[go: up one dir, main page]

CN101453733B - Wormhole attack detection method based on monitor node in wireless Mesh network - Google Patents

Wormhole attack detection method based on monitor node in wireless Mesh network Download PDF

Info

Publication number
CN101453733B
CN101453733B CN2008102276970A CN200810227697A CN101453733B CN 101453733 B CN101453733 B CN 101453733B CN 2008102276970 A CN2008102276970 A CN 2008102276970A CN 200810227697 A CN200810227697 A CN 200810227697A CN 101453733 B CN101453733 B CN 101453733B
Authority
CN
China
Prior art keywords
nodes
node
wormhole
monitoring
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008102276970A
Other languages
Chinese (zh)
Other versions
CN101453733A (en
Inventor
何泾沙
付颖芳
李国瑞
肖鹏
王戎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN2008102276970A priority Critical patent/CN101453733B/en
Publication of CN101453733A publication Critical patent/CN101453733A/en
Application granted granted Critical
Publication of CN101453733B publication Critical patent/CN101453733B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a wormhole attack detection method based on monitoring nodes in a wireless Mesh network, which belongs to the field of computer network. When a source node transmits information to a destination node, all the monitoring nodes on a path monitor the transmission conditions of packages of corresponding links; if the packet loss ratio of a certain link is found to be more than a maximum threshold value after statistics, a monitoring node reports to a regional router and indicates that the link is wormhole; the regional router starts a voting mechanism based on the monitoring node, and two nodes at both ends of the link are wormhole attack nodes if most monitoring nodes vote that the link is wormhole; the regional router temporarily isolates the two nodes and transmitsreport information to a core router; and the core router cancels authorization certificates of the two wormhole attack nodes and expels the two wormhole attack nodes out of the network. The method can guarantee that malicious attack nodes of the wireless Mesh network are detected and isolated when launching a wormhole attack by utilization of high bandwidth.

Description

无线Mesh网络中基于监视节点的虫洞攻击检测方法 Wormhole attack detection method based on monitoring nodes in wireless mesh network

技术领域technical field

本发明涉及一种基于监视节点的虫洞攻击检测方法,可以应用于无线Mesh网中利用高带宽发起虫洞攻击的检测,属于计算机网络领域。The invention relates to a monitoring node-based wormhole attack detection method, which can be applied to the detection of wormhole attacks initiated by using high bandwidth in a wireless Mesh network, and belongs to the field of computer networks.

