Method for defending black hole attack based on active detection in wireless sensor network

A wireless sensor, black hole attack technology, applied in the field of black hole attack defense, can solve the problems of low black hole attack resistance, short network life, unclear node trust, etc., to improve energy efficiency, improve security, and improve network safe effect

Inactive Publication Date: 2016-05-25
CENT SOUTH UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a method for resisting black hole attacks based on active detection in a wirele...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for defending black hole attack based on active detection in wireless sensor network
  • Method for defending black hole attack based on active detection in wireless sensor network
  • Method for defending black hole attack based on active detection in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with examples and accompanying drawings.

[0033] A method for resisting black hole attacks based on active detection in wireless sensor networks, such as figure 1 As shown in , different numbers of detection routes are generated according to the energy abundance of the sensor network;

[0034] Initiate more detection routes for areas with more residual energy, and initiate fewer detection routes for areas with less residual energy, and do not initiate detection routes for areas near the base station with no energy remaining;

[0035]In the process of detecting routing, the node records whether it has been attacked by a black hole, and if it has been attacked by a black hole, its trust degree will be reduced, and the trust degree of the successful routing node will be increased;

[0036] During data routing, when a node looks for the next hop, it selects a node with a high degree of trust as the next ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for defending a black hole attack based on active detection in a wireless sensor network. A plurality of detection routes are established in a region in which network energy is abundant and the wireless sensor network is far away from a base station, and an attacker being unaware that the established routes are the detection routes also launches an attack to the detection routes, so that the attacker is exposed, and behavior and position information of the attacker and credibility information of a node can be obtained. After the information is obtained, the region which is under the black hole attack can be avoided when real data routing is performed, so that information of a black hole can be obtained under the condition that sensitive data of a system are unavailable or few data are lost, and data routing security of the wireless sensor network is ensured. Residual energy of a network is fully utilized, and the network service life is not shortened under the condition of enhancing the network security.

Description

technical field [0001] The invention belongs to the field of wireless sensor network security, in particular to a method for resisting black hole attacks based on active detection in a wireless sensor network. Background technique [0002] A wireless sensor network is a wireless network composed of a large number of sensor nodes that communicate with each other through multi-hop wireless links and in a self-organizing and multi-hop manner. It can be widely used in industrial monitoring, agriculture, civil, environmental monitoring, battlefield , ocean, fire and other special environments and applications, it is considered to be one of the key basic technologies of the future important IoT network. The security of wireless sensor networks is an important research topic. Among them, the black hole avoidance problem is an important mechanism for ensuring security in wireless sensor networks, and its research is of great significance. [0003] Black hole attack is one of the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04L29/06H04W12/122
CPCH04L63/1425H04W12/12
Inventor 刘安丰刘语欣江良珊刘潇
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products