[go: up one dir, main page]

CN102143495B - Method for detecting node attack of wireless sensor network - Google Patents

Method for detecting node attack of wireless sensor network Download PDF

Info

Publication number
CN102143495B
CN102143495B CN2011100654806A CN201110065480A CN102143495B CN 102143495 B CN102143495 B CN 102143495B CN 2011100654806 A CN2011100654806 A CN 2011100654806A CN 201110065480 A CN201110065480 A CN 201110065480A CN 102143495 B CN102143495 B CN 102143495B
Authority
CN
China
Prior art keywords
node
area
nodes
new
neighbor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011100654806A
Other languages
Chinese (zh)
Other versions
CN102143495A (en
Inventor
叶灿才
卢林发
黄家祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zen Science And Technology Co Ltd
Original Assignee
Zhongshan Iker Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongshan Iker Digital Technology Co ltd filed Critical Zhongshan Iker Digital Technology Co ltd
Priority to CN2011100654806A priority Critical patent/CN102143495B/en
Publication of CN102143495A publication Critical patent/CN102143495A/en
Application granted granted Critical
Publication of CN102143495B publication Critical patent/CN102143495B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the field of the application of wireless sensor network and information security cross technology, and provides a method for detecting node attack of a wireless sensor network, which is characterized by comprising the following steps: the method comprises the steps that the wireless sensor network is divided into four deployment areas; numbering the nodes and the deployment areas and forming corresponding mapping relation tables, wherein the nodes are deployed to the corresponding areas; broadcasting the ID and the area number by the node, receiving the feedback of the broadcasted node, taking the node capable of receiving the broadcast as a neighbor node, and recording the ID and the area number of the neighbor node in a neighbor list; the node checks the area numbers of all neighbor nodes in the neighbor list to form a boundary area and a boundary area number; the boundary area and the four initialized deployment areas form a new deployment area partition; when the node area number changes, the received broadcasted node modifies the area number of the corresponding adjacent node in the neighbor list to the neighbor broadcast ID and the new area number to form a wireless sensor network with a new subarea; the new node is added in a secondary detection step of a copy node and the like, and has the advantages of no need of any auxiliary equipment, low energy consumption, high efficiency and convenient realization.

Description

一种无线传感网节点攻击的检测方法A detection method of wireless sensor network node attack

技术领域 technical field

本发明是一种无线传感器网络安全保护方案,属于无线传感器网络与信息安全交叉技术应用领域。The invention is a wireless sensor network security protection scheme, which belongs to the application field of wireless sensor network and information security intersecting technology.

背景技术 Background technique

无线传感器网络是一种综合多门技术的新兴网络,被广泛地应用于军事和民用等各个领域。由于传感器节点的特点,使它易受到各种不同的攻击。节点复制攻击是指攻击者俘获传感器节点后,得到密钥和节点ID等重要信息,通过这些信息伪造大量复制节点,并将其散布到网络中进行破坏活动的攻击类型。这种攻击来自网络内部,复制节点具有被俘节点的一切合法信息.因此,它们很难被发现,对网络的破坏力较强。Wireless sensor network is a kind of emerging network integrating multiple technologies, which is widely used in various fields such as military and civilian. Due to the characteristics of sensor nodes, it is vulnerable to various attacks. Node replication attack refers to the attack type in which the attacker obtains important information such as keys and node IDs after capturing sensor nodes, forges a large number of replication nodes through these information, and spreads them into the network to carry out sabotage activities. This kind of attack comes from inside the network, and the copy nodes have all the legal information of the captured nodes. Therefore, they are difficult to be found and have strong destructive power to the network.