背景技术Background technique

在无线Mesh网中,现有的路由协议大多假定通信双方处在一个安全的环境下通信,更多的只是关注路由的选路及其策略,很少考虑安全问题。然而,由于Mesh客户端也具有路由的角色,Mesh节点可以根据路由信息创建、删除或者更新网络中的路由路径来发起各种攻击。虫洞攻击就是其中十分危险的攻击方式。虫洞攻击是两个串谋恶意节点X、Y通过建立一条高质量高带宽的私有通道,攻击者在网络中的X位置上记录数据包或位信息,通过此私有通道将窃取的信息传递到网络的另外一个位置Y处。因为私有通道的距离一般大于单跳无线传递,所以通过私有通道传递的数据包比通过正常多跳路径传递的数据包早到达目的节点。当通信用户选取X和Y的私有通道,进行通信时,X和Y就会发起丢弃全部包或只转发部分包,修改包等攻击行为。这种即使网络通讯间存在信任和身份认证,而攻击者并无密钥时仍能够进行攻击。更糟的是,不像路由协议中的恶意节点,它们能够被轻易定位,虫洞攻击者对于较高层是不可见的,虫洞和位于虫洞两端的攻击者在路径中是不可见的。因此,需要一种更为安全的措施来检测虫洞攻击以确保无线Mesh网的应用安全。加利福尼亚大学伯克利分校的Sastry,Shnakar和Wagner提出Eeho协议,在该协议中,只有属于使用射频或超声的无线网络的节点才能在证明区域中。未被证明的节点为了证明自己在证明的区域里,发送一个超声信号给已证明的节点,己被证明的节点通过它得到的收到超声信号的时间确定这个未被证明的节点是否在证明的区域中。此协议的优点是不需要加密技术和严格时钟同步。尽管射频信号被用于大部分无线网络设备中,但为了检测出虫洞攻击,每个网络设备需要额外的设备来检测和发射超声频率,这会造成网络成本的增加。He.Tian等提出了ApIT,它使用三角区域确定网络中的节点位置。该方法通过带有GPS的节点来计算某些节点是否在组成的三角区域内。这些计算确定网络中所有节点的相对位置,能够帮助防止三角区域外的虫洞攻击,但是三角区域内的虫洞攻击没法防止。Bulusu,Heidemann和Estrin利用微弱的信号强度来检测虫洞攻击,但是信号强度是个不定参数,它容易受到周围环境的干扰,同一节点,同一个位置发出的信号,因为环境的改变,而变得或强或弱。Hu.Lingxuan,DavidEvnas利用发送信号节点的天线方向与接收信号节点天线方向是否匹配来确定是否有虫洞攻击,这种限制,对可静可动的Mesh节点之间随意的移动和随意的通信是一种限制。Yih-Chun Hu等提出了基于数据包限制(PaeketLeashes)方法,这种方法通过在数据包里加入区域性限制或时域性限制来限制发送节点的最大传输距离。同时协议采用TIK认证协议来检测并防御虫洞攻击,即匹配每个数据包中上述的时间戳和位置戳以检测系统中是否有虫洞入侵。这种TIK协议中每个节点都有个公钥,且每个节点要将公钥公开给其它用户,这增加了每个节点的存储空间以及网络的带宽。In wireless Mesh networks, most of the existing routing protocols assume that the communication parties communicate in a safe environment, and more focus on routing and routing strategies, and rarely consider security issues. However, because the Mesh client also has the role of routing, Mesh nodes can create, delete or update routing paths in the network according to routing information to launch various attacks. Wormhole attack is one of the most dangerous attack methods. Wormhole attack is two malicious nodes X and Y who conspire to establish a high-quality and high-bandwidth private channel. The attacker records data packets or bit information at position X in the network, and transmits the stolen information to Another location Y in the network. Because the distance of the private channel is generally greater than the single-hop wireless transmission, the data packets transmitted through the private channel reach the destination node earlier than the data packets transmitted through the normal multi-hop path. When communication users choose the private channel of X and Y to communicate, X and Y will initiate attack behaviors such as discarding all packets or only forwarding some packets, modifying packets, etc. Even if there is trust and identity authentication between network communications, the attacker can still attack when he does not have the key. Worse, unlike malicious nodes in routing protocols, which can be easily located, wormhole attackers are invisible to higher layers, and the wormhole and attackers at the ends of the wormhole are invisible along the path. Therefore, a more secure measure is needed to detect wormhole attacks to ensure the application security of wireless mesh networks. Sastry, Shnakar, and Wagner at the University of California, Berkeley proposed the Eeho protocol, in which only nodes belonging to a wireless network using radio frequency or ultrasound can be in the attestation zone. The uncertified node sends an ultrasonic signal to the certified node in order to prove that it is in the certified area, and the certified node determines whether the uncertified node is in the certified node through the time it receives the ultrasonic signal. in the area. The advantage of this protocol is that no encryption technology and strict clock synchronization are required. Although radio frequency signals are used in most wireless network devices, in order to detect a wormhole attack, each network device requires an additional device to detect and emit ultrasonic frequencies, which increases the cost of the network. He.Tian et al. proposed ApIT, which uses triangular areas to determine node locations in the network. This method uses nodes with GPS to calculate whether some nodes are within the triangular area formed. These calculations determine the relative positions of all nodes in the network, which can help prevent wormhole attacks outside the triangle area, but wormhole attacks inside the triangle area cannot be prevented. Bulusu, Heidemann and Estrin used weak signal strength to detect wormhole attacks, but the signal strength is an uncertain parameter, it is easily interfered by the surrounding environment, the same node, the same location of the signal, because of the change of the environment, become or strong or weak. Hu.Lingxuan, DavidEvnas determine whether there is a wormhole attack by matching the antenna direction of the node sending the signal with the antenna direction of the node receiving the signal. a limitation. Yih-Chun Hu et al. proposed a method based on data packet restrictions (PaeketLeashes), which limits the maximum transmission distance of the sending node by adding regional restrictions or time-domain restrictions to the data packets. At the same time, the protocol uses the TIK authentication protocol to detect and defend against wormhole attacks, that is, to match the above-mentioned timestamp and location stamp in each data packet to detect whether there is a wormhole intrusion in the system. In this TIK protocol, each node has a public key, and each node must disclose the public key to other users, which increases the storage space of each node and the bandwidth of the network.

发明内容Contents of the invention

为了防止无线Mesh网中恶意攻击节点利用高带宽发起虫洞攻击,我们提出了一种基于监视节点的虫洞攻击检测方法,以确保恶意攻击节点在发起虫洞攻击时能被检测出来并被隔离。In order to prevent malicious attack nodes from using high bandwidth to launch wormhole attacks in wireless Mesh networks, we propose a wormhole attack detection method based on monitoring nodes to ensure that malicious attack nodes can be detected and isolated when launching wormhole attacks .

本发明提供了一种面向虫洞攻击检测的网络模型,该网络模型有如下特征:The present invention provides a network model for wormhole attack detection, the network model has the following characteristics:

(1)有一个骨干网,骨干网中至少有两个骨干路由器,这些骨干路由器按门限体制形成虚拟CA、一个被通知有攻击节点存在的情况下才接入网络的离线CA、一个只有骨干路由器才能访问的授权证书库。在所有的骨干路由器中,至少有两个骨干路由器与Internet网有线连接;(1) There is a backbone network, and there are at least two backbone routers in the backbone network. These backbone routers form a virtual CA according to the threshold system, an offline CA that accesses the network only when an attack node is notified, and a backbone router The authorized certificate store that can only be accessed. Among all the backbone routers, at least two backbone routers are connected to the Internet by wire;

(2)至少两个区域网,每个区域网中有2个区域路由器,每个区域路由器与骨干路由器和终端用户相连。区域路由器之间共享一个存放用户ID、区域ID、授权密钥及用户信息(身份证、邮箱、通信地址、移动电话)的数据库。(2) At least two area networks, each area network has two area routers, and each area router is connected to the backbone router and end users. Area routers share a database storing user IDs, area IDs, authorization keys, and user information (identity cards, mailboxes, mailing addresses, and mobile phones).

(3)在骨干网中采用高速无线连接,在区域网中采用低速连接;(3) High-speed wireless connection is adopted in the backbone network, and low-speed connection is adopted in the regional network;

(4)通信双方通信通过授权证书进行相互验证,采用基于身份的加密方式来传输信息;(4) The communication between the two parties communicates with each other through the authorization certificate, and uses identity-based encryption to transmit information;

(5)源节点和目的节点都不是攻击节点,至少一个区域路由器和构成虚拟CA的骨干路由器不是恶意攻击节点;(5) Neither the source node nor the destination node is an attack node, and at least one area router and the backbone router forming the virtual CA are not malicious attack nodes;

本发明提出一种无线Mesh网络中基于监视节点的虫洞攻击检测方法,其特征在于,包括以下步骤:The present invention proposes a wormhole attack detection method based on monitoring nodes in a wireless Mesh network, which is characterized in that, comprising the following steps:

(1)离线CA在初始化时,为骨干路由器、区域路由器、用户节点分配公私钥对及公钥证书,为骨干网络和各区域网络分配公私钥对;(1) When the offline CA is initialized, it distributes public-private key pairs and public key certificates for backbone routers, regional routers, and user nodes, and distributes public-private key pairs for backbone networks and regional networks;

(2)申请节点提交离线CA颁发的公钥证书到虚拟CA,虚拟CA用离线CA颁发的公钥证书认证申请节点;这些申请节点包括用户节点、骨干路由器和区域路由器;(2) The application node submits the public key certificate issued by the offline CA to the virtual CA, and the virtual CA authenticates the application node with the public key certificate issued by the offline CA; these application nodes include user nodes, backbone routers and area routers;

(3)申请节点被虚拟CA认证通过后,颁发授权证书及基于身份的私钥,这些授权证书都存放在授权证书库里,该授权证书库只有骨干路由器能访问;(3) After the application node is authenticated by the virtual CA, an authorization certificate and an identity-based private key are issued. These authorization certificates are stored in the authorization certificate library, which can only be accessed by the backbone router;

(4)区域路由器根据用户的数据存储能力、安全级别来选择监视节点。监视节点是具有这样特性一类的节点,即它能监视某条链路的发包情况,并把发包记录存在它的缓存中。例如,如果节点C是链路A-B的监视节点,那么A和B都C是邻居节点,A和B收发包情况都在C的监视中,即A和B发了什么包,C就会把所发包的标识及发包节点的标识一起存放在它的缓存中。(4) The area router selects the monitoring node according to the user's data storage capacity and security level. A monitoring node is a type of node with the characteristic that it can monitor the packet sending of a certain link and store the sending packet record in its cache. For example, if node C is the monitoring node of link A-B, then both A and B are neighbor nodes, and C is monitoring the sending and receiving of packets between A and B. The identifier of the sender and the identifier of the sender node are stored in its cache together.

(5)当发送节点与接收节点进行通信的时候,监视节点监视这条链路所有包的进出状况,并记录在缓存中,再采用如下所述检测流程,来检测是否有虫洞攻击,检测流程如图1所示;(5) When the sending node communicates with the receiving node, the monitoring node monitors the incoming and outgoing status of all packets on this link, and records them in the cache, and then uses the following detection process to detect whether there is a wormhole attack, detect The process is shown in Figure 1;

(6)如果监视节点监视某个发送节点发送了x个包,接收节点在接收包后再转发包的时候转发了y个包,监视节点统计包的丢失率γ=(x-y/x)×100%,如果γ>τ,那么就认为有虫洞攻击存在,监视节点就会举报给区域路由器指出这条链路为虫洞。在式子γ>τ中,γ是包的丢失率,τ是系统指定包的丢失率的最大门限,τ值根据网络正常运转时的正常丢包率来设定;(6) If the monitoring node monitors that a sending node sends x packets, and the receiving node forwards y packets after receiving the packets, the packet loss rate of the monitoring node statistics γ=(x-y/x)×100 %, if γ>τ, then it is considered that there is a wormhole attack, and the monitoring node will report to the area router that this link is a wormhole. In the formula γ>τ, γ is the packet loss rate, τ is the maximum threshold of the packet loss rate specified by the system, and the value of τ is set according to the normal packet loss rate when the network is in normal operation;

(7)区域路由器收到监视节点的举报信息时,区域路由器将启动基于监视节点的投票机制,即主动呼叫或被动的在一定时间内统计其它监视节点的举报结果;(7) When the regional router receives the report information from the monitoring node, the regional router will start the voting mechanism based on the monitoring node, that is, actively call or passively count the reporting results of other monitoring nodes within a certain period of time;

(8)如果大多数监视节点都投票这链路为虫洞,即这链路两端的两个节点为虫洞攻击节点,区域路由器对虫洞攻击节点进行暂时隔离;(8) If most of the monitoring nodes vote this link as a wormhole, that is, the two nodes at both ends of the link are wormhole attack nodes, and the area router temporarily isolates the wormhole attack nodes;

(9)区域路由器同时把这攻击信息公布给整个区域网络的用户和骨干路由器;(9) The area router publishes the attack information to users and backbone routers in the entire area network at the same time;

(10)骨干路由器将撤销两个虫洞攻击节点的授权证书,从而把这两个虫洞攻击节点逐出网络;(10) The backbone router will revoke the authorization certificates of the two wormhole attack nodes, thereby expelling the two wormhole attack nodes from the network;

在步骤中用户之间的通信、监视节点举报信息给区域路由器以及区域路由器举报信息给骨干路由器都采用基于身份的加密方法。In the steps, the communication between users, the monitoring node reporting information to the area router, and the area router reporting information to the backbone router all adopt identity-based encryption methods.

本发明的目的是为无线Mesh网用户免遭利用高带宽发起虫洞攻击而提出的一种基于监视节点的虫洞攻击检测方法。使用该方法可以确保无线Mesh网恶意攻击节点在利用高带宽发起虫洞攻击时能被及时检测出来并被隔离,保证网络的安全性;且与Sastry,Shnakar和Wagner提出的Eeho协议相比,我们的机制不需要每个网络设备有额外的设备来检测和发射超声频率;与He.Tian等提出的ApIT检测方法相比,我们的误检率大大提高,因为ApIT检测方法对特定三角区域内的虫洞没法检测出来,而我们利用大量的统计方法,根据网络规模、用户日常行为特征设定丢包率的门限值τ,所以我们的方法对特定三角区域的虫洞也能检测出来;与Bulusu,Heidemann和Estrin利用微弱的信号强度来检测虫洞攻击方法相比,我们的机制不依赖受环境因素很大影响的信号强弱来检测虫洞攻击;与Hu.Lingxuan,DavidEvnas利用发送信号节点的天线方向与接收信号节点天线方向是否匹配来确定来检测虫洞攻击的方法相比,我们的机制不依靠天线角度的匹配来检测虫洞攻击;与Yih-Chun Hu等提出了基于数据包限制的检测方法相比,我们的机制采用基于身份的加密方法,这大大减少网络因存储公钥和公开公钥所需要的存储空间和带宽。可见我们的虫洞攻击检测机制是一种有效的、可用性强的、能抵御虫洞攻击的检测方法,能预防和缓解遭受信息包被丢弃、修改、泄露等虫洞攻击的行为,达到了我们预期的目标。The purpose of the present invention is to provide a monitoring node-based wormhole attack detection method for wireless Mesh network users from launching wormhole attacks with high bandwidth. Using this method can ensure that malicious attack nodes in wireless Mesh networks can be detected and isolated in time when using high bandwidth to launch wormhole attacks, ensuring network security; and compared with the Eeho protocol proposed by Sastry, Shnakar and Wagner, our The mechanism does not require each network device to have additional equipment to detect and emit ultrasonic frequencies; compared with the ApIT detection method proposed by He. Wormholes cannot be detected, but we use a large number of statistical methods to set the threshold value τ of the packet loss rate according to the network scale and daily behavior characteristics of users, so our method can also detect wormholes in specific triangular areas; Compared with Bulusu, Heidemann and Estrin who use weak signal strength to detect wormhole attacks, our mechanism does not rely on signal strength greatly affected by environmental factors to detect wormhole attacks; Compared with the method of detecting wormhole attacks by determining whether the antenna direction of the node matches the antenna direction of the node receiving the signal, our mechanism does not rely on the matching of antenna angles to detect wormhole attacks; and Yih-Chun Hu et al. Compared with limited detection methods, our mechanism adopts an identity-based encryption method, which greatly reduces the storage space and bandwidth required by the network for storing public keys and publishing public keys. It can be seen that our wormhole attack detection mechanism is an effective, highly usable, and able to resist wormhole attack detection method. expected target.

附图说明Description of drawings

图1本发明的检测流程图Fig. 1 detection flowchart of the present invention

图2本发明的攻击模型图Fig. 2 attack model diagram of the present invention

图3本发明的网络模型图Fig. 3 network model figure of the present invention

具体实施方式Detailed ways

本发明针对微软公司为无线Mesh网研发的支持多射频的链路质量源路由MR-LQSR(Multi-Radio Link-Quality Source Routing)协议提出一种利用高带宽来发起虫洞攻击的攻击模型。The present invention proposes an attack model that uses high bandwidth to launch a wormhole attack for the MR-LQSR (Multi-Radio Link-Quality Source Routing) protocol developed by Microsoft for wireless Mesh networks that supports multiple radio frequencies.

MR-LQSR协议采用一种新的路由性能判据,称为加权累计传输时间WCETT(Weighted Cumulative Expected Transmission Time)。其表达式如方程(1)和方程(2)所示:The MR-LQSR protocol adopts a new routing performance criterion called Weighted Cumulative Expected Transmission Time (WCETT). Its expression is shown in equation (1) and equation (2):

WCETTWCETT == (( 11 -- ββ )) ** ΣΣ ii == 11 hh ETTETT ii ++ ββ ** maxmax 11 ≤≤ jj ≤≤ kk xx jj -- -- -- (( 11 ))

在方程(1)和方程(2)中,h是某条路由经过h跳链路的数目,k是系统中采用的信道数目,ETTi是在链路i上传输一个包的传输时间,xj是信道j上传输包所需要的时间,β是一个可变参数值,其范围为0≤β≤1。当所有信道都能被充分利用,β=0。WCETT综合考虑了带宽等链路性能参数以及最小跳数等因素,但所有信道都被充分利用或WCETT权值相等时,两恶意攻击节点会利用该路由协议的弱点,发起虫洞攻击。如攻击模型图2所示,源节点S想找一条最佳路由与目的节点D通信。恶意节点X和Y在他们之间建立一条高带宽私有隧道,这样从源节点S到目的节点D有三条路由,即S-E-F-D-G-H-D、S-Q-X-A-B-C-Y以及S-Q-X-Y-D。因为S-Q-X-Y-D的WCETT值是10,S-Q-X-A-B-C-Y的WCETT值是11,S-E-F-D-G-H-D的WCETT值是12。在这三条路有中,目的节点D将选择因带宽高而使WCETT值最小的S-Q-X-Y-D为最佳路由。当源节点S把信息包沿路由S-Q-X-Y-D发给目的节点D时,恶意攻击节点X和Y就发起攻击,比如删除包,只转发部分包,修改包等。In Equation (1) and Equation (2), h is the number of links that a route passes through h hops, k is the number of channels used in the system, ETT i is the transmission time for transmitting a packet on link i, x j is the time required to transmit packets on channel j, and β is a variable parameter value in the range of 0≤β≤1. When all channels can be fully utilized, β=0. WCETT comprehensively considers link performance parameters such as bandwidth and minimum hops and other factors, but when all channels are fully utilized or WCETT weights are equal, two malicious attack nodes will use the weakness of the routing protocol to launch a wormhole attack. As shown in Figure 2 of the attack model, the source node S wants to find an optimal route to communicate with the destination node D. Malicious nodes X and Y establish a high-bandwidth private tunnel between them, so there are three routes from source node S to destination node D, namely SEFDGHD, SQXABCY and SQXYD. Because the WCETT value of SQXYD is 10, the WCETT value of SQXABCY is 11, and the WCETT value of SEFDGHD is 12. Among the three routes, the destination node D will choose the SQXYD with the smallest WCETT value due to its high bandwidth as the best route. When the source node S sends the information packet to the destination node D along the route SQXYD, the malicious attack nodes X and Y will launch an attack, such as deleting the packet, forwarding only part of the packet, modifying the packet, etc.

为了实现上述目标,我们实施如图3所示的网络模型,再利用基于监视节点的虫洞攻击检测方法来检测出虫洞攻击点并隔离它。In order to achieve the above goals, we implement the network model shown in Figure 3, and then use the monitoring node-based wormhole attack detection method to detect the wormhole attack point and isolate it.

1.网络模型1. Network model

所设计的网络模型如图3所示,该模型具有如下特征:The designed network model is shown in Figure 3, which has the following characteristics:

(1)整个无线Mesh网由一个骨干网和两个区域网络组成。(1) The whole wireless Mesh network is composed of a backbone network and two regional networks.

(2)骨干网由4个骨干路由器组成,一个被通知有攻击节点存在的情况下才接入网络的离线CA和一个只有骨干路由器才能访问的授权证书库。在所有的骨干路由器中,有两个骨干路由器与Internet网有线连接。(2) The backbone network consists of 4 backbone routers, an offline CA that accesses the network only when an attack node is notified, and an authorized certificate library that only the backbone routers can access. Among all the backbone routers, there are two backbone routers connected to the Internet by wire.

(3)每个区域网中有2个区域路由器与骨干路由器和终端用户相连。区域路由器之间共享一个存放用户ID、区域ID、授权密钥及用户信息(身份证、邮箱、通信地址、移动电话)的数据库。(3) In each area network, there are 2 area routers connected to the backbone router and end users. Area routers share a database storing user IDs, area IDs, authorization keys, and user information (identity cards, mailboxes, mailing addresses, and mobile phones).

(4)在骨干网中采用54Mbps无线连接,在区域网中采用11Mbps连接;(4) 54Mbps wireless connection is adopted in the backbone network, and 11Mbps connection is adopted in the regional network;

(5)通信双方通信通过骨干网的4个骨干路由器按(4,3)门限体制授予申请节点基于身份的私钥和授权证书;授权证书进行相互验证,采用基于身份的加密方式来传输信息;(5) The communication parties communicate through the four backbone routers of the backbone network to grant the identity-based private key and authorization certificate to the application node according to the (4,3) threshold system; the authorization certificates are mutually verified, and the identity-based encryption method is used to transmit information;

(6)源节点和目的节点都不是攻击节点,至少一个区域路由器和m个骨干路由器不是恶意攻击节点;(6) Neither the source node nor the destination node is an attack node, and at least one area router and m backbone routers are not malicious attack nodes;

(7)每个节点的地理位置都能通过GPS(Global Positioning System)准确地得到。(7) The geographic location of each node can be accurately obtained through GPS (Global Positioning System).

2.检测步骤2. Detection steps

以攻击模型图2为例来说明我们的虫洞攻击检测方法能达到检测利用高带宽发起的虫洞攻击。Take the attack model Figure 2 as an example to illustrate that our wormhole attack detection method can detect wormhole attacks using high bandwidth.

(1)离线CA在初始化时,为骨干路由器、区域路由器、用户节点分配公私钥对及公钥证书,为骨干网络和各区域网络分配公私钥对;(1) When the offline CA is initialized, it distributes public-private key pairs and public key certificates for backbone routers, regional routers, and user nodes, and distributes public-private key pairs for backbone networks and regional networks;

(2)申请节点提交离线CA颁发的公钥证书到虚拟CA,虚拟CA用离线CA颁发的公钥证书认证申请节点;这些申请节点包括用户节点、骨干路由器和区域路由器;(2) The application node submits the public key certificate issued by the offline CA to the virtual CA, and the virtual CA authenticates the application node with the public key certificate issued by the offline CA; these application nodes include user nodes, backbone routers and area routers;

(3)申请节点被虚拟CA认证通过后,颁发授权证书及基于身份的私钥,这些授权证书都存放在授权证书库里,该授权证书库只有骨干路由器能访问;(3) After the application node is authenticated by the virtual CA, an authorization certificate and an identity-based private key are issued. These authorization certificates are stored in the authorization certificate library, which can only be accessed by the backbone router;

(4)区域路由器根据用户的数据存储能力、安全级别来指定监视节点。在攻击模型图2中,区域路由器指定节点I是链路Q-X的监视节点,节点A、B、C、P、K以及节点M是链路X-Y的监视节点,L是链路Y-D的监视节点;(4) The area router designates monitoring nodes according to the user's data storage capacity and security level. In the attack model diagram 2, the area router designates node I as the monitoring node of link Q-X, nodes A, B, C, P, K and node M as the monitoring node of link X-Y, and L as the monitoring node of link Y-D;

(5)当源节点S沿路由S-Q-X-Y-D发送数据包给目的节点D时,监视节点I监视链路Q-X的发包情况,监视节点L监视链路Y-D的发包情况,并把发包情况记录在各自的缓存中,再采用如下所述检测流程,来检测是否有虫洞攻击,检测流程如图1所示;(5) When the source node S sends a data packet to the destination node D along the route S-Q-X-Y-D, the monitoring node I monitors the packet sending situation of the link Q-X, and the monitoring node L monitors the packet sending situation of the link Y-D, and records the packet sending situation in their respective buffers , and then use the following detection process to detect whether there is a wormhole attack, the detection process is shown in Figure 1;

(6)当恶意发送节点X发送了x个包,恶意接收节点Y在转发包的时候只转发了y个包,监视节点A、B、C、P、K以及节点M统计包的丢失率γ=(x-y/x)×100%,如果γ>τ,那么就认为有虫洞攻击存在,并举报给区域路由器Zr,在式子γ>τ中,γ是包的丢失率,τ是系统指定包的丢失率的最大门限,τ的值根据网络正常运转时的丢包率来设定。在我们的实施中,网络正常运转时,正常丢包率小于10%,因此设定τ为10%,也就是说如果某条链路的丢包率大于10%,我们就认为该链路为虫洞;(6) When the malicious sending node X sends x packets, the malicious receiving node Y only forwards y packets when forwarding the packets, and the monitoring nodes A, B, C, P, K and node M count the packet loss rate γ =(x-y/x)×100%, if γ>τ, then it is considered that there is a wormhole attack, and reported to the area router Zr, in the formula γ>τ, γ is the packet loss rate, τ is the system specified The maximum threshold of the packet loss rate. The value of τ is set according to the packet loss rate when the network is in normal operation. In our implementation, when the network is operating normally, the normal packet loss rate is less than 10%, so we set τ as 10%, that is to say, if the packet loss rate of a link is greater than 10%, we consider the link to be Wormhole;

(7)区域路由器Zr收到第一条举报信息的时候,区域路由器将启动基于监视节点的投票机制,即主动呼叫这条链路的所有监视节点返回监视这条链路发包情况或被动的在一定时间内统计其它监视节点的举报结果;(7) When the area router Zr receives the first report message, the area router will start the voting mechanism based on the monitoring nodes, that is, all the monitoring nodes that actively call this link will return to monitor the packet sending situation of this link or passively Count the reporting results of other monitoring nodes within a certain period of time;

(8)如果监视节点A、B、C、P、K以及节点M中,有4个以上的监视节点都投票X-Y链路为虫洞,X和Y这两个节点为虫洞攻击节点,那么区域路由器Zr对虫洞攻击节点X和Y进行暂时隔离;(8) If more than 4 monitoring nodes among monitoring nodes A, B, C, P, K, and node M all vote for the X-Y link as a wormhole, and the two nodes X and Y are wormhole attack nodes, then The regional router Zr temporarily isolates the wormhole attack nodes X and Y;

(9)区域路由器Zr同时把这攻击信息公布给整个区域网络的用户和骨干路由器Br;(9) The area router Zr publishes the attack information to users and the backbone router Br of the entire area network at the same time;

(10)骨干路由器Br将撤销两个虫洞攻击节点X和Y的授权证书,从而把这X和Y这两个节点逐出网络;(10) The backbone router Br will revoke the authorization certificates of the two wormhole attack nodes X and Y, thereby expelling these two nodes X and Y from the network;

用户之间的通信、监视节点举报信息给区域路由器Zr以及区域路由器Zr举报信息给骨干路由器Br都采用基于身份的加密方法。The communication between users, the monitoring node reporting information to the area router Zr, and the area router Zr reporting information to the backbone router Br all use identity-based encryption methods.

