Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A detection method and device for a compromised node in a wireless sensor network

A technology of wireless sensors and detection methods, applied in the field of the Internet of Things, can solve problems such as hazards, difficult detection of compromised nodes, and inability to distinguish the real situation

Active Publication Date: 2022-02-01
CHANGSHA UNIVERSITY
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the existing false data halfway filtering scheme, there will be false false data packet loss attack. The false false data packet loss attack refers to the compromise node directly discarding the data packet in the process of halfway filtering, and falsely claiming that it is because of the detection If there is a verification code in the data packet that does not match its corresponding key index, the data packet will be discarded. Since the previous hop node may not be able to distinguish the real situation, it will not be able to deal with the packet loss attack of fictitious false data packets, thus launching false fictitious data packets Compromised nodes for packet loss attacks are extremely harmful because they are difficult to detect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method and device for a compromised node in a wireless sensor network
  • A detection method and device for a compromised node in a wireless sensor network
  • A detection method and device for a compromised node in a wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0057] The method and device for detecting compromised nodes in the wireless sensor network proposed by the embodiments of the present invention analyze and process the false packet loss attack of the compromised node in the forwarding process of the SEF model data packet, and propose a trapping mechanism on the way. It provides opportunities to induce compromised nodes to make mistakes, can effectively differentiate compromised nodes and normal nodes, and detect compromised nodes in wireless sensor networks based on differentiated compromised nodes and normal nodes, and can detect compromised nodes that launch fictitious false packet loss attacks If it is detected, it indirectly solves the packet loss attack of fictitious false data packets.

[0058] In order ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a detection method for a compromised node in a wireless sensor network. It analyzes and processes the fictitious false data packet loss attack of the compromised node in the forwarding process of the SEF model data packet, and proposes a trapping mechanism on the way. The opportunity for compromised nodes to make mistakes can effectively differentiate compromised nodes and normal nodes, and detect compromised nodes in wireless sensor networks based on differentiated compromised nodes and normal nodes, and can detect compromised nodes that launch fictitious false packet loss attacks, Indirectly solves the false packet loss attack. In addition, the invention also relates to a detection device for a compromised node in a wireless sensor network.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a method and device for detecting compromised nodes in a wireless sensor network. Background technique [0002] Wireless sensor network is an effective tool for remote environmental monitoring, which is suitable for the following scenarios, such as battlefield monitoring, forest fire monitoring, etc. A large number of sensor nodes are randomly deployed in or near the monitoring area, and the monitored data is transmitted to the remote sink node hop by hop through the ad hoc network. [0003] Generally speaking, sensor nodes are easy targets for attackers due to their limited energy, poor processing power, and lack of tamper-resistant devices. Once a node is captured by the attacker, all the information stored on the node will also be exposed. The attacker can easily implement false data injection attacks and tampering data packet attacks through these compromised ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08H04W12/04
CPCH04L63/1433H04L9/0643H04L9/0819H04W12/04H04L2209/805
Inventor 王江涛尹辉刘志雄
Owner CHANGSHA UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products