Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

S-MAC (Sensor-Media Access Control)-based defense method for sleep attack rejection in wireless sensor network

A wireless sensor and network technology, applied in network topology, wireless communication, transmission system, etc., can solve problems such as low-cost defense methods, and achieve the effect of resisting attacks, simple identification rules, and energy saving

Inactive Publication Date: 2012-01-18
GUILIN UNIV OF ELECTRONIC TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker not only masters the knowledge and loopholes of the protocol, but also has the ability to penetrate the network, the damage of this attack is quite serious. At present, there is no specific, effective and low-cost defense method for this type of attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • S-MAC (Sensor-Media Access Control)-based defense method for sleep attack rejection in wireless sensor network
  • S-MAC (Sensor-Media Access Control)-based defense method for sleep attack rejection in wireless sensor network
  • S-MAC (Sensor-Media Access Control)-based defense method for sleep attack rejection in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific implementation examples of the S-MAC-based defense method against dormancy attacks in the wireless sensor network will be described below with reference to the accompanying drawings.

[0037] figure 1 is an experimental topology for simulating defensive attack methods. Use the ns2 simulation software to simulate the denial of dormancy attack in this example. Among them, n4 is the attack node, and n1 is the attacked node. The data flow is from n1 to n3, the simulation time is 100s, and the data packets are sent from 40s. The routing protocol adopts AODV. When attacking, n4 uses a protocol modified based on S-MAC, named A-MAC, and other nodes use standard S-MAC modules. The initial energy of the nodes is 1000 joules.

[0038] Utilizing the loopholes of the S-MAC protocol, n4 can continuously postpone the moment when the target node enters the dormant state by periodically sending forged synchronization packets until its energy is exhausted. The principl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an S-MAC (Sensor-Media Access Control)-based defense method for sleep attack rejection in a wireless sensor network, wherein a node of a WSN (Wireless Sensor Network) authenticates a received synchronous capsule at a MAC (Media Access Control) layer so as to check whether the synchronous capsule is a normal synchronous capsule or not, if so, the sleep scheduling of the node is updated according to an S-MAC rule, and if not, the received synchronous capsule is rejected. After the defense method is applied to a network S-MAC (Sensor-Media Access Control) protocol, defense can be implemented. The S-MAC-based defense method comprises the concrete steps of: firstly, determining a maximum value TB and a minimum value TS of a sleep time domain in the normal synchronous capsule, judging that the synchronous capsule is normal when the received synchronous capsule meets the conditions that Ti is not smaller than TS and not more than TB, or else, discarding the synchronous capsule as an abnormal synchronous capsule. TS refers to a difference between a time interval Tdata for the node, determined by the WSN, to process data and a time interval TSYN for the node to process the synchronous capsule, and TB is the sum of the two time intervals. After the defense method is applied to the S-MAC protocol of the WSN, automatic defense can be implemented automatically. The defense method disclosed by the invention is simple in authentication rules and low in energy consumption, and can be used for effectively defending attacks and saving energy according to S-MAC without direction operation of a user.

Description

(1) Technical field [0001] The invention relates to the security technology of the medium access control layer (MAC layer, MAC is the abbreviation of Media Access Control) of the wireless sensor network (WSN), in particular to the defense method of denying dormancy attack initiated based on the S-MAC protocol in the wireless sensor network. (2) Background technology [0002] Wireless sensor network (WSN) technology is a new type of wireless network technology. Its low cost and flexible deployment characteristics make it have broad application prospects in military, environmental monitoring, medical treatment, intelligent buildings and other fields. The focus of domestic and foreign research. But WSN also faces a big problem, that is, limited energy. The nodes of WSN are usually powered by batteries. Once the battery energy is exhausted, it means that the nodes will fail. This problem has brought great challenges to researchers, and also brought new threats to the security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W84/18
CPCY02B60/50Y02D30/70
Inventor 叶进宋晓燕
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products