Claims (1)

1.一种无线Mesh网络中基于监视节点的虫洞攻击检测方法,其特征在于,包括以下步骤:1. a wormhole attack detection method based on monitoring node in a wireless Mesh network, is characterized in that, comprises the following steps: (1)离线CA在初始化时,为骨干路由器、区域路由器、用户节点分配公私钥对及公钥证书,为骨干网络和各区域网络分配公私钥对;(1) When the offline CA is initialized, it distributes public-private key pairs and public key certificates for backbone routers, regional routers, and user nodes, and distributes public-private key pairs for backbone networks and regional networks; (2)申请节点提交离线CA颁发的公钥证书到虚拟CA,虚拟CA用离线CA颁发的公钥证书认证申请节点;这些申请节点包括用户节点、骨干路由器和区域路由器;(2) The application node submits the public key certificate issued by the offline CA to the virtual CA, and the virtual CA authenticates the application node with the public key certificate issued by the offline CA; these application nodes include user nodes, backbone routers and area routers; (3)申请节点被虚拟CA认证通过后,颁发授权证书及基于身份的私钥,这些授权证书都存放在授权证书库里,该授权证书库只有骨干路由器能访问;(3) After the application node is authenticated by the virtual CA, an authorization certificate and an identity-based private key are issued. These authorization certificates are stored in the authorization certificate library, which can only be accessed by the backbone router; (4)区域路由器根据用户的数据存储能力、安全级别来选择监视节点;监视某条链路的发包情况,并把发包记录存在它的缓存中;(4) The regional router selects the monitoring node according to the user's data storage capacity and security level; monitors the packet sending situation of a certain link, and stores the packet sending record in its cache; (5)当发送节点与接收节点进行通信的时候,监视节点监视这条链路所有包的进出状况,并记录在缓存中,再采用如下检测流程,来检测是否有虫洞攻击;(5) When the sending node communicates with the receiving node, the monitoring node monitors the incoming and outgoing status of all packets on this link, and records them in the cache, and then uses the following detection process to detect whether there is a wormhole attack; (6)如果监视节点监视某个发送节点发送了x个包,接收节点在接收包后再转发包的时候转发了y个包,监视节点统计包的丢失率γ=(x-y)/x×100%,如果γ>τ,那么就认为有虫洞攻击存在,监视节点就会举报给区域路由器指出这条链路为虫洞;在式子γ>τ中,γ是包的丢失率,τ是系统指定包的丢失率的最大门限,τ值根据网络正常运转时的正常丢包率来设定;(6) If the monitoring node monitors that a sending node sends x packets, and the receiving node forwards y packets after receiving the packets, the packet loss rate of the monitoring node statistics γ=(x-y)/x×100 %, if γ>τ, then it is considered that there is a wormhole attack, and the monitoring node will report to the area router that this link is a wormhole; in the formula γ>τ, γ is the packet loss rate, and τ is The system specifies the maximum threshold of packet loss rate, and the value of τ is set according to the normal packet loss rate when the network is in normal operation; (7)区域路由器收到监视节点的举报信息时,区域路由器将启动基于监视节点的投票机制,即主动呼叫或被动的统计其它监视节点的举报结果;(7) When the regional router receives the report information from the monitoring node, the regional router will start the voting mechanism based on the monitoring node, that is, actively call or passively count the reporting results of other monitoring nodes; (8)如果大多数监视节点都投票这链路为虫洞,即这链路两端的两个节点为虫洞攻击节点,区域路由器对虫洞攻击节点进行暂时隔离;(8) If most of the monitoring nodes vote this link as a wormhole, that is, the two nodes at both ends of the link are wormhole attack nodes, and the area router temporarily isolates the wormhole attack nodes; (9)区域路由器同时把这攻击信息公布给整个区域网络的用户和骨干路由器;(9) The area router publishes the attack information to users and backbone routers in the entire area network at the same time; (10)骨干路由器将撤销两个虫洞攻击节点的授权证书,从而把这两个虫洞攻击节点逐出网络;(10) The backbone router will revoke the authorization certificates of the two wormhole attack nodes, thereby expelling the two wormhole attack nodes from the network; 用户之间的通信、监视节点举报信息给区域路由器以及区域路由器举报信息给骨干路由器都采用基于身份的加密方法。Identity-based encryption is used for communication between users, monitoring nodes report information to area routers, and area routers report information to backbone routers.
CN2008102276970A 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network Expired - Fee Related CN101453733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102276970A CN101453733B (en) 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102276970A CN101453733B (en) 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network

