CN113497808B - Distributed power monitoring system network clustering routing wormhole attack identification method - Google Patents
Distributed power monitoring system network clustering routing wormhole attack identification method Download PDFInfo
- Publication number
- CN113497808B CN113497808B CN202111029581.8A CN202111029581A CN113497808B CN 113497808 B CN113497808 B CN 113497808B CN 202111029581 A CN202111029581 A CN 202111029581A CN 113497808 B CN113497808 B CN 113497808B
- Authority
- CN
- China
- Prior art keywords
- cluster
- nodes
- node
- cluster head
- wormhole
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012544 monitoring process Methods 0.000 title claims abstract description 15
- 241000854291 Dianthus carthusianorum Species 0.000 claims abstract description 136
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000005265 energy consumption Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及网络信息安全技术领域,具体涉及一种基于节点密度的分布式电力监控系统网络分簇路由虫洞攻击识别方法。The invention relates to the technical field of network information security, in particular to a node density-based distributed power monitoring system network cluster routing wormhole attack identification method.
背景技术Background technique
目前,虫洞攻击是分布式电力监控系统网络常见路由攻击之一,可降低网络中各数据的可信度,改变网络的拓扑结构。在分布式电力监控系统网络分簇路由协议中,簇内节点负责收集数据并发送给簇头节点,簇头节点负责管理控制簇内成员节点,进行数据融合以及簇间转发等工作。如果网络存在虫洞攻击节点,将导致受攻击簇内信息混乱,致使网络发生错误。采用虫洞攻击识别方法判别是否存在虫洞攻击节点是保障网络信息安全传输的关键因素之一。At present, wormhole attack is one of the common routing attacks in distributed power monitoring system network, which can reduce the credibility of each data in the network and change the topology of the network. In the distributed power monitoring system network clustering routing protocol, the nodes in the cluster are responsible for collecting data and sending it to the cluster head node, and the cluster head node is responsible for managing and controlling the member nodes in the cluster, performing data fusion and inter-cluster forwarding. If there are wormhole attack nodes in the network, the information in the attacked cluster will be confused, resulting in network errors. Using the wormhole attack identification method to determine whether there is a wormhole attack node is one of the key factors to ensure the safe transmission of network information.
传统的虫洞攻击识别方法为了对各节点进行准确判别,有效识别攻击节点,均采用布置锚节点,获取两通信节点间跳数,计算平均每跳距离并与节点最大通信半径进行比较,将超出最大通信半径的节点判别为虫洞攻击节点。The traditional wormhole attack identification method, in order to accurately distinguish each node and effectively identify the attack node, adopts the arrangement of anchor nodes, obtains the number of hops between two communication nodes, calculates the average distance per hop and compares it with the maximum communication radius of the node, which will exceed The node with the largest communication radius is identified as a wormhole attack node.
目前虫洞攻击识别存在以下主要问题:At present, there are the following main problems in the identification of wormhole attacks:
在虫洞攻击识别过程中,需要布置大量锚节点,这会带来过多的设备开销,影响整个网络的成本。In the process of wormhole attack identification, a large number of anchor nodes need to be deployed, which will bring too much equipment overhead and affect the cost of the entire network.
在虫洞攻击识别过程中,需要设置严格的时钟同步,这会增加节点信息传输的能量消耗,影响网络的存活时间。In the process of wormhole attack identification, strict clock synchronization needs to be set, which will increase the energy consumption of node information transmission and affect the survival time of the network.
在虫洞攻击识别过程中,没有考虑到簇内节点及簇头节点的作用各不相同,是否适应分簇路由协议的结构特征。In the process of identifying wormhole attacks, the role of the nodes in the cluster and the cluster head nodes are different, and whether they are suitable for the structural characteristics of the clustering routing protocol is not considered.
发明内容Contents of the invention
本发明的主要目的在于提供一种分布式电力监控系统网络分簇路由虫洞攻击识别方法,针对虫洞攻击识别方法的考虑要素不完整问题、能量消耗与经济成本不合理问题,提出科学合理,能够保证分布式电力监控系统网络安全可靠的基于节点密度的分布式电力监控系统网络分簇路由虫洞攻击识别方法。The main purpose of the present invention is to provide a distributed power monitoring system network clustering routing wormhole attack identification method, aiming at the problem of incomplete consideration factors, unreasonable energy consumption and economic cost of the wormhole attack identification method, it is scientific and reasonable, A node density-based distributed power monitoring system network cluster routing wormhole attack identification method that can ensure the security and reliability of the distributed power monitoring system network.
本发明采用的技术方案是:一种分布式电力监控系统网络分簇路由虫洞攻击识别方法,包括簇头节点与簇头节点虫洞攻击识别方法、 簇内节点与簇内节点虫洞攻击识别方法及簇头节点与簇内节点虫洞攻击识别方法;假设网络中节点大致为均匀分布,个节点部署在以边长为的正方形区域内,网络单位面积节点密度表示为:The technical solution adopted in the present invention is: a distributed power monitoring system network cluster routing wormhole attack identification method, including cluster head node and cluster head node wormhole attack identification method, cluster node and cluster node wormhole attack identification method and cluster head node and cluster node wormhole attack identification method; assuming that the nodes in the network are roughly evenly distributed, Nodes are deployed on the edge length In the square area of , the node density per unit area of the network Expressed as:
(1)。 (1).
进一步地,所述簇头节点与簇头节点虫洞攻击识别方法包括:当两簇头节点均为虫洞攻击节点时,理想状态下单位面积节点密度至少为,但是在实际的节点布置过程中,考虑到节点分布的不均匀性以及虫洞攻击节点可能分布在地理位置边缘等情况,引入一个虫洞节点判定系数,当节点判定实际单位面积节点密度大于阈值时,便会将自身判定为虫洞攻击节点,阈值的计算公式为:Further, the cluster head node and the cluster head node wormhole attack identification method include: when the two cluster head nodes are both wormhole attack nodes, the density of nodes per unit area in an ideal state is at least , but in the actual node layout process, considering the unevenness of node distribution and the fact that wormhole attack nodes may be distributed on the edge of geographical location, etc., a wormhole node determination coefficient is introduced , when the node determines that the actual unit area node density is greater than the threshold , it will determine itself as a wormhole attack node, and the threshold The calculation formula is:
(2) (2)
定义网络中各簇为,各簇头节点为,各簇内节点为,若网络中簇头节点和簇头节点为虫洞攻击节点时,各簇内节点向簇头节点传输信息时会通过簇头节点与簇头节点形成的虫洞链路向簇头节点传输信息;同理,各簇内节点向簇头节点传输信息时会通过该虫洞链路向簇头节点传输信息,这样会导致簇头节点与簇头节点均能接收来自两个簇的信息;对簇头节点与簇头节点分别进行单位面积节点密度计算,与阈值进行比较,若,则可以判断出网络受到了虫洞攻击,且簇头节点与簇头节点均为虫洞攻击节点。Each cluster in the network is defined as , each cluster head node is , the nodes in each cluster are , if the cluster head node in the network and cluster head node When a node is attacked by a wormhole, the nodes in each cluster cluster head node When transmitting information, it will pass through the cluster head node with the cluster head node The formed wormhole link leads to the cluster head node Transmission information; similarly, nodes in each cluster cluster head node When transmitting information, it will pass the wormhole link to the cluster head node transfer information, which will lead to the cluster head node with the cluster head node Both can receive information from two clusters; for the cluster head node with the cluster head node Calculate the node density per unit area separately, and the threshold To compare, if , it can be judged that the network has been attacked by a wormhole, and the cluster head node with the cluster head node Both are wormhole attack nodes.
更进一步地,所述簇内节点与簇内节点虫洞攻击识别方法包括:若网络中簇内节点与簇内节点为虫洞攻击节点时,簇内节点向簇头节点传输信息时会通过簇内节点与簇内节点形成的虫洞链路向簇内节点传输信息;同理,簇内节点向簇头节点传输信息时会通过该虫洞链路向簇内节点传输信息,导致簇头节点接收来自簇内节点信息,簇头节点接收来自簇内节点信息;为了解决此类攻击影响,簇头节点需将接收信息的节点识别号与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点的,若簇头节点通过对接收信息的节点与簇成员节点列表进行比较,找到不属于本簇内节点的,同时簇头节点通过对接收信息的节点与簇成员节点列表进行比较,找到不属于本簇内节点的,则可以判断出网络受到了虫洞攻击,且簇内节点与簇内节点均为虫洞攻击节点。Furthermore, the intra-cluster node and the intra-cluster node wormhole attack identification method include: if the intra-cluster node in the network with cluster nodes When a node is attacked by a wormhole, the nodes in the cluster cluster head node When transmitting information, it will pass through the nodes in the cluster with cluster nodes The formed wormhole links to the nodes in the cluster Transmission information; similarly, nodes in the cluster cluster head node When transmitting information, it will pass the wormhole link to the nodes in the cluster transmit information, resulting in the cluster head node received from nodes in the cluster information, cluster head node received from nodes in the cluster information; in order to solve the impact of this kind of attack, the cluster head node needs to receive the node identification number of the information Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster , if the cluster head node Nodes that receive information through and Compare the list of cluster member nodes to find nodes that do not belong to the cluster of , while the cluster head node Nodes that receive information through and Compare the list of cluster member nodes to find nodes that do not belong to the cluster of , it can be judged that the network has been attacked by wormholes, and the nodes in the cluster with cluster nodes Both are wormhole attack nodes.
更进一步地,所述簇头节点与簇内节点虫洞攻击识别方法包括:若网络簇中簇头节点与簇中簇内节点为虫洞攻击节点时,簇内节点向簇头节点传输信息时会通过簇头节点与簇内节点形成的虫洞链路向簇内节点传输信息,导致簇内节点接收来自簇头节点信息,进而导致簇头节点接收来自两个簇内信息;同时,簇内节点向簇头节点传输信息时会通过该虫洞链路向簇头节点传输信息,导致簇头节点接收来自簇内节点信息;为了解决此类攻击影响,簇头节点需要进行单位面积节点密度计算,判断自身单位面积节点密度是否满足阈值条件,同时簇头节点需要将接收信息的节点与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点,簇头节点与簇头节点分别进行单位面积节点密度计算,与阈值进行比较,若,同时簇头节点与簇头节点通过对接收信息的节点与自身簇成员节点列表进行比较,发现簇头节点找到不属于本簇内节点 ,则可以判断出网络受到了虫洞攻击,且簇头节点与簇内节点均为虫洞攻击节点。Further, the method for identifying wormhole attacks between the cluster head node and the nodes in the cluster includes: if the network cluster head node and Intra-cluster node in cluster When a node is attacked by a wormhole, the nodes in the cluster cluster head node When transmitting information, it will pass through the cluster head node with cluster nodes The formed wormhole links to the nodes in the cluster Transmitting information, resulting in nodes in the cluster received from the cluster head node information, which leads to the cluster head node Receive information from two clusters; at the same time, nodes in the cluster cluster head node When transmitting information, it will pass the wormhole link to the cluster head node transmit information, resulting in the cluster head node received from nodes in the cluster information; in order to solve the impact of such attacks, the cluster head node needs to calculate the node density per unit area to judge whether its own node density per unit area meets the threshold condition, and the cluster head node needs to Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster , the cluster head node with the cluster head node Calculate the node density per unit area separately, and the threshold To compare, if , while the cluster head node with the cluster head node Nodes that receive information through Compare with the list of its own cluster member nodes to find the cluster head node Find nodes that do not belong to this cluster , it can be judged that the network has been attacked by a wormhole, and the cluster head node with cluster nodes Both are wormhole attack nodes.
本发明的优点:本发明的方法能够保证分布式电力监控系统网络安全可靠的基于节点密度的分布式电力监控系统网络分簇路由虫洞攻击识别方法。Advantages of the present invention: the method of the present invention can ensure the safety and reliability of the network of the distributed power monitoring system, and it is a node density-based distributed power monitoring system network cluster routing wormhole attack identification method.
除了上面所描述的目的、特征和优点之外,本发明还有其它的目的、特征和优点。下面将参照图,对本发明作进一步详细的说明。In addition to the objects, features and advantages described above, the present invention has other objects, features and advantages. Hereinafter, the present invention will be described in further detail with reference to the drawings.
附图说明Description of drawings
构成本申请的一部分的附图用来提供对本发明的进一步理解,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。The accompanying drawings constituting a part of this application are used to provide further understanding of the present invention, and the schematic embodiments and descriptions of the present invention are used to explain the present invention, and do not constitute an improper limitation of the present invention.
图1是本发明的分布式电力监控系统网络分簇路由虫洞攻击识别方法流程图。FIG. 1 is a flow chart of a method for identifying a wormhole attack by network clustering routing in a distributed power monitoring system according to the present invention.
具体实施方式Detailed ways
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
参考图1,一种分布式电力监控系统网络分簇路由虫洞攻击识别方法,包括簇头节点与簇头节点虫洞攻击识别方法、 簇内节点与簇内节点虫洞攻击识别方法及簇头节点与簇内节点虫洞攻击识别方法;假设网络中节点大致为均匀分布,个节点部署在以边长为的正方形区域内,网络单位面积节点密度表示为:Referring to Figure 1, a distributed power monitoring system network cluster routing wormhole attack identification method, including cluster head node and cluster head node wormhole attack identification method, intra-cluster node and intra-cluster node wormhole attack identification method and cluster head The identification method of wormhole attacks on nodes and nodes in the cluster; assuming that the nodes in the network are roughly evenly distributed, Nodes are deployed on the edge length In the square area of , the node density per unit area of the network Expressed as:
(1)。 (1).
所述簇头节点与簇头节点虫洞攻击识别方法包括:当两簇头节点均为虫洞攻击节点时,理想状态下单位面积节点密度至少为,但是在实际的节点布置过程中,考虑到节点分布的不均匀性以及虫洞攻击节点可能分布在地理位置边缘等情况,为了减少虫洞节点的误判比例,引入一个虫洞节点判定系数,当节点判定实际单位面积节点密度大于阈值时,便会将自身判定为虫洞攻击节点,阈值的计算公式为:The cluster head node and the cluster head node wormhole attack identification method include: when the two cluster head nodes are both wormhole attack nodes, the density of nodes per unit area in an ideal state is at least , but in the actual node layout process, considering the unevenness of node distribution and the fact that wormhole attack nodes may be distributed on the edge of geographical locations, in order to reduce the misjudgment ratio of wormhole nodes, a wormhole node determination coefficient , when the node determines that the actual unit area node density is greater than the threshold , it will determine itself as a wormhole attack node, and the threshold The calculation formula is:
(2) (2)
定义网络中各簇为,各簇头节点为,各簇内节点为,若网络中簇头节点和簇头节点为虫洞攻击节点时,各簇内节点向簇头节点传输信息时会通过簇头节点与簇头节点形成的虫洞链路向簇头节点传输信息;同理,各簇内节点向簇头节点传输信息时会通过该虫洞链路向簇头节点传输信息,这样会导致簇头节点与簇头节点均能接收来自两个簇的信息;对簇头节点与簇头节点分别进行单位面积节点密度计算,与阈值进行比较,若,则可以判断出网络受到了虫洞攻击,且簇头节点与簇头节点均为虫洞攻击节点。Each cluster in the network is defined as , each cluster head node is , the nodes in each cluster are , if the cluster head node in the network and cluster head node When a node is attacked by a wormhole, the nodes in each cluster cluster head node When transmitting information, it will pass through the cluster head node with the cluster head node The formed wormhole link leads to the cluster head node Transmission information; similarly, nodes in each cluster cluster head node When transmitting information, it will pass the wormhole link to the cluster head node transfer information, which will lead to the cluster head node with the cluster head node Both can receive information from two clusters; for the cluster head node with the cluster head node Calculate the node density per unit area separately, and the threshold To compare, if , it can be judged that the network has been attacked by a wormhole, and the cluster head node with the cluster head node Both are wormhole attack nodes.
所述簇内节点与簇内节点虫洞攻击识别方法包括:若网络中簇内节点与簇内节点为虫洞攻击节点时,簇内节点向簇头节点传输信息时会通过簇内节点与簇内节点形成的虫洞链路向簇内节点传输信息;同理,簇内节点向簇头节点传输信息时会通过该虫洞链路向簇内节点传输信息,导致簇头节点接收来自簇内节点信息,簇头节点接收来自簇内节点信息;为了解决此类攻击影响,簇头节点需将接收信息的节点识别号与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点的,若簇头节点通过对接收信息的节点与簇成员节点列表进行比较,找到不属于本簇内节点的,同时簇头节点通过对接收信息的节点与簇成员节点列表进行比较,找到不属于本簇内节点的,则可以判断出网络受到了虫洞攻击,且簇内节点与簇内节点均为虫洞攻击节点。The described intra-cluster node and intra-cluster node wormhole attack identification method include: if the intra-cluster node in the network with cluster nodes When a node is attacked by a wormhole, the nodes in the cluster cluster head node When transmitting information, it will pass through the nodes in the cluster with cluster nodes The formed wormhole links to the nodes in the cluster Transmission information; similarly, nodes in the cluster cluster head node When transmitting information, it will pass the wormhole link to the nodes in the cluster transmit information, resulting in the cluster head node received from nodes in the cluster information, cluster head node received from nodes in the cluster information; in order to solve the impact of this kind of attack, the cluster head node needs to receive the node identification number of the information Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster , if the cluster head node Nodes that receive information through and Compare the list of cluster member nodes to find nodes that do not belong to the cluster of , while the cluster head node Nodes that receive information through and Compare the list of cluster member nodes to find nodes that do not belong to the cluster of , it can be judged that the network has been attacked by wormholes, and the nodes in the cluster with cluster nodes Both are wormhole attack nodes.
所述簇头节点与簇内节点虫洞攻击识别方法包括:若网络簇中簇头节点与簇中簇内节点为虫洞攻击节点时,簇内节点向簇头节点传输信息时会通过簇头节点与簇内节点形成的虫洞链路向簇内节点传输信息,导致簇内节点接收来自簇头节点信息,进而导致簇头节点接收来自两个簇内信息;同时,簇内节点向簇头节点传输信息时会通过该虫洞链路向簇头节点传输信息,导致簇头节点接收来自簇内节点信息;为了解决此类攻击影响,簇头节点需要进行单位面积节点密度计算,判断自身单位面积节点密度是否满足阈值条件,同时簇头节点需要将接收信息的节点与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点,簇头节点与簇头节点分别进行单位面积节点密度计算,与阈值进行比较,若,同时簇头节点与簇头节点通过对接收信息的节点与自身簇成员节点列表进行比较,发现簇头节点找到不属于本簇内节点 ,则可以判断出网络受到了虫洞攻击,且簇头节点与簇内节点均为虫洞攻击节点。The cluster head node and the node wormhole attack identification method in the cluster include: if the network cluster head node and Intra-cluster node in cluster When a node is attacked by a wormhole, the nodes in the cluster cluster head node When transmitting information, it will pass through the cluster head node with cluster nodes The formed wormhole links to the nodes in the cluster Transmitting information, resulting in nodes in the cluster received from the cluster head node information, which leads to the cluster head node Receive information from two clusters; at the same time, nodes in the cluster cluster head node When transmitting information, it will pass the wormhole link to the cluster head node transmit information, resulting in the cluster head node received from nodes in the cluster information; in order to solve the impact of such attacks, the cluster head node needs to calculate the node density per unit area to judge whether its own node density per unit area meets the threshold condition, and the cluster head node needs to Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster , the cluster head node with the cluster head node Calculate the node density per unit area separately, and the threshold To compare, if , while the cluster head node with the cluster head node Nodes that receive information through Compare with the list of its own cluster member nodes to find the cluster head node Find nodes that do not belong to this cluster , it can be judged that the network has been attacked by a wormhole, and the cluster head node with cluster nodes Both are wormhole attack nodes.
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included in the protection of the present invention. within range.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111029581.8A CN113497808B (en) | 2021-09-03 | 2021-09-03 | Distributed power monitoring system network clustering routing wormhole attack identification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111029581.8A CN113497808B (en) | 2021-09-03 | 2021-09-03 | Distributed power monitoring system network clustering routing wormhole attack identification method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113497808A CN113497808A (en) | 2021-10-12 |
CN113497808B true CN113497808B (en) | 2023-01-24 |
Family
ID=77997159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111029581.8A Active CN113497808B (en) | 2021-09-03 | 2021-09-03 | Distributed power monitoring system network clustering routing wormhole attack identification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113497808B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2552168A1 (en) * | 2011-07-27 | 2013-01-30 | Alcatel Lucent | Clustering and resource allocation in ad hoc networks |
CN111865469A (en) * | 2020-07-31 | 2020-10-30 | 江西师范大学 | A fault-tolerant time synchronization method and system for industrial Internet of things based on blockchain |
CN113038565A (en) * | 2021-02-05 | 2021-06-25 | 南京航空航天大学 | Wireless sensor privacy protection route control method based on inter-cluster planned route |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213770B (en) * | 2019-07-09 | 2022-10-21 | 国网宁夏电力有限公司 | Collusion attack prevention method and system for wireless sensor network |
CN113055891B (en) * | 2021-03-17 | 2023-08-15 | 长春工业大学 | A Secure Routing Method for Wireless Sensor Networks Based on Adaptive Trust Mechanism |
-
2021
- 2021-09-03 CN CN202111029581.8A patent/CN113497808B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2552168A1 (en) * | 2011-07-27 | 2013-01-30 | Alcatel Lucent | Clustering and resource allocation in ad hoc networks |
CN111865469A (en) * | 2020-07-31 | 2020-10-30 | 江西师范大学 | A fault-tolerant time synchronization method and system for industrial Internet of things based on blockchain |
CN113038565A (en) * | 2021-02-05 | 2021-06-25 | 南京航空航天大学 | Wireless sensor privacy protection route control method based on inter-cluster planned route |
Non-Patent Citations (1)
Title |
---|
一个新型分布式无线传感器分层路由协议;刘春涛等;《计算机技术与发展》;20100410(第04期);41-44 * |
Also Published As
Publication number | Publication date |
---|---|
CN113497808A (en) | 2021-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100669238B1 (en) | How to provide routing protocol of sensor network | |
CN104335530B (en) | Network routing protocol power-economizing method and device for network element | |
CN106878995B (en) | Method for identifying abnormal type of wireless sensor network based on perception data | |
CN108770036B (en) | Inter-cluster-head communication method and wireless sensor network routing device | |
CN110830998A (en) | A method for identifying malicious nodes in the Internet of Vehicles based on trust mechanism | |
EP4209108B1 (en) | Malicious black hole node detection and circumvention | |
CN102917430A (en) | Credible security route of wireless sensor network on basis of quantum ant colony algorithm | |
CN107197495B (en) | Wireless sensor network security routing method based on multi-attribute decision | |
CN113411213B (en) | Topology control method and collaborative monitoring method of ad hoc network based on Internet of Things | |
CN110198549A (en) | Event driving type wireless sensor network cluster routing method and system | |
CN111769867A (en) | Satellite network security routing method | |
CN104202787A (en) | Optimum redundancy based adaptive wireless sensor network routing method | |
CN113497808B (en) | Distributed power monitoring system network clustering routing wormhole attack identification method | |
CN108924825A (en) | A kind of high energy efficiency trust management and credible routing method towards SDWSNs | |
CN108900517B (en) | Safety route defense method based on HWMP protocol | |
CN106303901A (en) | In a kind of wireless sense network, infallible data based on collaborative filtering merges optimization method | |
CN113708953B (en) | Underwater acoustic sensor network anti-damage method based on node importance balance | |
CN102271063A (en) | Self loop detecting method and system | |
CN106332131B (en) | A wireless sensor network clone node detection method and system | |
CN113301571A (en) | Strong defense method for malicious node attack in wireless sensor network | |
CN102843672A (en) | Malicious node detection method for sensing network based on energy fields | |
CN102932794B (en) | Black hole attack detection method in a kind of clustering self-organizing network | |
CN111031506B (en) | Wireless sensor network clustering method based on Voronoi domain processing | |
CN110086779A (en) | A kind of communication security method of discrimination of multi-area optical network crosstalk attack | |
Gowtham et al. | An artificial immune system‐based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |