2013 | OriginalPaper | Buchkapitel
False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks
verfasst von : Ping Li, Limin Sun, Wu Yang, Qing Fang, Jinyang Xie, Kui Ma
Erschienen in: Advances in Swarm Intelligence
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Wireless sensor networks are usually deployed in complex environments; an attacker can easily inject false data by capturing nodes, causing serious consequences. The main work of this paper is as follows. Firstly, the logical loop model is created based on the estimated value of the source events of every wireless sensor network node. Secondly, each node based on RSSI find neighbor nodes by establishing consistency loop model. Finally, the malicious node is determined by comparing the similarities and differences of the nodes between the two loop models. The simulation shows that this mechanism is effective to inhibit the infringement of malicious nodes to the network, and improve network security performance.