Unlock instant, AI-driven research and patent intelligence for your innovation.

A Robust Data Aggregation Method Against Collusion Attacks

A data aggregation and anti-collusion technology, applied in network topology, electrical components, safety devices, etc., can solve problems such as inability to eliminate influence, common influence, sensor data reliability evaluation, etc., to prevent the impact of data aggregation and reduce pressure , the effect of small deviation

Active Publication Date: 2022-07-29
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One is the discriminant function of the improved iterative filtering algorithm, such as the improved iterative filter based on the Pearson correlation coefficient in the literature "Zhou YB, Lei T, Zhou T. A robust king algorithm to spamming [J]. EPL, 2011, 94 (4)". The discriminant function of the filtering algorithm; this method can prevent the iterative algorithm from quickly converging to the slope value to a certain extent, but it cannot eliminate the influence of the outliers generated by malicious nodes on the algorithm;
[0005] The other is to evaluate the reliability of sensor nodes before the iterative algorithm, such as the literature "Rezvani M, Ignjatovic A, Bertino E, Jha S.Secure Data Aggregation Technique for WirelessSensor Networks in the Presence of Collusion Attacks[J].IEEE TRANSACTIONS ONDEPENDABLE AND SECUR E COMPUTING, 2015,12(1)” proposes an improved iterative method, which performs maximum likelihood estimation on the data before iteration, and uses the estimated reputation vector as the initial iteration vector, but with malicious nodes The number increases, and the method is inevitably affected by outliers in the random noise scene; another example is the literature "Firoozi F, Zadorozhny VI, Li FY. Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks[J].IEEE SENSORS JOURNAL,2018,18(15)" is based on the subjective logic mechanism, and according to the proposed reputation threshold, the sliding window method is used to eliminate the nodes with large outliers in the sensors, but the remaining sensors are not data reliability evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Robust Data Aggregation Method Against Collusion Attacks
  • A Robust Data Aggregation Method Against Collusion Attacks
  • A Robust Data Aggregation Method Against Collusion Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0038] This embodiment provides a robust data aggregation method against collusion attack, which adopts the WSNs network model such as figure 2 As shown, it includes three levels of nodes: the first level is the base station (BS), the second level is the aggregation node cluster head (FC), and the third level is the sensor node (SN), wherein the damaged sensor node (SN) The nodes include real attack nodes and pseudo-attack nodes in a collusion attack scenario; the robust data aggregation method in this embodiment is described for a single aggregation node cluster head (FC), and the cluster corresponding to the aggregation node cluster head includes n sensors node, the robust data aggregation method against collusion attack specifically includes the following steps:

[0039] Step 1. Input the historical data X={x of m sampling moments of n sens...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of Wireless Sensor Networks (WSNs for short), and specifically provides a robust data aggregation method against collusion attack, which is used to more effectively overcome the defects existing in WSNs data aggregation. The method of the invention can detect and directly eliminate the fake attack nodes in the collusion attack, and make them dormant; secondly, the reputation value evaluation method is adopted for the real attack nodes to reduce the weight of the unreliable nodes; and then the evaluated sensor node data is iterated. filter processing. The simulation results show that the method proposed in the present invention reduces the root mean square error of the result data relative to the real data, improves the robustness of the data aggregation method, that is, improves the anti-collusion attack capability of WSNs data aggregation, so that it can be effectively applied to in the actual sensor network.

Description

technical field [0001] The invention belongs to the field of wireless sensor networks (Wireless Sensor Networks, WSNs for short), and relates to a technology for realizing security data aggregation of sensor nodes in wireless sensor networks, in particular to a robust data aggregation method against collusion attacks. Background technique [0002] Wireless sensor networks (WSNs) are widely used in space security monitoring, military technology dissemination, ecological environment monitoring, Internet of Things, intelligent transportation systems, disaster warning monitoring, battlefield situational awareness, etc. Civil and military fields have shown broad application prospects. However, WSNs are usually unattended and lack tamper-proof hardware support. At the same time, due to the openness of wireless channels, vulnerable sensor nodes are easily out of the control of the network or even captured by attackers, which makes the data in the entire network face serious securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/122H04W84/18H04L41/14
CPCH04W84/18H04L41/14
Inventor 贺知明郭照人付元华
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA