logic mechanism, and according to the proposed reputation threshold, the sliding window method is used to eliminate the nodes with large outliers in the sensors, but the remaining sensors are not data reliability evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-collusion attack robust data aggregation method
  • Anti-collusion attack robust data aggregation method
  • Anti-collusion attack robust data aggregation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0038] This embodiment provides a robust data aggregation method against collusion attacks, which uses a WSNs network model such as figure 2 As shown, there are three levels of nodes: the first level is the base station (BS), the second level is the aggregation node cluster head (FC), and the third level is the sensor node (SN), where the damaged Nodes include real attack nodes and fake attack nodes in the collusion attack scenario; the robust data aggregation method in this embodiment is described for a single aggregation node cluster head (FC), and the cluster corresponding to the aggregation node cluster head includes n sensors node, the robust data aggregation method against collusion attacks specifically includes the following steps:

[0039] Step 1. Input historical data X={x of m sampling moments of n sensor nodes 1 ,x 2 ,...,x n},...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of wireless sensor networks (WSNs for short), and particularly provides an anti-collusion attack robust data aggregation method, which is used for more effectively overcoming the defects in WSNs data aggregation. According to the method, pseudo attack nodes in collusion attacks can be detected and directly eliminated, so that the pseudo attack nodes are dormant; secondly, a reputation value evaluation method is adopted for a real attack node, and the weight of an unreliable node is reduced; and then iterative filtering processing is carried out on the evaluated sensor node data. Simulation results show that the method provided by the invention reduces the root-mean-square error of result data relative to real data, improves the robustness of a data aggregation method, i.e., improves the collusion attack resistance of WSNs data aggregation, and enables the WSNs data aggregation method to be effectively applied to an actual sensor network.

Description

technical field [0001] The invention belongs to the field of Wireless Sensor Networks (WSNs for short), relates to a technology for realizing secure data aggregation of sensor nodes in a wireless sensor network, and specifically relates to a robust data aggregation method against collusion attacks. Background technique [0002] Wireless sensor networks (WSNs) are widely used in space security monitoring, military science and technology dissemination, ecological environment monitoring, Internet of Things, intelligent transportation systems, disaster warning monitoring, battlefield situation awareness, etc. Civil and military fields have shown broad application prospects. However, WSNs are usually unattended and lack tamper-resistant hardware support. At the same time, due to the openness of wireless channels, vulnerable sensor nodes are very easy to escape the control of the network, and even be captured by attackers, making the data in the entire network face serious securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/122H04W84/18H04L12/24
CPCH04W84/18H04L41/14
Inventor 贺知明郭照人付元华
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA