CN102045887A - Access authorization device and method for wireless sensing network - Google Patents
Access authorization device and method for wireless sensing network Download PDFInfo
- Publication number
- CN102045887A CN102045887A CN2009102073519A CN200910207351A CN102045887A CN 102045887 A CN102045887 A CN 102045887A CN 2009102073519 A CN2009102073519 A CN 2009102073519A CN 200910207351 A CN200910207351 A CN 200910207351A CN 102045887 A CN102045887 A CN 102045887A
- Authority
- CN
- China
- Prior art keywords
- node
- access authorization
- sensing
- target
- request message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 126
- 238000000034 method Methods 0.000 title claims description 38
- 230000004044 response Effects 0.000 claims description 52
- 238000012795 verification Methods 0.000 claims description 38
- 238000004891 communication Methods 0.000 claims description 33
- 238000012545 processing Methods 0.000 claims description 17
- 238000001514 detection method Methods 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 20
- 101150082208 DIABLO gene Proteins 0.000 description 7
- 102100033189 Diablo IAP-binding mitochondrial protein Human genes 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000007613 environmental effect Effects 0.000 description 6
- 230000006378 damage Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 2
- 230000001953 sensory effect Effects 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明是关于一种无线感测网络(Wireless Sensor Network,WSN)的存取授权(access authorization)装置与方法。The present invention relates to a wireless sensor network (Wireless Sensor Network, WSN) access authorization (access authorization) device and method.
背景技术Background technique
无线传感器网络包括许多微小、分布式、低耗电及低复杂度的感测节点来相互合作地监测物理环境信息,例如环境的温度、湿度、震动、光度、压力、气体、浓度等。多媒体数据,例如图像或声音的数据,也可以通过无线感测网络收集并传送。所收集的数据大部分用来检测一些事件或触发其它的操作。无线感测网络的应用包含如建筑结构检测、地震活动检测、安全监控、森林火灾检测及战场监控等。Wireless sensor networks include many tiny, distributed, low-power and low-complexity sensing nodes to cooperatively monitor physical environment information, such as environmental temperature, humidity, vibration, luminosity, pressure, gas, concentration, etc. Multimedia data, such as image or sound data, can also be collected and transmitted through the wireless sensor network. Most of the collected data is used to detect some events or trigger other actions. Applications of wireless sensing networks include building structure detection, seismic activity detection, security monitoring, forest fire detection, and battlefield monitoring.
图1是一种无线传感器网络的应用架构的一个范例示意图。参考图1,多个感测节点所形成的无线传感器网络105中的感测节点,例如感测节点131,将感测到的数据以多跳式(multi-hop)传送到基地节点(Base Station,BS)110,基地节点110收集感测数据并通过因特网114传送到服务器(Server)116上,此服务器例如是一个网页服务器。使用者,例如118或120,可于远程通过因特网114联机登入至服务器116,由服务器116来验证使用者的身份及权限后,使用者就可以依照本身的权限来存取无线传感器网络110中感测节点的感测数据。FIG. 1 is a schematic diagram of an example of an application architecture of a wireless sensor network. Referring to FIG. 1 , the sensing nodes in the
无线传感器网络的应用中,感测数据的收集通常是将感测数据周期性地回传到基地节点或是以特殊的处理方式聚集后传回到基地节点,后端的服务器再进行感测数据的分析处理以让使用者读取。多媒体数据量相较于一般感测数据大很多,且考虑无线传感器网络的通讯能力与低功率(lower-power)传感器的限制,此类数据型态的收集大部分是使用者下命令后才将此数据收集回来。多媒体数据的收集也涉及了隐私性的问题。In the application of wireless sensor networks, the collection of sensing data is usually sent back to the base node periodically or aggregated in a special processing way and then sent back to the base node, and the back-end server then collects the sensing data. Parse processing for consumer readability. The amount of multimedia data is much larger than that of general sensing data, and considering the communication capabilities of wireless sensor networks and the limitations of low-power sensors, most of this type of data is collected after the user gives an order. This data is collected back. The collection of multimedia data also involves privacy issues.
例如,无线感测网络应用于安全监控时,使用者希望当有入侵者入侵时,警卫能够观看图像以补捉到入侵者的外貌作为追补入侵者的辅助信息,但又希望平常能够保有隐私权,不让警卫能够观看需要隐私的区域。如果无线感测网络不断地回报感测信息,通过基地节点然后传到服务器,服务器可以依照这些感测信息来判断是否发生特定事件,然后开启警卫或特定使用者的权限来进行存取图像数据。也就是说,使用者的存取授权条件来自可信赖元件所提供的信息,而存取授权的判断也是在一种隔离于攻击者且安全可信赖的环境或是元件上完成,例如安全的核心、可信赖的计算基础或是安全的计算装置上,所以,实体破坏攻击是假设不可能存在的。For example, when the wireless sensor network is used in security monitoring, the user hopes that when an intruder invades, the guard can watch the image to capture the appearance of the intruder as auxiliary information for supplementing the intruder, but they also hope that the privacy can be maintained normally , to prevent guards from viewing areas that require privacy. If the wireless sensor network continuously reports sensory information, it passes through the base node and then is transmitted to the server. The server can judge whether a specific event has occurred based on the sensory information, and then enable the security guard or a specific user to access the image data. That is to say, the user's access authorization conditions come from information provided by trusted components, and the judgment of access authorization is also completed in a safe and reliable environment or components that are isolated from attackers, such as the secure core , a trusted computing foundation or a secure computing device, so physical damage attacks are assumed to be impossible.
然而,此法会加速基地节点的邻近节点因为不断的路由(routing)封包而造成电源提早耗尽。因此,如何针对不同的使用者进行不同的存取权限(access privilege)控管以及在适当的时机,例如紧急事件发生时,让某些使用者能够获得实时读取多媒体数据的权限,并且设计出适合无线感测网络特性的安全存取控制技术也是无线传感器网络的关键技术之一。However, this method will speed up the power consumption of the adjacent nodes of the base node due to continuous routing packets. Therefore, how to control different access privileges for different users and at appropriate times, such as when an emergency occurs, allow some users to obtain the right to read multimedia data in real time, and design a The security access control technology suitable for the characteristics of wireless sensor network is also one of the key technologies of wireless sensor network.
图2的台湾专利公开号200614767揭露的数据授权方法的范例是用于两移动装置之间数据分享的授权操作。如图2的范例流程所示,由一移动装置A传送分享封包给移动装置B,封包内容包括分享的数据及对应的数据规则,移动装置B根据初始数据规则及环境感知信息判别是否有权限存取封包内分享的数据,也就是说,一移动装置将要分享的数据直接传给另一移动装置,由此另一装置判断本身是否有权限读取分享数据,其中,此判断存取授权规则的环境感知信息未包含任何物理环境信息。An example of the data authorization method disclosed in Taiwan Patent Publication No. 200614767 in FIG. 2 is an authorization operation for data sharing between two mobile devices. As shown in the example process in Figure 2, a mobile device A sends a sharing packet to a mobile device B. The content of the packet includes the data to be shared and the corresponding data rules. Get the data shared in the packet, that is to say, a mobile device directly transmits the data to be shared to another mobile device, so that the other device judges whether it has the authority to read the shared data. Among them, this judges the access authorization rule Environmental awareness information does not contain any physical environment information.
图3的美国专利号US7,447,494所揭露的安全无线授权系统(Secure Wireless Authorization System)的范例是用于两装置于远程通过一服务器进行存取授权验证,使得第三方装置可以存取到远程另一使用者装置,如图3的系统范例所示,使用者310以安全的方式登入至授权服务器(authorization server)312之后保持联机,然后远程第三方装置(remote third party entity)320发起授权请求,授权服务器312验证授权请求等相关信息后,同意远程第三方装置执行程序,也就是说,存取授权验证是完全由授权服务器312来进行的。The example of the Secure Wireless Authorization System (Secure Wireless Authorization System) disclosed in US Patent No. US7,447,494 in FIG. 3 is used for two devices to perform access authorization verification remotely through a server, so that a third-party device can access to another remote device. A user device, as shown in the system example of FIG. 3 , a
发明内容Contents of the invention
本发明的实施范例可提供一种无线感测网络的存取授权装置与方法。Embodiments of the present invention can provide an access authorization device and method for a wireless sensor network.
在一实施范例中,所揭露者是关于一种无线感测网络的存取授权装置。此装置包含至少一基地节点、以及由数个感测节点形成的一无线感测网络。此至少一基地节点取得一使用者的一存取授权后,发送一请求消息到此无线感测网络中的一目标感测节点。此目标感测节点根据此请求消息向此无线感测网络中的至少一控制节点,请求回传其感测数据,并参考此至少一控制节点回传的感测数据,来判断是否符合此使用者的存取授权,以作为是否回传符合此存取授权的多媒体数据的依据。In an embodiment, the disclosed is related to an access authorization device for a wireless sensor network. The device includes at least one base node and a wireless sensing network formed by several sensing nodes. After obtaining an access authorization from a user, the at least one base node sends a request message to a target sensor node in the wireless sensor network. According to the request message, the target sensor node requests at least one control node in the wireless sensor network to send back its sensing data, and refers to the sensing data returned by the at least one control node to determine whether it is suitable for this application. The access authorization of the user is used as the basis for whether to return the multimedia data conforming to the access authorization.
在另一实施范例中,所揭露者是关于一种无线感测网络的存取授权方法。此方法包含:通过至少一基地节点,取得一使用者的存取授权;从一无线感测网络的数个感测节点中选取至少一控制节点,以及选取由此基地节点到一目标感测节点的至少一中间路由节点;通过此基地节点,发送一请求消息到此目标感测节点,此请求消息至少备有验证信息;此目标感测节点根据此请求消息,向被选取的至少一控制节点请求回传其感测数据,并参考此回传的感测数据,来判断是否符合此使用者的存取授权,并发出一相对应的响应消息;此至少一中间路由节点根据此验证信息,检查此响应消息,以决定丢弃或是转送此响应消息;以及通过此基地节点,验证被转送的响应消息。In another embodiment, the disclosure relates to an access authorization method for a wireless sensor network. The method includes: obtaining a user's access authorization through at least one base node; selecting at least one control node from several sensor nodes in a wireless sensor network, and selecting the base node to a target sensor node at least one intermediate routing node; through the base node, send a request message to the target sensing node, the request message at least has verification information; the target sensing node sends at least one selected control node according to the request message Request to send back its sensing data, and refer to the returned sensing data to determine whether it meets the user’s access authorization, and send a corresponding response message; the at least one intermediate routing node according to the verification information, checking the response message to decide to discard or forward the response message; and verifying the forwarded response message through the base node.
兹配合下列图标、实施范例的详细说明及申请专利范围,将上述及本发明的其它目的与优点详述于后。The above and other objectives and advantages of the present invention will be described in detail below in conjunction with the following diagrams, detailed descriptions of implementation examples and scope of patent application.
附图说明Description of drawings
图1是一种无线传感器网络的应用架构的一个范例示意图。FIG. 1 is a schematic diagram of an example of an application architecture of a wireless sensor network.
图2是一种数据授权方法的一个范例流程图。Fig. 2 is an exemplary flow chart of a data authorization method.
图3是一种安全无线授权系统的一个范例示意图。FIG. 3 is a schematic diagram of an example of a secure wireless authorization system.
图4是无线感测网络端的使用情境的一个范例示意图,与所揭露的某些实施范例一致。FIG. 4 is a schematic diagram of an example of a usage scenario of a wireless sensor network, which is consistent with certain disclosed embodiments.
图5是影响传送消息的攻击模型的一个范例示意图。FIG. 5 is a schematic diagram of an example of an attack model that affects delivery of messages.
图6是破坏攻击目标感测节点的攻击模型的一个范例示意图。FIG. 6 is a schematic diagram of an example of an attack model for destroying an attack target sensing node.
图7是破坏攻击控制节点的攻击模型的一个范例示意图。FIG. 7 is a schematic diagram of an example of an attack model for destroying an attack control node.
图8是移动目标感测节点的攻击模型的一个范例示意图。FIG. 8 is a schematic diagram of an example of an attack model of a moving object sensing node.
图9是移动控制节点的攻击模型的一个范例示意图。FIG. 9 is a schematic diagram of an example of an attack model of a mobile control node.
图10是无线感测网络的存取授权装置的一个范例示意图,与所揭露的某些实施范例一致。FIG. 10 is a schematic diagram of an example of an access authorization device for a wireless sensor network, which is consistent with certain disclosed embodiments.
图11是无线感测网络的存取授权方法的一个范例流程图,与所揭露的某些实施范例一致。FIG. 11 is an exemplary flowchart of an access authorization method for a wireless sensor network, which is consistent with certain disclosed embodiments.
图12是基地节点的一个范例示意图,与所揭露的某些实施范例一致。FIG. 12 is an example schematic diagram of a base node, which is consistent with certain disclosed implementation examples.
图13是控制节点的一个范例示意图,与所揭露的某些实施范例一致。FIG. 13 is a schematic diagram of an example of a control node, which is consistent with certain disclosed embodiments.
图14是目标感测节点的一个范例示意图,与所揭露的某些实施范例一致。FIG. 14 is an exemplary schematic diagram of a target sensing node, consistent with certain disclosed embodiments.
图15是检测节点被移动的一个范例示意图,与所揭露的某些实施范例一致。FIG. 15 is a schematic diagram of an example of detecting that a node is moved, which is consistent with certain disclosed implementation examples.
图16是请求消息的通用格式的一个范例示意图,与所揭露的某些实施范例一致。FIG. 16 is a schematic diagram of an example of a general format of a request message, which is consistent with certain disclosed embodiments.
图17是一个范例示意图,说明中间路由节点处理请求消息的操作,与所揭露的某些实施范例一致。Fig. 17 is an exemplary schematic diagram illustrating the operation of the intermediate routing node for processing the request message, which is consistent with some disclosed embodiments.
图18是一个范例示意图,说明中间路由节点处理响应消息的操作,与所揭露的某些实施范例一致。FIG. 18 is an exemplary schematic diagram illustrating the operation of an intermediate routing node for processing a response message, which is consistent with certain disclosed embodiments.
[主要元件标号说明][Description of main component labels]
105无线传感器网络 110基地节点105
114因特网 116服务器114 Internet 116 Server
118、120使用者 131感测节点118, 120
310使用者 312授权服务器310
320远程第三方装置320 remote third-party device
400无线感测网络的使用情境的范例400 Examples of Use Scenarios for Wireless Sensor Networks
402基地节点 404目标感测节点402
406多跳式 408区域406 multi-hop 408 area
411-41m中间路由节点 421-42k感测节点411-41m intermediate routing nodes 421-42k sensing nodes
410传递请求消息 420响应以多媒体数据410
504目标感测节点 505攻击者504
521-525控制节点521-525 control nodes
605攻击者605 Attacker
610攻击者破坏或攻击目标感测节点610 The attacker destroys or attacks the target sensing node
620将多媒体直接回传到基地节点620 returns the multimedia directly to the base node
705攻击者 721-724控制节点705 attacker 721-724 control node
710传送假的感测数据给目标感测节点710 Send false sensing data to the target sensing node
805攻击者 802区域805
804其它区域 810移动目标感测节点804
905攻击者 906其它区域905
904另一其它区域 921、922控制节点904 another
910、920移动控制节点910, 920 mobile control nodes
1002服务器 1004基地节点1002
1006无线感测网络 1008使用者1006 wireless sensor network 1008 users
1004a请求消息 1008a存取授权1004a request message 1008a access authorization
1010目标感测节点 1021-1024感测节点1010 target sensing nodes 1021-1024 sensing nodes
1110通过基地节点,取得使用者的存取授权1110 Obtain the user's access authorization through the base node
1120从无线感测网络的数个无线感测节点中选取至少一控制节点,以及选取由基地节点到目标感测节点的至少一中间路由节点1120 Select at least one control node from several wireless sensor nodes in the wireless sensor network, and select at least one intermediate routing node from the base node to the target sensor node
1130通过基地节点,发送一请求消息到目标感测节点,请求消息至少备有验证信息1130 Send a request message to the target sensing node through the base node, the request message is at least equipped with verification information
1140目标感测节点根据请求消息,向选取的至少一控制节点请求回传其感测数据,并参考此回传的感测数据,来判断是否符合使用者的存取授权,并发出一相对应的响应消息1140 The target sensing node requests at least one selected control node to return its sensing data according to the request message, and refers to the returned sensing data to determine whether the access authorization of the user is met, and sends a corresponding response message for
1150此至少一中间路由节点根据此验证信息,检查此响应消息,以决定丢弃或是转送此响应消息1150 The at least one intermediate routing node checks the response message according to the verification information to decide to discard or forward the response message
1160基地节点验证被转送的响应消息1160 base node verifies the forwarded response message
1210储存单元 1220中央处理单元1210
1231第一通讯接口 1232第二通讯接口1231
1300控制节点 1310传感器1300
1310a感测数据 1320通讯接口
1330中央处理单元1330 central processing unit
1410传感器 1410a多媒体数据1410 sensor 1410a multimedia data
1420通讯接口 1430中央处理单元1420 communication interface 1430 central processing unit
1510节点 1520移动1510
1531-1534邻居节点 1540移动位置后的节点1531-1534
1550攻击者1550 attackers
MACL光度消息验证码 MACT温度消息验证码MAC L photometric message verification code MAC T temperature message verification code
MACH湿度消息验证码 SMAC多模式消息验证码MAC H Humidity Message Authentication Code SMAC Multimodal Message Authentication Code
Repl_message响应消息Repl_message response message
具体实施方式Detailed ways
本发明的实施范例提供一种无线感测网络的存取授权技术,其设计是将使用者的存取授权数据送到无线感测网络内的一目标感测节点,然后由无线感测网络内的其它感测节点相互合作,回报所感测的物理环境信息,例如环境的温度、湿度、光度、振动、压力、气体、浓度等信息,以进行分布式的存取授权判断,进而决定是否回传数据给使用者读取。此存取授权技术将可应用于多模式无线感测网络环境中,来作为使用者存取无线感测网络所检测到的多媒体数据,例如图像或声音数据,的存取授权控管。An embodiment of the present invention provides an access authorization technology for a wireless sensor network, which is designed to send the user's access authorization data to a target sensor node in the wireless sensor network, and then send the access authorization data to a target sensor node in the wireless sensor network. Other sensing nodes cooperate with each other to report the sensed physical environment information, such as environmental temperature, humidity, luminosity, vibration, pressure, gas, concentration and other information, in order to make distributed access authorization judgments, and then decide whether to send back The data is read by the user. The access authorization technology can be applied in a multi-mode wireless sensor network environment as an access authorization control for users to access multimedia data detected by the wireless sensor network, such as image or audio data.
图4是无线感测网络的使用情境的一个范例示意图,与所揭露的某些实施范例一致。图4的使用情境范例400中,假设从基地节点402到目标感测节点404中间有m个中间路由节点(intermediate routing node)411-41m,且无线感测网络400是以多跳式(multihop)406的方式进行数据传递从基地节点402到目标感测节点404的请求消息,如箭头410所指;在目标感测节点404的同一区域408内有多个感测节点,同一区域408代表目标感测节点404与其它感测节点可以互相通讯的范围,其中有数个感测节点,例如感测节点421-42k,可提供区域408的其它感测数据给目标感测节点404来进行使用者存取授权的判断,此类可提供同一区域内的其它感测数据给目标感测节点来进行使用者存符合取授权判断的感测节点称之为该区域的控制节点(controlling node)。目标感测节点404判断符合存取授权后,则响应以多媒体数据,如箭头420所指。FIG. 4 is a schematic diagram of an example of a usage scenario of a wireless sensor network, which is consistent with certain disclosed embodiments. In the usage scenario example 400 of FIG. 4 , it is assumed that there are m intermediate routing nodes (intermediate routing nodes) 411-41m between the
由于存取授权的判断是在感测节点上完成,因此感测节点可能遭受实体破坏攻击(node compromised attacks)。攻击者的目标是期望在没有有效的存取权限下企图绕过存取授权的判断,来得到某些区域的多媒体感测数据,也就是说,某一区域的感测数据并不符合存取授权的条件,而本发明的实施范例则是要能防止这些攻击者的可能攻击行为来企图绕过存取授权的判断,图5至图9分别列出五种可能的攻击模型的范例。此五种可能的攻击模型包括影响传送消息者、破坏攻击目标感测节点者、破坏攻击控制节点者、移动目标感测节点者、以及移动控制节点者。Since the judgment of access authorization is completed on the sensor node, the sensor node may be subject to entity destruction attacks (node compromised attacks). The goal of the attacker is to try to bypass the judgment of access authorization without effective access rights to obtain multimedia sensing data in certain areas, that is, the sensing data in a certain area does not meet the requirements of access authorization. Authorization conditions, and the implementation example of the present invention is to be able to prevent these attackers from attempting to bypass the judgment of access authorization. Figures 5 to 9 respectively list examples of five possible attack models. The five possible attack models include those who influence the message transmitter, those who destroy the attack target sensor node, those who destroy the attack control node, those who move the target sensor node, and those who move the control node.
图5的攻击模型的范例是攻击者影响或操作控制节点传送给目标感测节点的消息,来企图通过存取授权的判断,例如攻击者505修改或是重送控制节点521-525传送给目标感测节点404的符合存取授权判断的感测数据。图6的攻击模型的范例是攻击者605可破坏攻击目标感测节点504,如箭头610所指;然后,如箭头620所指,将多媒体直接回传到基地节点,而没有向周围控制节点询问其感测数据以判断环境信息是否符合存取授权。图7的攻击模型的范例是攻击者705可破坏或攻击控制节点721-724,然后传送假的感测数据给目标感测节点504来符合存取授权判断,如箭头710所指。The example of the attack model in Figure 5 is that the attacker influences or manipulates the message sent by the control node to the target sensing node in an attempt to pass the judgment of access authorization, for example, the
图8的攻击模型的范例是,若攻击805者有权限存取一区域802的目标图像或声音感测数据,攻击者805可移动目标感测节点404到其它区域804,如箭头810所指;而导致攻击者805可以非法取得其它区域804的多媒体数据。An example of the attack model in FIG. 8 is that if the
图9的攻击模型的范例是,攻击者移动控制节点到其它有符合存取授权条件的物理环境区域,例如,攻击者905移动控制节点921到其它区域906,如箭头910所指;攻击者905移动控制节点922到另一其它区域904,如箭头920所指;而导致攻击者可以非法取得多媒体数据。The example of the attack model of Fig. 9 is that the assailant moves the control node to other physical environment areas that meet the access authorization conditions, for example, the
由于感测节点所检测到的物理环境数据,例如温度、湿度、光度及振动等,是作为存取授权判断的条件,并且在资源有限的无线感测网络上进行传送多媒体之类的大量数据会造成一定的负担,也是通讯负担消耗电源的因素之一,因此,本发明的无线感测网络的存取授权装置的实施范例在设计上会对于物理环境数据检测的错误或攻击者的攻击破坏有相对应的机制来处理。例如将错误的消息,如上述攻击模型中被攻击者窜改或是不合法的响应消息等,在中间过程时就先滤除丢弃,不需要等到被回传到基地节点时才被发现丢弃,如此可避免中间路由节点耗费资源来传送此错误消息。Since the physical environment data detected by the sensor nodes, such as temperature, humidity, luminosity and vibration, etc., are used as the conditions for access authorization judgment, and the transmission of large amounts of data such as multimedia on the wireless sensor network with limited resources will It causes a certain burden, and it is also one of the factors that cause the communication burden to consume power. Therefore, the implementation example of the access authorization device for the wireless sensor network of the present invention is designed to have a certain impact on the error of physical environment data detection or the attack and destruction of the attacker. corresponding mechanism. For example, erroneous messages, such as tampered by attackers or illegal response messages in the above attack model, are filtered out and discarded in the middle process, and do not need to be discovered and discarded when they are sent back to the base node. Intermediate routing nodes can be avoided from expending resources to transmit this error message.
图10是无线感测网络的存取授权装置的一个范例示意图,与所揭露的某些实施范例一致。图10的范例中,存取授权装置1000包含至少一基地节点1004、以及由数个感测节点形成的一无线感测网络1006。至少一基地节点1004取得一使用者1008的一存取授权1008a后,发送一请求消息1004a到无线感测网络1006中的一目标感测节点1010,目标感测节点1010根据请求消息1004a,向无线感测网络1006中的至少一控制节点请求回传其感测数据,并根据此至少一控制节点回传的感测数据,来判断是否符合使用者1008的存取授权1008a,以作为是否回传符合存取授权1008a的多媒体数据的依据。FIG. 10 is a schematic diagram of an example of an access authorization device for a wireless sensor network, which is consistent with certain disclosed embodiments. In the example of FIG. 10 , the access authorization device 1000 includes at least one
此至少一控制节点皆为无线感测网络1006中的感测节点,例如感测节点1021-1024,可参考至少一类型的物理环境信息,例如环境的温度、湿度、光度、振动等信息,是否符合使用者1008的存取授权内所标示的条件,来决定是否回传其感测数据给目标感测节点1010来进行存取授权1008a的判断。回传的感测数据如果符合使用者1008的存取授权1008a,目标感测节点1010就传回符合存取授权1008a的多媒体数据,如图像或声音数据,给基地节点1004,基地节点1004再传回此多媒体数据给服务器,以提供给使用者。如果未符合使用者1008的存取授权1008a,目标感测节点1010则送回拒绝存取的消息。The at least one control node is all sensing nodes in the wireless sensing network 1006, such as sensing nodes 1021-1024, which can refer to at least one type of physical environment information, such as environmental temperature, humidity, luminosity, vibration and other information, whether The conditions marked in the access authorization of the user 1008 are met to determine whether to send back the sensing data to the
参考由控制节点回传感测数据的方式可针对一种型态的感测数据来参考至少一个控制节点所回传的感测数据,然后计算所回传的感测数据的统计量,例如平均(average)、多数(majority)、最大(maximum)或最小值(minmum)等,作为最后参考的感测数据。Referring to the manner in which the sensing data is returned by the control node, it is possible to refer to the sensing data returned by at least one control node for one type of sensing data, and then calculate the statistics of the returned sensing data, such as the average (average), majority (majority), maximum (maximum) or minimum (minmum), etc., as the sensing data for the final reference.
基地节点1004发送的请求消息1004a还包括一验证参数,此验证信息是提供给由基地节点1004到目标感测节点1010的中间的一或多个路由节点的每一路由节点,可作为日后验证响应消息的一个参数,例如路由节点可用此参数来检查出有被攻击者窜改或是不合法的响应消息时,在中间过程就先丢弃此响应消息。The request message 1004a sent by the
使用者1008可提出身份至识别及密码登入服务器1002,例如一网页服务器,然后服务器验证使用者身份后,可向基地节点1004发出一请求命令。根据请求命令1002a,基地节点1004可通过因特网,向至服务器1002取得使用者1008的存取授权1008a。The user 1008 can provide an identity to the identification and
承上述,图11是无线感测网络的存取授权方法的一个范例流程图,与所揭露的某些实施范例一致。此范例流程中,首先通过基地节点1004,取得使用者1008的存取授权,如步骤1110所示。从无线感测网络1006的数个无线感测节点中选取至少一控制节点,以及选取由基地节点1004到目标感测节点1010的至少一中间路由节点,如步骤1120所示。通过基地节点1004,发送一请求消息1004a到目标感测节点1010,请求消息1004a至少备有验证信息,如步骤1130所示。目标感测节点1010根据请求消息1004a,向选取的至少一控制节点请求回传其感测数据,并参考此回传的感测数据,来判断是否符合使用者1008的存取授权1008a,并发出一相对应的响应消息,如步骤1140所示。此至少一中间路由节点根据此验证信息,检查此响应消息,以决定丢弃或是转送此响应消息,如步骤1150所示。再由基地节点1004验证被转送的响应消息,如步骤1160所示。Based on the above, FIG. 11 is an exemplary flowchart of an access authorization method for a wireless sensor network, which is consistent with certain disclosed embodiments. In this exemplary process, firstly, the access authorization of the user 1008 is obtained through the
承上述,基地节点1004可包括一储存单元、一中央处理单元、以及一第一通讯接口与一第二通讯接口。如图12的范例所示,储存单元1210进行数据的储存,储存数据例如使用者1008的存取授权、请求消息1004a、响应消息等。中央处理单元1220通过第二通讯接口1232,根据使用者的存取授权,下达传送请求消息1004a到目标感测节点1010,及通过第一通讯接口1231将目标感测节点1010回传的多媒体数据传送给服务器1002。第一通讯接口1231是与服务器1002进行双向沟通。第二通讯接口1232是与无线感测网络中的感测节点或是中间路由节点进行沟通。Based on the above, the
每一控制节点1300可包括至少一传感器、一通讯接口及一中央处理单元。如图13的范例所示,至少一传感器1310感测至少一类型的物理环境信息,例如温度、湿度、光度、压力、气体、浓度等。通讯接口1320与基地节点1004及目标感测节点1010进行双向沟通。中央处理单元1330可指挥传感器1310进行感测,并可通过通讯接口1320传回传感器1310的感测数据1310a给目标感测节点1010。Each
目标感测节点1010可包括至少一传感器、一通讯接口及一中央处理单元。如图14的范例所示,通讯接口1420与基地节点1004及每一控制节点进行双向沟通。中央处理单元1430根据基地节点1004发送的请求消息1004a,通过通讯接口1420,向每一控制节点请求感测数据,并根据此感测数据判断是否指挥至少一传感器1410撷取出多媒体数据1410a来回传给基地节点1004。The
第二通讯接口1232、通讯接口1420、以及通讯接口1320可采用无线的传输方式,例如IEEE 802.15.4无线感测网络及BlueTooth等具多跳式的短距通讯协议。第一通讯接口1231则可采用有线或无线的传输方式,例如以太网络、IEEE 802.11无线网络、WiMax、3G、3.5G及GPRS等。The
基地节点1004发送的请求消息1004a包括了验证信息,本发明的无线感测网络的存取授权的技术中,所有相关的响应消息也会包含一个证据,来证明此响应消息是经过存取授权的验证,例如,证明控制节点确实有回报感测数据给目标感测节点、目标感测节点确实有验证使用者的存取授权等。选取的中间路由节点随着请求消息传送不同的验证金钥,便能验证是否路由这些响应消息至下一个节点,也就是说,由中间的路由节点当中随机选取部分节点使其能够提早验证响应消息的正确性。The request message 1004a sent by the
当基地节点发出请求消息,欲读取目标感测节点的多媒体的数据时,基地节点会根据使用者的存取授权来告知目标感测节点,需要向所属区域的哪一些控制节点请求感测读值。控制节点的选择与感测读值的计算方式可采用的范例有多种,例如,从多个同类型的控制节点当中随机或固定选取某一个控制节点来作为某一种类型的读值结果、从多个同类型的控制节点当中随机或固定选取部分或所有的控制节点并计算平均读值(average)或多数读值(majority)来作为某一种类型的读值结果。若是系统具备单一控制节点存在多种类型的传感器,也可以随机或固定选取单一或部分控制节点然后计算平均或多数读值,来作为某一种类型的读值结果。控制节点以随机或固定选取的方式来决定,可降低攻击者破坏部分控制节点所造成的影响,例如,破坏攻击部分控制节点以回报的假的感测消息或是破坏攻击中间路由节点以假造响应消息等。When the base node sends a request message to read the multimedia data of the target sensor node, the base node will inform the target sensor node according to the user's access authorization, which control nodes in the area need to request sensor reading value. There are many examples of the selection of the control node and the calculation of the sensing reading value. For example, a certain control node is randomly or fixedly selected from multiple control nodes of the same type as a certain type of reading result, A part or all of the control nodes are randomly or fixedly selected from a plurality of control nodes of the same type, and the average reading value (average) or the majority reading value (majority) is calculated as a certain type of reading value result. If the system has a single control node and there are multiple types of sensors, it is also possible to randomly or fixedly select a single or part of the control nodes and then calculate the average or majority reading value as a certain type of reading value result. Control nodes are determined by random or fixed selection, which can reduce the impact caused by attackers destroying some control nodes, for example, destroying some control nodes to report false sensing messages or destroying attack intermediate routing nodes to fake responses news etc.
本发明的实施范例中,采用一种节点移动检测协议(Node-Movement Detection Protocol),来防止节点如目标感测节点或控制节点,被移动位置。此协议可利用一节点的邻居节点来监控此节点的相对距离是否有变化,可作为防范节点被移动或攻击的对策。此协议的初始化的过程可在网络布建完成后,且没有攻击者介入的情况下来执行完成。例如,每一个节点广播n个信标(beacon)封包给邻居节点,然后每一个节点根据每一个邻居所发出的信标封包,来计算与每一个邻居节点之间的距离,再将计算结果记录下来并标示为参考集合{d1,d2,...,dn}。此协议初始化后,一个节点就可以执行此协议来检查自己本身是否被移动。In the implementation example of the present invention, a node-movement detection protocol (Node-Movement Detection Protocol) is adopted to prevent nodes such as target sensing nodes or control nodes from being moved. This protocol can use the neighbor nodes of a node to monitor whether the relative distance of the node changes, and it can be used as a countermeasure to prevent the node from being moved or attacked. The initialization process of this protocol can be executed after the network deployment is completed without the intervention of an attacker. For example, each node broadcasts n beacon packets to neighbor nodes, and then each node calculates the distance to each neighbor node according to the beacon packets sent by each neighbor, and then records the calculation results down and labeled as the reference set {d1,d2,...,dn}. Once this protocol is initialized, a node can execute this protocol to check whether itself has been moved.
执行此协议的操作说明如下。每一个节点广播n个信标封包给邻居节点,然后每一个邻居节点根据所收到的信标封包来计算与发出信标封包节点之间的距离,将计算结果记录下来并标示为测试集合{d1’,d2’,...,dn’},每一个邻居节点再比较两集合之间的差异。比较差异的方式有多种,例如,差异小于一个可容忍误差的门坎值时,则回报的值表示节点未被移动,反之,差异大于此可容忍误差的门坎值时,则回报的值表示节点已被移动。Instructions for performing this protocol follow. Each node broadcasts n beacon packets to neighbor nodes, and then each neighbor node calculates the distance from the node that sent the beacon packet according to the received beacon packets, records the calculation results and marks them as a test set{ d1', d2', ..., dn'}, each neighbor node compares the difference between the two sets. There are many ways to compare the difference. For example, when the difference is less than a threshold value of a tolerable error, the returned value indicates that the node has not been moved. Conversely, when the difference is greater than the threshold value of the tolerable error, the returned value indicates that the node has been moved.
