Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network security routing protocol based on adaptive trust mechanism

A wireless sensor and network security technology, applied in security devices, network topology, wireless communication, etc., can solve problems such as low energy consumption

Active Publication Date: 2021-06-29
CHANGCHUN UNIV OF TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to improve the ability to deal with network routing attacks while ensuring less energy consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network security routing protocol based on adaptive trust mechanism
  • Wireless sensor network security routing protocol based on adaptive trust mechanism
  • Wireless sensor network security routing protocol based on adaptive trust mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be further described in detail below in conjunction with the accompanying drawings, a wireless sensor network security routing protocol based on an adaptive trust mechanism, including: a trust model and a security routing based on trusted nodes. The trust model of the wireless sensor network security routing protocol based on the adaptive trust mechanism is mainly composed of three kinds of trust, namely direct trust, indirect trust, energy trust and comprehensive trust.

[0012] The direct trust is that node i evaluates the trust degree of node j. The direct trust value of node i to node j is expressed as follows:

[0013] (1)

[0014] in On behalf of node i, evaluate the historical trust value of node j after volatilization. The role of is to further limit the role of historical trust values ​​in the trust model. Node j may have high trust before being caught as a malicious node. Therefore, in order to speed up the reduction of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Due to the characteristics of resource limitation and dynamic change of sensor nodes, a wireless sensor network (WSN) faces the problems of safety and energy consumption. The invention provides a wireless sensor network security routing protocol based on a self-adaptive trust mechanism, the protocol only needs to calculate a direct trust value, and an indirect trust value is completed by a base station, so that the energy consumption of the node is reduced. A punishment mechanism is adopted when the nodes calculate the trust values so as to ensure that the trust values of malicious nodes are quickly reduced. Therefore, black hole attacks, selective forwarding attacks, slot attacks and flooding attacks are resisted. A monitoring node is established, and an active security route is selected by a base station and is responsible for resisting wormhole attacks. Therefore, malicious nodes can be quickly identified and isolated.

Description

technical field [0001] The invention relates to a routing security of a wireless sensor network, in particular to a wireless sensor network security routing protocol based on an adaptive trust mechanism. Background technique [0002] With the rapid development of the Internet of Things, wireless sensor networks are more and more widely used in military, environmental monitoring, medical, industrial production, traffic control and other fields. Wireless sensor networks have independent sensors scattered throughout the network, which can directly adapt to harsh environments and monitor environmental conditions such as noise, temperature, pressure, humidity, etc. So wireless sensor networks may suffer from various routing attacks. Applied cryptography is one of the most common solutions to ensure the security of wireless sensor networks. But it cannot face routing attacks from within the network. Most of the time, sensor nodes use energy when distributing, receiving, or tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/60H04W12/12H04W40/24H04W84/18
CPCH04W40/246H04W84/18Y02D30/70
Inventor 胡黄水韩优佳姚美琴
Owner CHANGCHUN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products