Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Interference identification method based on least square method and applicable to wireless sensor network

A least square method and wireless sensor technology, applied in the field of interference attack detection, can solve problems affecting network performance, affecting data transmission, and not mentioning the implementation method

Active Publication Date: 2015-05-27
UNIV OF SCI & TECH BEIJING
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Malicious jamming attacks have different motives from environmental jamming. Attackers often use Wi-Fi, Bluetooth, or use the same device as the communication node to actively send jamming signals to the target network, affecting network performance.
Although WIA-PA uses mechanisms such as adaptive frequency hopping to defend against interference, active attackers can still launch interference attacks if they master the sequence of frequency hopping, affecting data transmission in the WIA-PA network, so it is suitable for the detection mechanism of this sensor network Very necessary
[0004] In Wenyuan Xu's paper The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, the detection method for interference is mentioned, using the signal strength consistency detection method, but the specific implementation method is not mentioned.
[0005] In Sun Yanqiang's article on interference attacks in wireless networks, the method of using the signal strength consistency detection scheme to detect interference attacks is also mentioned, but the specific implementation method is also not mentioned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interference identification method based on least square method and applicable to wireless sensor network
  • Interference identification method based on least square method and applicable to wireless sensor network
  • Interference identification method based on least square method and applicable to wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] figure 1 Among them, 101 is an interference attack detection module, and 102 is a data collection module. After the data collection module completes the data collection, the data is handed over to the 103 data analysis module for analysis. After the data analysis is completed, the 104 attack determination module will carry out the final analysis of the interference attack. judge.

[0027] figure 2 201 is the data analysis module, and 202 is based on the sigmoid function Preliminary fitting is performed on the collected data, and subsequent received data is 203 to judge whether the function needs to be adjusted, and use the least square method to adjust the parameters of the fitted curve, that is, adjust the values ​​of a and b. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an interference attack identification method based on the least square method and applicable to a wireless sensor network. Due to the openness of the wireless media of the sensor network, communication of the sensor network is highly subject to any objective or subjective interference, and the performance of the network is impacted. Generally, the sensor network adopts measures such as frequency hopping according to the condition of a channel to avoid damage of interference. But the poor quality of the channel is not necessarily caused by interference, and also can be caused by own reasons of a node. Therefore, if the node can identify interference and non-interference, the node can perform correct processing choice more conveniently by self, and unnecessary energy consumption is avoided. The interference attack identification method is based on the least square method, and detects interference attack according to the characteristics of a sigmoid function, so that the detection rate is improved, and the power consumption is reduced.

Description

technical field [0001] The invention relates to the field of wireless sensor network security, and mainly aims at the security requirements in resource-limited wireless sensor networks, designs a detection method suitable for interference attacks, makes it as simple and effective as possible, and reduces resource consumption. Background technique [0002] Due to the openness of its wireless medium, the communication of sensor network is easily subject to various objective or subjective interferences, which will affect the performance of the network. Jamming attacks can be divided into two situations: environmental interference and malicious interference. The interference source sends out a signal that happens to be in the same frequency band as the target network, covering the original signal and hindering the normal communication of the network. The present invention is mainly based on the WIA-PA sensor network, which operates in the 2.4GHz frequency band and includes 16 ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/12H04W12/122
CPCH04L63/1416H04W12/12Y02D30/70
Inventor 齐悦黎宇飞万亚东王沁
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products