A detection method for Internet of Things packet drop attack and Internet of Things tree system

A tree-shaped system and detection method technology, applied in the field of communication, can solve problems such as increasing communication overhead

Active Publication Date: 2016-06-15
INST OF MICROELECTRONICS CHINESE ACAD OF SCI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The handshake mechanism method does not require additional hardware overhead, but because the intermediate routing node and the terminal node are required to return the handshake information when receiving the packet, this method will increase additional communication overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method for Internet of Things packet drop attack and Internet of Things tree system
  • A detection method for Internet of Things packet drop attack and Internet of Things tree system
  • A detection method for Internet of Things packet drop attack and Internet of Things tree system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Natural packet loss rate: Defined in the normal operation of an IoT tree system, the probability of packet loss caused by the node's own capabilities, channel characteristics, information interaction methods, and the external environment rather than external or internal attacks is called natural packet loss rate. Packet loss rate. In a normal system, the default natural packet loss rate should be the default operating environment, and the packet loss rate will not affect the performance of the entire system. The natural packet loss rate in the present invention is represented by P.

[0029] In the solution of the present invention, the attacker of the packet discarding attack can obtain the communication key in the network, and can make the captured node actively select the packet sent downstream, and discard the packet with a certain probability according to the Gaussian random function. The discarding process Without distinguishing the source of the data packet, that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a detection method for a malicious packet dropping attack of the Internet of things. The detection method comprises the following steps of: calculating a natural packet receiving interval variance and calculating an actual packet receiving interval variance; and judging whether the actual packet receiving interval variance is larger than a first threshold obtained according to the natural packet receiving interval variance, if the actual packet receiving interval variance is larger than the first threshold, determining that an Internet of things tree system falls into the malicious packet dropping attack. In a conclusion, according to the Internet of things tree system, the natural packet receiving interval variance obtained when the Internet of things tree system does not fall into the attack and the actual packet receiving interval variance obtained when an information packet is actually received are respectively calculated; and when the actual packet receiving interval variance is larger than the first threshold obtained according to the natural packet receiving interval variance, the Internet of things tree system falls into the malicious packet dropping attack. Therefore, according to the technical scheme of the invention, a routing node and a terminal node do not need to return acknowledgement information, so that communication expense in the Internet of things tree system cannot be extra affected. The invention also provides the Internet of things tree system.

Description

technical field [0001] The invention relates to the field of communications, in particular to a method for detecting packet discarding attacks in the Internet of Things and a tree-shaped system for the Internet of Things. Background technique [0002] The Internet of Things refers to the use of radio frequency identification (RFID), infrared sensors, global positioning systems, laser scanners and other information sensing equipment to connect items to the Internet according to the agreed protocol to exchange and communicate information to realize the realization of the items. A network that intelligently identifies, locates, tracks, monitors and manages. In fact, IoT is a type of wireless network. Unlike wired networks and other wireless networks, IoT has limited energy, storage, and bandwidth, lacks central detection and management nodes, open communication media, huge number of nodes, lack of clear network defense boundaries, etc. All these characteristics All make the I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李莹陈岚
Owner INST OF MICROELECTRONICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products