Safety time synchronization method based on node identity recognition

A security time and identity recognition technology, applied in synchronization devices, security devices, network topology, etc., can solve problems such as failure to defend against witch attacks, loss of synchronization, etc., to reduce packet overhead, reduce communication energy consumption, and avoid channel collisions. Effect

Active Publication Date: 2021-07-02
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing secure time synchronization mechanism against information manipulation attacks cannot prevent Sybil attacks, because legitimate nodes may be disguise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety time synchronization method based on node identity recognition
  • Safety time synchronization method based on node identity recognition
  • Safety time synchronization method based on node identity recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] The invention utilizes the uniqueness of the relative clock slope of the sensor node to check and filter the abnormal information, then executes the corresponding synchronization algorithm by using legal information, and broadcasts the current clock state information, finally realizing the time synchronization of the whole network. The traditional secure time synchronization method based on information encryption and authentication cannot compensate cloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wireless network communication technology, in particular to a safety time synchronization method based on node identity recognition. According to the method, the uniqueness of the relative clock slope of a sensor node is utilized to check and filter abnormal information, then valid information is utilized to execute a corresponding synchronization algorithm, the current clock state information is broadcasted, and finally the time synchronization of the whole network is realized. A traditional safety time synchronization method based on information encryption and authentication cannot compensate for clock skew and slope at the same time, and additional safety protocol overhead is brought. A safety time synchronization method based on threshold detection cannot defend Sybil attacks with disguised node identities. According to the method, the abnormal information is screened by utilizing the uniqueness of the node clock slope, and the problem of safety time synchronization under the sybil attack is solved on the premise of not introducing safety protocol overhead.

Description

technical field [0001] The invention relates to the field of wireless network communication, in particular to a secure time synchronization method based on node identity identification. Background technique [0002] The current research on the time synchronization mechanism of wireless sensor networks is mainly to meet the traditional requirements of high precision, low power consumption, fast convergence and robustness. However, the security problem of wireless sensor network is also a problem that cannot be ignored. Since sensor nodes are usually deployed in unattended factories and communicate with each other wirelessly, industrial wireless sensor networks are vulnerable to security threats aimed at the physical nodes themselves and the communication links. For time synchronization, these security threats will cause the network to generate illegal time information. Obviously, when the nodes use these illegal time information to update the local clock, it will cause the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/122H04W56/00H04W84/18
CPCH04W12/009H04W56/001H04W84/18
Inventor 刘金娣李栋俞雪婷李志博杨明王照伟曾鹏于海斌
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products