Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Performance feedback intrusion tolerance protocol

A routing protocol and performance technology, applied in the field of routing protocols, can solve problems such as security and less consideration of network QoS performance, and achieve the effect of improving network communication efficiency and reducing energy consumption

Active Publication Date: 2017-02-15
SOUTHEAST UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of these characteristics and requirements of wireless sensor networks, it is necessary to ensure the normal operation of network functions while facing malicious attacks. For this reason, researchers have designed some intrusion-tolerant routing protocols, such as SPINS, SEIF, SEEM, SCMRP, TRANS, INSENS, H-SPREAD, ATSR, TARF, etc., but the existing intrusion-tolerant routing protocols rarely consider the QoS performance of the network when considering security. In order to achieve security, the network performance is usually greatly reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Performance feedback intrusion tolerance protocol
  • Performance feedback intrusion tolerance protocol
  • Performance feedback intrusion tolerance protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] This embodiment discloses an intrusion-tolerant routing protocol PFITP based on performance feedback. The premise of the protocol is: firstly, routes should be clustered within a safe time, and the specific route clustering process is as follows:

[0044] (1) During the safe time, the base station will broadcast once: BS→*:Broad||ID BS , Broad indicates that the packet type is a broadcast packet, ID BS Indicates that the broadcast packet is from the base station. The node returns a response packet after receiving the broadcast packet: *→BS:RPT||RSSI||ID BS ||ID RPT , PRT indicates that the packet type is a response packet of broadcast data, ID RPT Indicates the node number that responds to the broadcast signal, and RSSI indicates the strength of the base station signal received by the responding node. The base station records the nodes that give response data packets, these nodes can be regarded as candidate cluster head nodes, and 10% of them can be taken as cluste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a performance feedback intrusion tolerance protocol (PFITP). The protocol is suitable for a wireless sensor network, and mainly comprises a performance feedback mechanism, a network performance estimation, abnormal node marking, cluster-head reselection, and node authentication. The protocol can estimate the network QoS performance, mark the abnormal nodes, select reliable nodes as the cluster head, ensure that the wireless sensor network can resist to common hostile attack and provide a good network performance.

Description

technical field [0001] The invention relates to a routing protocol, in particular to an intrusion-tolerant routing protocol based on performance feedback. Background technique [0002] Sensor nodes in wireless sensor networks are usually limited in hardware resources and size, resulting in limited computing power and storage capacity, and limited power supply endurance; sensor nodes are usually large in number, widely distributed, and usually have no protection measures, so they are easy to be captured. Vulnerable to malicious attacks; sensor nodes usually communicate wirelessly with limited communication capabilities, requiring the network to have a certain fault tolerance. Whether the wireless sensor network is safe and whether it can guarantee the security objectives of the network such as confidentiality, integrity, reliability and freshness is an urgent problem to be considered. [0003] In view of these characteristics and requirements of wireless sensor networks, it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W40/04H04W40/10H04W40/32H04W52/02H04L29/06H04W12/122
CPCH04L63/1441H04W12/06H04W40/04H04W40/10H04W40/32H04W52/0209Y02D30/70
Inventor 黄杰李凡曹山山倪广源许金乐卫锦朱仟闵溪青万弃寒张云龙
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products