Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

71 results about "Sybil attack" patented technology

In a Sybil attack, the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".

Auxiliary driving vehicle gateway for multi-CPU hard isolation of intelligent interconnection

The invention discloses an auxiliary driving vehicle gateway for multi-CPU hard isolation of intelligent interconnection. The auxiliary driving vehicle gateway comprises a vehicle security communication system and a vehicle information analysis and control system, wherein the vehicle security communication system comprises a vehicle gateway double-wireless network card structure composed of an inter-vehicle wireless communication module and a vehicle domain wireless communication module, and a vehicle owner mobile terminal, and the vehicle security communication system carries out CPU control by an I.MX6Q processor; and the vehicle information analysis and control system carries out CPU control by an Exynos4412 processor, and comprises a driving route identification module, a driving behavior analysis module, a vehicle information collection module and an intelligent vehicle controller. The auxiliary driving vehicle gateway disclosed by the invention can realize the communication security of the vehicle gateway, realize driving security by driver fatigue state analysis based on Opencv face recognition and driving route recognition and analysis, as well as effectively resisting against Sybil attack and other various types of attacks from a hardware level to prevent hackers from invading the vehicle gateway to obtain vehicle information and controlling the vehicle.
Owner:JIANGSU UNIV

Block synchronization method and system

The invention discloses a block synchronization method and a block synchronization system. A part of normal nodes in a block chain network become snapshoot nodes by the way of mortgaging digital currency, the snapshoot nodes perform snapshoot treatment on transaction information in a plurality of blocks in a snapshoot area, so that the snapshoot information of the blocks is acquired, and the snapshoot information is signed to acquire corresponding signature information; a newly added node acquires snapshoot information and corresponding signature information from the snapshoot nodes, verifiesthe signature information and the snapshoot information; if the verification is passed, and the quantity of the same snapshoot information is more than a certain number, the block is downloaded from the preset node, the snapshoot information passing the verification is used for verifying the downloaded block; if the verification is passed, the downloaded block is added into a block chain transcript of the node, so that the block synchronization security is enhanced, the problem that the false block is synchronized due to the inexistence of a credible node list used for generating the snapshootinformation is avoided, and the risk of suffering a Sybil attack is reduced.
Owner:JIANGSU PAYEGIS TECH CO LTD +1

Real-time map updating system and method based on trust management, and Internet-of-vehicles terminal

The invention belongs to the technical field of real-time map updating, and discloses a real-time map updating system and method based on trust management and an Internet-of-vehicles terminal. A vehicle is registered in a law enforcement agency, and identity information is reserved in the law enforcement agency; the vehicle sends a request for updating the own public key to a law enforcement agency; road condition information is collected, and a vehicle accurately uploads surrounding road conditions to fog nodes to improve trust values; meanwhile, the fog node needs to carry out identity verification on the vehicle before receiving the message from the vehicle; the fog node verifies the road condition information uploaded by the vehicle by using a Bayesian inference model, and sends the road condition information to a real-time map updating server according to a verification result; the fog node generates a corresponding rating for each message source vehicle, so that the timeliness and the accuracy of map updating are realized; when the trust value of the vehicle is lower than the preset threshold value, the vehicle cannot continue to enjoy the service provided by real-time map updating, and Sybil attacks are avoided.
Owner:XIAN UNIV OF POSTS & TELECOMM

Internet-of-Vehicles intrusion detection system based on hidden Markov model

The invention belongs to the field of intrusion detection algorithms in the Internet of Vehicles, and particularly relates to an Internet-of-Vehicles intrusion detection system based on a hidden Markov model. The system is used for intrusion detection of a False alert attack, a Sybil attack, a Black hole attack and a DoS attack in the Internet of Vehicles. The system mainly comprises a pre-detection module, a DNN-based detection center module, an updating module used for recording a vehicle state and generating a hidden Markov model, and a response center module used for generating a responsesignal, and under the normal operation state of the Internet of Vehicles, the modules jointly guarantee efficient operation of the Internet of Vehicles. Under the attack detection state, the components supplement each other to jointly complete an attack monitoring defense process. Compared with the DNN-based IDS, the Internet-of-Vehicles intrusion detection system has the advantages that the detection precision, overhead and detection time are improved, the detection precision is higher, the average detection time is far shorter than that of an IDS based on DNN, meanwhile, the expenditure is lower, compared with an IDS using state switching, the expenditure of a pre-detection mechanism used in the method is lower, and more computing resources are saved.
Owner:NORTHEASTERN UNIV

Malicious node physical layer detection method and system based on automatic labeling and learning

InactiveCN110995721AImprove malicious node detection rateSolve the problem of malicious node detectionTransmissionCommunications securityAlgorithm
The invention relates to the technical field of communication safety, and discloses a malicious node physical layer detection method and detection system based on automatic labeling and learning. According to the detection method, the type of an access node in a network is identified based on a physical layer authentication strategy of channel difference, and malicious nodes initiating clone attacks and Sybil attacks can be detected at the same time; corresponding labels are automatically injected according to the types of the access nodes, so that the problem of manually injecting attack labels is solved, and the difficulty of lacking attack label samples when a supervised machine learning algorithm is used for channel authentication is solved; attack label samples are automatically injected by utilizing physical layer channel difference and setting a threshold method, and an offline label sample set is provided for a machine learning algorithm, so that automatic label injection and learning are realized, and the malicious node detection rate of an access node is improved. According to the method, the problem that the edge calculation node detects malicious nodes of various industrial wireless devices in an asymmetric scene of the industrial edge calculation Internet of Things can be effectively solved.
Owner:SHENZHEN POWER SUPPLY BUREAU +1

Low-altitude node identity authentication and privacy protection method based on Hash chain

The present invention discloses a low-altitude node identity authentication and privacy protection method based on a Hash chain. The method comprises the steps of: when a vehicle node enters a space-air-ground integral network at the first time, taking unique and undeniable wireless signal fingerprints which cannot be cloned as identity features of the vehicle node, and creating a Hash block for the vehicle node while performing identity registration of the vehicle node by an authentication center; when communication of the vehicle node is performed in an area, performing identity authentication based on block content by a management node; in order to protect the identity privacy, employing a pseudonym generated by the management node to perform communication by the vehicle node; and recording key motions or information of different nodes at different time in the area by the management node, and recording the key motions or the information of the vehicle node itself at different areasat different time by the vehicle node. The method can effectively defense various attacks such as the sybil attack, the denial of service attack and the replay attack. Besides, the data safety of thenetwork is guaranteed, namely, the confidentiality, integrity, availability and non-repudiation of the data in the network.
Owner:XIAMEN UNIV

Internet of Vehicles Sybil attack detection method, device and apparatus and storage medium

The invention relates to the technical field of Internet of Vehicles, and discloses an Internet of Vehicles Sybil attack detection method, device and apparatus and a storage medium, and the method comprises the steps: obtaining the state information of a target vehicle, building a physical feature model according to the state information, obtaining the movement track of the target vehicle, carrying out the similarity analysis according to the movement track of the target vehicle, obtaining similarity feature vectors according to a preset similarity detection model, inputting the similarity feature vectors into a movement behavior detection model obtained through training to obtain similarity feature vectors with close distances, and taking vehicles corresponding to the similarity feature vectors with close distances as malicious vehicles attacked by Sybil. The physical feature model completely records the driving track of the target vehicle, the similarity feature vectors with close distances are obtained through the moving behavior detection model, the detection accuracy is improved, malicious vehicles with Sybil attacks are detected, the technical problem that whether Sybil attacks exist in Internet of Vehicles applications or not cannot be detected in the prior art is solved, and the security of Internet of Vehicles is improved.
Owner:ANHUI JIANGHUAI AUTOMOBILE GRP CORP LTD

Detection method for Sybil attack of wireless network based on channel state characteristics

The invention discloses a detection method for a Sybil attack of a wireless network based on channel state characteristics. The method comprises the following steps of (1) collecting signal state characteristic information of each client by a central detection AP, eliminating a phase deviation and a time deviation in the channel state characteristics by utilizing a self-adaptive MUSIC algorithm, meanwhile, computing an angle of arrival of a sight distance route by applying a spatial smoothing MUSIC algorithm through a receiving phase, and distinguishing angle signals transmitted by different APs by comparing different RSSI values; (2) detecting the Sybil attack and a Sybil node through combination of the angle of arrival and the signal strength, and distinguishing whether the node is underthe Sybil attack or not through comparison with the actual sending angle of arrival (AoA) and the RSSI; and (3 ) constructing a Sybil attack detection model system, carrying out experiments on the APand mobile equipment at different angles, meanwhile, computing the angle and carrying out simulation experiment on the Sybil attack, and detecting the Sybil node and the Sybil attack. According to the method, the Sybil node and the Sybil attack in the wireless network can be accurately detected, and the detection efficiency is 98%.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Sybil attack node detection method and device considering sensor errors

The invention discloses a Sybil attack node detection method and device considering sensor errors, relates to the technical field of vehicle-mounted network security, and solves the technical problemthat the detection of a Sybil attack node by a vehicle-mounted network is not accurate enough. The main points of the technical scheme of the invention are that the method comprises the steps that aninformation acquisition device receives a CAM message broadcast by a neighbor node; a pre-detection device fuses sensor errors to judge the rationality of the vehicle node communication range; a preprocessing device performs filtering optimization processing on a node RSSI sequence with a reasonable communication range by using Gaussian filtering; a detection device uses a DTW algorithm to measurethe spatial difference and the time difference between a node RSSI sequence and a moving sequence so as to discover Sybil nodes in neighbor nodes. While malicious behaviors in the vehicle-mounted adhoc network are detected in real time, inherent physical acquisition errors of the sensor are considered, and the rationality of the detection process is improved; the calculation load of the DTW detection algorithm is greatly reduced, and the detection time is shortened.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products