Publications (2)

Publication Number Publication Date
CN101453733A CN101453733A (en) 2009-06-10
CN101453733B true CN101453733B (en) 2010-12-22

Family

ID=40735698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102276970A Expired - Fee Related CN101453733B (en) 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network

Country Status (1)

Country Link
CN (1) CN101453733B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102131193A (en) * 2010-01-12 2011-07-20 中国人民解放军总参谋部第六十一研究所 Secure routing method for converged network of wireless sensor network and computer network
CN107071780B (en) * 2017-04-17 2020-02-18 中国民航大学 A wireless mesh network malicious node detection method
CN108600210A (en) * 2018-04-17 2018-09-28 四川斐讯信息技术有限公司 A kind of voting method and wireless router based on wireless router
CN109152065B (en) * 2018-10-31 2022-03-25 重庆邮电大学 A multi-node secure network access method for industrial wireless network based on IPv6
US11075944B2 (en) * 2018-12-18 2021-07-27 SOURCE Ltd. System and method for protection of computer networks against man-in-the-middle attacks

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110670A (en) * 2006-07-17 2008-01-23 西安电子科技大学 Key Management Method Based on Wireless Mesh Network
CN101222331A (en) * 2007-01-09 2008-07-16 华为技术有限公司 Authentication server, method and system for bidirectional authentication in mesh network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110670A (en) * 2006-07-17 2008-01-23 西安电子科技大学 Key Management Method Based on Wireless Mesh Network
CN101222331A (en) * 2007-01-09 2008-07-16 华为技术有限公司 Authentication server, method and system for bidirectional authentication in mesh network

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
徐颖.无线mesh网的接入控制和密钥管理.中国优秀硕士学位论文全文数据库 信息科技辑.2007,I136-273.
徐颖.无线mesh网的接入控制和密钥管理.中国优秀硕士学位论文全文数据库 信息科技辑.2007,I136-273. *
李国瑞,何泾沙,付颖芳.无线传感器网络中动态密钥管理方案的研究.传感技术学报20 12.2007,20(12),2635-2639.
李国瑞,何泾沙,付颖芳.无线传感器网络中动态密钥管理方案的研究.传感技术学报20 12.2007,20(12),2635-2639. *
杨会宇.无线Mesh网络接入认证技术的分析与实现.中国优秀硕士学位论文全文数据库 信息科技辑.2007,I136-271.
杨会宇.无线Mesh网络接入认证技术的分析与实现.中国优秀硕士学位论文全文数据库 信息科技辑.2007,I136-271. *
黄捷.基于802.16宽带无线城域网身份认证机制的研究与实现.中国优秀硕士学位论文全文数据库 信息科技辑.2007,I136-773.
黄捷.基于802.16宽带无线城域网身份认证机制的研究与实现.中国优秀硕士学位论文全文数据库 信息科技辑.2007,I136-773. *

Also Published As

Publication number Publication date
CN101453733A (en) 2009-06-10

Similar Documents

Publication Publication Date Title
Raw et al. Security challenges, issues and their solutions for VANET
Pervaiz et al. Routing security in ad hoc wireless networks
Gupte et al. Secure routing in mobile wireless ad hoc networks
Yu et al. HADOF: Defense against routing disruptions in mobile ad hoc networks
Tseng et al. Demem: Distributed evidence-driven message exchange intrusion detection model for manet
CN101453733B (en) Wormhole attack detection method based on monitor node in wireless Mesh network
Nabet et al. Towards secure route discovery protocol in MANET
Rajkumar et al. Secure multipath routing and data transmission in MANET
Zhang et al. Security issues in wireless mesh networks
Pandya et al. Improvising the performance with security of AODV routing protocol in MANETs
CN101447899A (en) Method for detecting end-to-end-based wormhole attack in wireless Mesh network
Kolade et al. Performance analysis of black hole attack in MANET
Kush et al. Secured Routing Scheme for Adhoc Networks
Saleh Secure optimized request zone location-aided routing protocols with Wi-Fi direct for vehicular ad hoc networks
Ahmad et al. On the secure optimized link state routing (SOLSR) protocol for MANETs
Kaur et al. Trust based Security Protocol to mitigate black hole Attacks in Mobile Adhoc Networks
Udhayakumar et al. Security attacks and detection techniques for MANET
Djenouri et al. Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
Garai et al. IOT Securities: A Review
Akilarasu et al. Privacy preserving protocol for secure routing in wireless mesh networks
Ramkumar et al. Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery
Ferrag et al. OLSRBOOK: A PRIVACY-PRESERVING MOBILE SOCIAL NETWORK LEVERAGING ON SECURING THE OLSR ROUTING PROTOCOL.
Chandran et al. A cross-layer PUF-secured energy and congestion-aware on-demand routing for multi-UAV networks
Khubalkar et al. Security enabled DSR for establishing symmetric key and security in MANETS
Zhou et al. SRSN: Secure routing based on sequence number for MANETs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101222

Termination date: 20141128

EXPY Termination of patent right or utility model