节点复制攻击的检测方法可分为三大类:中心检测、局部检测和广播检测。中心检测是所有节点定时将邻居列表上传到中心节点,中心节点找出复制节点.这种方法耗能大,尤其中心节点周围的节点将成为热点能耗很快,中心节点一旦被俘方法立即失效。局部检测是邻居节点之间投票找出复制节点,缺点是无法找出距离较远的复制节点且易受黑名单攻击。广播检测是节点洪泛广播验证信息,收到信息的节点记录验证信息,这种方法耗能大且需要很大的存储空间。The detection methods of node replication attack can be divided into three categories: central detection, local detection and broadcast detection. Central detection means that all nodes regularly upload the neighbor list to the central node, and the central node finds out the duplicate nodes. This method consumes a lot of energy, especially the nodes around the central node will become hot spots, and the energy consumption will be very fast. Once the central node is captured, the method will immediately fail . Local detection is to vote among neighboring nodes to find out the replica nodes. The disadvantage is that it cannot find out the replica nodes that are far away and is vulnerable to blacklist attacks. Broadcast detection means that nodes flood broadcast verification information, and the nodes that receive the information record the verification information. This method consumes a lot of energy and requires a lot of storage space.

发明内容 Contents of the invention

本发明的目的是克服现有技术的缺点,提供结一种无线传感网节点攻击的检测方法,它采用网络部署分区手段和新检点检测手段创新结合的方法实现复制节点的有效检测。The purpose of the present invention is to overcome the shortcoming of prior art, provide a kind of detection method of wireless sensor network node attack, it adopts the method for the innovative combination of network deployment zoning means and new checkpoint detection means to realize the effective detection of duplicated nodes.

下面对本发明方案做进一步描述:The scheme of the present invention is further described below:

一种无线传感网节点攻击的检测方法,其特征在于:A detection method for a wireless sensor network node attack, characterized in that:

包括步骤,include steps,

1)无线传感器网络被划分为四个部署区域步骤;1) The wireless sensor network is divided into four deployment area steps;

2)为节点及部署区域编号并形成对应的影射关系表,节点被部署到相应的区域步骤;2) Number the nodes and deployment areas and form a corresponding mapping relationship table, and the nodes are deployed to the corresponding area steps;

3)节点广播ID和区域编号,接收被广播的节点的反馈,并将能接收到该广播的作为邻居节点,并将邻居节点的ID和区域编号记录在邻居列表步骤;3) The node broadcasts the ID and the area number, receives the feedback of the broadcasted node, and regards the node that can receive the broadcast as a neighbor node, and records the ID and the area number of the neighbor node in the neighbor list step;

4)节点检查邻居列表所有邻居节点的区域编号,形成边界区域及边界区域编号;边界区域和四个初始化的部署区域形成新的部署区域划分;4) The node checks the area numbers of all neighbor nodes in the neighbor list to form the border area and the border area number; the border area and the four initialized deployment areas form a new deployment area division;

5)节点区域编号发生变化时,对它的邻居广播ID和新的区域编号,收到的被广播节点在其邻居列表当中修改对应邻节点的区域编号形成具有新分区的无线传感器网络步骤;5) When the node area number changes, broadcast ID and new area number to its neighbors, and the received broadcasted node modifies the area number of the corresponding adjacent node in its neighbor list to form a wireless sensor network step with a new partition;

6)新节点加入,该新节点广播其ID及区域编号;邻居节点收到该广播信息并判断是否等于本区域编号,如果是则发现复制节点,否则扫描其邻居列表,判断是否存在与该新节点相等的邻居ID,如果是则发现复制节点。6) A new node joins, and the new node broadcasts its ID and area number; the neighbor node receives the broadcast information and judges whether it is equal to the area number, and if so, finds the duplicate node, otherwise scans its neighbor list to determine whether there is an ID related to the new node. Neighbor IDs for nodes equal, if so to discover duplicate nodes.

进一步优化,新节点加入时候,还具有步骤Further optimization, when a new node joins, there are also steps

7)新节点随机选择一个非空的邻区域发送验证信息,并指定该邻区域其中一个节转发验证信息;收到验证信息的节点通过扫描邻居列表和临时列表的ID对比,如果为相等的ID,则判断该新节点为复制节点的二次检测步骤。7) The new node randomly selects a non-empty adjacent area to send the verification information, and specifies one of the nodes in the adjacent area to forward the verification information; the node receiving the verification information compares the IDs of the neighbor list and the temporary list by scanning, if they are equal IDs , the second detection step of judging that the new node is a duplicate node.

附图说明 Description of drawings

图1是初始部署区域示意图;Figure 1 is a schematic diagram of the initial deployment area;

图2是边界区域的部署区域新示意图;Figure 2 is a new schematic diagram of the deployment area in the border area;

图3是新节点的首次检测流程图;Fig. 3 is the first detection flow chart of new node;

图4是新节点的二次检测流程图。Fig. 4 is a flow chart of secondary detection of new nodes.

具体实施方式 Detailed ways

实施例一Embodiment one

参考图1至2,无线传感器网络被划分为四个部署区域(又称为主区域),即区域1、2、3和4;然后依次:Referring to Figures 1 to 2, the wireless sensor network is divided into four deployment areas (also known as main areas), namely areas 1, 2, 3 and 4; and then in order:

为节点及部署区域编号并形成对应的影射关系表,节点被部署到相应的区域;Number the nodes and deployment areas and form a corresponding mapping relationship table, and the nodes are deployed to the corresponding areas;

节点广播ID和区域编号,接收被广播的节点的反馈,并将能接收到该广播的作为邻居节点,并将邻居节点的ID和区域编号记录在邻居列表;The node broadcasts the ID and area number, receives the feedback from the broadcasted node, and regards the node that can receive the broadcast as a neighbor node, and records the ID and area number of the neighbor node in the neighbor list;

节点检查邻居列表所有邻居节点的区域编号,形成边界区域及边界区域编号(如图2,边界区域分别为区域5、6、7、8和9);边界区域和四个初始化的部署区域形成新的部署区域;The node checks the area numbers of all neighbor nodes in the neighbor list to form border areas and border area numbers (as shown in Figure 2, the border areas are areas 5, 6, 7, 8 and 9); the border area and the four initialized deployment areas form a new deployment area;

节点区域编号发生变化时,对它的邻居广播ID和新的区域编号,收到的被广播节点在其邻居列表当中修改对应邻节点的区域编号形成具有新分区的无线传感器网络。When the area number of a node changes, it broadcasts the ID and the new area number to its neighbors, and the received broadcast node modifies the area number of the corresponding neighbor node in its neighbor list to form a wireless sensor network with a new partition.

其中,下面将以节点A为例,说明修改区域编号的规则:Among them, the following will take node A as an example to illustrate the rules for modifying the area number:

变量numx表示邻居列表中区域编号为x的邻居数量,相应的代码如下:The variable num x indicates the number of neighbors whose area number is x in the neighbor list, and the corresponding code is as follows:

Figure BSA00000453850300041
Figure BSA00000453850300041

这里阈值NUM是为了防止节点在区域划分之前被俘而破坏区域的划分。因此,NUM值一般取2.若节点A的邻居列表中有numx<NUM,则A随机选择3个邻节点,发送该节点ID;若邻居节点返回同样信息,则判定该ID为复制节点。区域2、3和4内节点情况类同,最终部署区域内的节点划分如图2所示。Here the threshold NUM is to prevent the node from being captured before the region division and destroying the division of the region. Therefore, the NUM value is generally taken as 2. If num x <NUM exists in the neighbor list of node A, then A randomly selects 3 neighbor nodes and sends the node ID; if the neighbor node returns the same information, it is determined that the ID is a duplicate node. The nodes in areas 2, 3, and 4 are similar, and the nodes in the final deployment area are divided as shown in Figure 2.

新加入的节点有三种可能的位置:远离边界区域的主区域内部、对应主区域和边界区域的交界处、非对应主区域和边界区域的交界处,首先针对这三种情况建立坐标。There are three possible locations for the newly added nodes: the interior of the main area away from the boundary area, the junction of the corresponding main area and the border area, and the junction of the non-corresponding main area and the border area. First, establish coordinates for these three situations.

第一种:节点区域编号不变,比较各个邻居节点的横纵坐标,取其中最小值加1,作为它的坐标。The first one: the number of the node area remains unchanged, compare the horizontal and vertical coordinates of each neighboring node, and take the minimum value plus 1 as its coordinate.

第二种:先计算邻节点中边界区域节点和主区域节点各占的比例,哪一个的比例大于50%,它的区域编号就确定为哪一个区域的编号。若邻节点中区域9的节点比例超过25%,则新加入节点的区域编号为9.区域9内节点坐标为(0,0),其他边界区域内节点根据区域编号将其中一个确定为0,其他情况下节点坐标同第一种情况。The second method: firstly calculate the respective ratios of border region nodes and main region nodes among adjacent nodes, and whichever ratio is greater than 50%, its region number is determined to be the number of that region. If the proportion of nodes in area 9 among the adjacent nodes exceeds 25%, the area number of the newly added node is 9. The coordinates of nodes in area 9 are (0, 0), and the nodes in other boundary areas determine one of them as 0 according to the area number, In other cases, the node coordinates are the same as the first case.

第三种:节点失效。The third type: node failure.

如图3所示,新节点加入时,该新节点广播其ID及区域编号;邻居节点收到该广播信息并判断是否等于本区域编号,如果是则发现复制节点,否则则扫描其邻居列表,判断是否存在与该新节点相等的邻居ID,如果是则发现复制节点。As shown in Figure 3, when a new node joins, the new node broadcasts its ID and area number; the neighbor node receives the broadcast information and judges whether it is equal to the area number, if so, finds the duplicate node, otherwise scans its neighbor list, Determine whether there is a neighbor ID equal to the new node, and if so, find the duplicate node.

如图4所示,在完成图3所示的检测流程后,新节点随机选择一个非空的邻区域发送验证信息,并指定该邻区域其中一个节转发验证信息;收到验证信息的节点通过扫描邻居列表和临时列表的ID对比,如果为相等的ID,则判断该新节点为复制节点,否则收到验证信息的节点随机选择一个非空的邻区域发送验证信息以完成二次检测。As shown in Figure 4, after completing the detection process shown in Figure 3, the new node randomly selects a non-empty adjacent area to send verification information, and designates one of the nodes in the adjacent area to forward the verification information; the node that receives the verification information passes Scan the neighbor list and compare the IDs of the temporary list. If the IDs are equal, it is judged that the new node is a duplicate node. Otherwise, the node receiving the verification information randomly selects a non-empty adjacent area to send verification information to complete the secondary detection.

综上所述,本发明的方法对比现有技术,它不借助任何辅助设备,完全由正常的传感器节点完成,实现攻击检测过程中收发包数大大减少,并可以直接找出远距离的复制节点;对在同一区域的复制节点,由于距离较近,所以无需发射大量的验证线,从而节省了能量,对比于传统方法将消耗能量大幅降低。In summary, compared with the prior art, the method of the present invention is completely completed by normal sensor nodes without any auxiliary equipment, so that the number of sending and receiving packets in the process of attack detection is greatly reduced, and the remote replication node can be directly found ; For the replication nodes in the same area, due to the short distance, there is no need to send a large number of verification lines, thereby saving energy, and compared with the traditional method, the energy consumption will be greatly reduced.

Claims (2)

1.一种无线传感网节点攻击的检测方法,其特征在于:1. A detection method for a wireless sensor network node attack, characterized in that: 包括步骤,include steps, 1)无线传感器网络被划分为四个部署区域步骤;1) The wireless sensor network is divided into four deployment area steps; 2)为节点及部署区域编号并形成对应的影射关系表,节点被部署到相应的区域步骤;2) Number the nodes and deployment areas and form a corresponding mapping relationship table, and the nodes are deployed to the corresponding area steps; 3)节点广播ID和区域编号,接收被广播的节点的反馈,并将能接收到该广播的作为邻居节点,并将邻居节点的ID和区域编号记录在邻居列表步骤;3) The node broadcasts the ID and the area number, receives the feedback of the broadcasted node, and regards the node that can receive the broadcast as a neighbor node, and records the ID and the area number of the neighbor node in the neighbor list step; 4)节点检查邻居列表所有邻居节点的区域编号,形成边界区域及边界区域编号;边界区域和四个初始化的部署区域形成新的部署区域划分;分别为新的部署区域建立坐标,其中当新节点加入为远离边界区域的主区域内部时,节点区域编号不变,比较各个邻居节点的横纵坐标,取其中最小值加1,作为它的坐标,当新节点加入为对应主区域和边界区域的交界处时,先计算邻节点中边界区域节点和主区域节点各占的比例,确定为哪一个区域的编号后比较各个邻居节点的横纵坐标,取其中最小值加1,作为它的坐标;当新节点加入非对应主区域和边界区域的交界处,节点失效;4) The node checks the area numbers of all neighbor nodes in the neighbor list to form the border area and the border area number; the border area and the four initialized deployment areas form a new deployment area division; respectively establish coordinates for the new deployment area, where when the new node When adding to the inside of the main area far away from the boundary area, the number of the node area remains unchanged. Compare the horizontal and vertical coordinates of each neighboring node, and take the minimum value plus 1 as its coordinate. When a new node is added as the corresponding main area and the boundary area At the junction, first calculate the proportion of the border area nodes and the main area nodes among the adjacent nodes, determine which area is the number, compare the horizontal and vertical coordinates of each neighboring node, and take the minimum value plus 1 as its coordinate; When a new node joins the junction of the non-corresponding main area and the border area, the node fails; 5)节点区域编号发生变化时,对它的邻居广播ID和新的区域编号,收到的被广播节点在其邻居列表当中修改对应邻节点的区域编号形成具有新分区的无线传感器网络步骤;5) When the node area number changes, broadcast ID and new area number to its neighbors, and the received broadcasted node modifies the area number of the corresponding adjacent node in its neighbor list to form a wireless sensor network step with a new partition; 6)新节点加入,该新节点广播其ID及区域编号;邻居节点收到该广播信息并判断是否等于本区域编号,如果是则发现复制节点,否则扫描其邻居列表,判断是否存在与该新节点相等的邻居ID,如果是则发现复制节点。6) A new node joins, and the new node broadcasts its ID and area number; the neighbor node receives the broadcast information and judges whether it is equal to the area number, and if so, finds the duplicate node, otherwise scans its neighbor list to determine whether there is an ID related to the new node. Neighbor IDs for nodes equal, if so to discover duplicate nodes. 2.如权利要求1所述的检测方法,其特征在于,还具有步骤2. detection method as claimed in claim 1, is characterized in that, also has the step 7)新节点随机选择一个非空的邻区域发送验证信息,并指定该邻区域其中一个节转发验证信息;收到验证信息的节点通过扫描邻居列表和临时列表的ID对比,如果为相等的ID,则判断该新节点为复制节点的二次检测步骤。7) The new node randomly selects a non-empty adjacent area to send the verification information, and specifies one of the nodes in the adjacent area to forward the verification information; the node receiving the verification information compares the IDs of the neighbor list and the temporary list by scanning, if they are equal IDs , the second detection step of judging that the new node is a duplicate node.
CN2011100654806A 2011-03-16 2011-03-16 Method for detecting node attack of wireless sensor network Expired - Fee Related CN102143495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100654806A CN102143495B (en) 2011-03-16 2011-03-16 Method for detecting node attack of wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100654806A CN102143495B (en) 2011-03-16 2011-03-16 Method for detecting node attack of wireless sensor network

Publications (2)

Publication Number Publication Date
CN102143495A CN102143495A (en) 2011-08-03
CN102143495B true CN102143495B (en) 2013-12-18

Family

ID=44410658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100654806A Expired - Fee Related CN102143495B (en) 2011-03-16 2011-03-16 Method for detecting node attack of wireless sensor network

Country Status (1)

Country Link
CN (1) CN102143495B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037024B (en) * 2012-12-05 2016-06-29 华为技术有限公司 Method and device for dividing node subdomain attribution
CN103024745B (en) * 2012-12-05 2015-08-26 暨南大学 The detection method of replica node in a kind of wireless sensor network
CN104702606B (en) * 2015-03-12 2018-01-19 北京理工大学 A kind of Distributed Wireless Sensor Networks Node replication attack detection method
CN106385419B (en) * 2016-09-21 2019-10-08 北京联合大学 Key management method of wireless sensor network and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159748A (en) * 2007-11-14 2008-04-09 北京科技大学 An Entity Authentication Method in Wireless Sensor Networks
CN101610510A (en) * 2009-06-10 2009-12-23 南京邮电大学 Multi-Authentication Method of Node Legitimacy in Layer-Cluster Wireless Ad Hoc Networks
CN101765095A (en) * 2009-12-14 2010-06-30 浙江大学 Tracking method for wireless sensor network moving target based on mixed cluster

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7804803B2 (en) * 2005-07-25 2010-09-28 Honeywell International Inc. Neighbor based TDMA slot assignment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159748A (en) * 2007-11-14 2008-04-09 北京科技大学 An Entity Authentication Method in Wireless Sensor Networks
CN101610510A (en) * 2009-06-10 2009-12-23 南京邮电大学 Multi-Authentication Method of Node Legitimacy in Layer-Cluster Wireless Ad Hoc Networks
CN101765095A (en) * 2009-12-14 2010-06-30 浙江大学 Tracking method for wireless sensor network moving target based on mixed cluster

Also Published As

Publication number Publication date
CN102143495A (en) 2011-08-03

Similar Documents

Publication Publication Date Title
Xing et al. Real-time detection of clone attacks in wireless sensor networks
CN101309151B (en) Safe positioning method for wireless sensor
CN102143495B (en) Method for detecting node attack of wireless sensor network
Fotohi et al. A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks
Cho et al. Classification and experimental analysis for clone detection approaches in wireless sensor networks
AU2013100319A4 (en) Apparatus and method for Malicious Node Detection for Network Security Based on Uncertain Decisions
Mishra et al. A comparative analysis of node replica detection schemes in wireless sensor networks
Han et al. A two-step secure localization for wireless sensor networks
CN101594271A (en) Establishment and working methods of wireless ad hoc networks and related networks and equipment
Dorri et al. A new approach for detecting and eliminating cooperative black hole nodes in MANET
CN102378217A (en) Beacon node credit assessment method in localization in wireless sensor networks
Moore A collusion attack on pairwise key predistribution schemes for distributed sensor networks
CN103024745B (en) The detection method of replica node in a kind of wireless sensor network
CN103491542B (en) The sewage pool attack intrusion detection method of Multi-path route in underwater sensor network
Lalar et al. An efficient tree-based clone detection scheme in wireless sensor network
Guo et al. Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks
CN112929882B (en) A method to identify witch nodes and overlapping nodes
Liu Protecting neighbor discovery against node compromises in sensor networks
Alhindawi et al. Node-replication attack detection in vehicular Ad-hoc networks based on automatic approach
Raj et al. Sink Hole attack detection using two step verification technique in wireless sensor networks
Daniel et al. A survey on detection of clones in wireless sensor networks
Qu et al. A robust key predistribution scheme for wireless sensor networks
Grewal et al. A survey on proficient techniques to mitigate clone attack in wireless sensor networks
Gupta et al. Wireless Sensor Networks:“A Review on Replica Detection Techniques”
CN107623553B (en) A Robust Cooperative Spectrum Sensing Method Based on Reliable Evaluation Criteria

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 605 room 6, 528400 Xinhua Road, Zhongshan Town, Guangdong, China

Applicant after: Zhongshan Iker Digital Technology Co., Ltd.

Address before: 605 room 6, 528400 Xinhua Road, Zhongshan Town, Guangdong, China

Applicant before: Zhongshan Aike Digital Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: ZHONGSHAN AIKE DIGITAL TECHNOLOGY CO., LTD. TO: ZHONGSHAN IKER DIGITAL TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180425

Address after: 528400 one of the 25 floors of the 1 building of Tazhong square, No. 1 East Convention and exhibition hall, Torch Development Zone, Zhongshan, Guangdong, China.

Patentee after: Guangdong Zen science and Technology Co., Ltd.

Address before: 528400 room 605, Xinhua Road 6, triangle town, Zhongshan, Guangdong.

Patentee before: Zhongshan Iker Digital Technology Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131218

Termination date: 20200316