Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for acquiring node trust value based on detection route in energy harvesting wireless sensor network to avoid black hole node attack

A wireless sensor and energy harvesting technology, applied in wireless communication, network topology, transmission system, etc., can solve the problems of uncertain node trust value, unavoidable black hole node attack, and low energy utilization rate.

Inactive Publication Date: 2021-06-04
CENT SOUTH UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention provides a method for avoiding black hole nodes based on probing routes to obtain node trust values ​​in energy harvesting wireless sensor networks. The number of trust values ​​of nodes that can be obtained within the node transmission radius, and a calculation method for node trust values ​​are proposed to overcome the inability to avoid black holes caused by the low energy utilization rate and uncertain node trust values ​​in energy harvesting wireless sensor networks in the prior art The Problem with Node Attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for acquiring node trust value based on detection route in energy harvesting wireless sensor network to avoid black hole node attack
  • Method for acquiring node trust value based on detection route in energy harvesting wireless sensor network to avoid black hole node attack
  • Method for acquiring node trust value based on detection route in energy harvesting wireless sensor network to avoid black hole node attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with specific examples and accompanying drawings.

[0030] A method for avoiding black hole node attacks based on probing routes to obtain node trust values ​​in energy harvesting wireless sensor networks, such as figure 1 As shown, it is mainly composed of the following three core parts (1) data routing for data packet transmission dynamically adjusted with the available energy (2) detection routing and feedback packet backtracking routing for locating black hole nodes carrying a small amount of data ( 3) The node trust value calculation used to guide the transmission of the next data route to improve the routing success rate.

[0031] figure 1 The middle blue solid line represents the detection route, and the purple dotted line represents the detection feedback packet route. If the current node sends a detection packet to the next node, but does not receive a feedback packet from the next node, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for acquiring a node trust value based on a detection route in an energy harvesting wireless sensor network to avoid black hole node attack. In the energy harvesting wireless sensor network, the energy of the nodes, in addition to meeting the data routing energy required for transmitting data packets among the nodes, remains. According to the method, the residual energy of the nodes can be fully utilized, and the detection route is established among the nodes in the network. Establishment of the detection route comprises sending a detection packet and receiving a feedback packet, and because a black hole node cannot correctly distinguish a data packet and the detection packet, malicious packet loss behaviors occur in the transmission process of the detection route, and position information of the detection route is exposed. According to the position information of the black hole node acquired by the detection route, the credibility of the malicious node is reduced, so that the node with higher credibility is selected to transmit the data packet in the transmission process of the next-hop data route. Through calculation of the node trust value, black hole nodes can be effectively avoided, and the data routing success rate of the network is improved. The residual energy of the nodes is fully utilized, and the energy utilization rate of the network is improved.

Description

technical field [0001] The invention belongs to the field of wireless sensor network security, and in particular relates to a method for obtaining node trust values ​​based on detection routes in an energy harvesting wireless sensor network so as to effectively avoid black hole node attacks. Background technique [0002] Ubiquitous sensor devices (e.g., sensor nodes, wearable sensing devices, smartphones) play a vital role in the development of the Internet of Things, bridging the gap between digital and physical spaces. However, the energy problem of sensor terminals poses a great challenge to the wide application of IoT. Therefore, the sustainable development of the Internet of Things has attracted extensive attention from academia and industry. Energy harvesting wireless sensor networks are proposed as an effective means to solve this problem. The security issue has always been one of the key technologies in the development and application of sensor networks. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/122H04W12/60H04W40/10H04L29/06H04W84/18
CPCH04W12/009H04L63/1458H04W40/10H04W84/18
Inventor 王晋湘刘安丰
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products