如图15的范例所示,当一个节点1510被移动后(如箭头1520所指),此节点与每一个邻居节点,例如邻居节点1531-1534,的相对距离也会跟着改变,其中虚线标示为节点1510原本与邻居节点的距离,实线标示为移动位置后的节点1540与邻居节点的距离。因此,一节点若收到一个超过门坎值的回报距离时,表示本身已被移动,此节点即可判定本身已遭到攻击者1550移动。换句话说,利用邻居节点来计算与本身节点之间的距离并且与先前记录的距离做比较,每一个节点可由多数邻居节点来告知其位置是否已经遭攻击者移动。若要降低因环境所造成的误差,其方式例如可提高n的数量、或是增加邻居的节点数量、或是适当地调整门坎值等。As shown in the example of Figure 15, when a
以下定义一些符号及其意义,并以一工作范例来详细说明本发明的内容。Some symbols and their meanings are defined below, and a working example is used to describe the content of the present invention in detail.
A→B:M表示A传送消息M给B,A→B: M means that A sends a message M to B,
{M}k表示消息M加密,{M} k indicates that message M is encrypted,
MAC(M,K)表示用金钥K计算消息M的消息验证码,MAC(M, K) means to use the key K to calculate the message authentication code of the message M,
H(·)表示单向杂凑函式,H( ) represents a one-way hash function,
M//N表示消息M连接消息N,M//N indicates that message M is connected to message N,
表示异或XOR运算, Indicates exclusive or XOR operation,
IDi表示i的身份,ID i represents the identity of i,
Ri表示i的感测读值,R i represents the sensing reading value of i,
Ki表示i与基地节点共享的点对点金钥,以及K i represents the peer-to-peer key shared by i with the base node, and
Kij表示i与j共享的点对点金钥。K ij represents the point-to-point key shared by i and j.
以图4的无线感测网络端的使用情境为例,假设有一个使用者的存取授权的条件为:读取图像数据,其物理环境为温度高于30度、光度大于200流明、以及湿度低于30%。当基地节点402取得此使用者存取授权时,例如收到来自一服务器的命令时,假设基地节点402随机或固定选取的结果为参考区域408的某一光度传感器(标示为SC1)读值、参考区域408的某三个温度传感器(标示为SC2、SC3、SC4)的平均读值、以及参考区域408的某四个湿度传感器(标示为SC5、SC6、SC7、SC8)的多数读值,则由基地节点402发出传送到目标感测节点404的请求消息的通用格式的一个范例如图13所示,与所揭露的某些实施范例一致。Taking the usage scenario of the wireless sensor network terminal in Figure 4 as an example, assume that there is a user whose access authorization conditions are: to read image data, and its physical environment is that the temperature is higher than 30 degrees, the luminosity is higher than 200 lumens, and the humidity is low at 30%. When the
图16的范例中,通用格式的字段内容可包括此请求消息的身份QID、一验证参数C’、加密的使用者的存取授权{acc_auth}k、一随机随机数N、以及被选取到控制节点的感测数据型态与其计算方式、被选取到控制节点的身份、以及其感测数据的有效范围。以上述的基地节点402随机选取的结果为例,则由基地节点402传送给目标感测节点404的请求消息可包括QID、C’,{acc_auth}k、N、以及三种类型,即光度传感器(SC1)、三个温度传感器(SC2、SC3、SC4)、四个湿度传感器(SC5、SC6、SC7、SC8),的感测数据型态与其计算方式、此三种类型的传感器的身份与其感测数据的有效范围valid_range,并可表示如下:In the example of FIG. 16, the field content of the general format may include the identity QID of the request message, an authentication parameter C', the encrypted user's access authorization {acc_auth} k , a random random number N, and The sensing data type of the node and its calculation method, the identity of the selected control node, and the valid range of the sensing data. Taking the result of random selection by the
QID,C’,{acc_auth}k,N,QID, C', {acc_auth} k , N,
{光度_平均:IDSC1,第一有效范围},{photometric_average: id sc1 , first valid range},
{温度_平均:IDSC2,IDSC3,IDSC4,第二有效范围},{temperature_average: ID SC2 , ID SC3 , ID SC4 , second valid range},
{湿度_多数:IDSC5,IDSC6,IDSC7,IDSC8,第三有效范围),{humidity_majority: ID SC5 , ID SC6 , ID SC7 , ID SC8 , third valid range),
其中,第一有效范围是光度传感器SC1的光度读值的平均值结果,第二有效范围是三个温度传感器(SC2、SC3、SC4)的温度读值的平均值结果,第三有效范围是四个湿度传感器(SC5、SC6、SC7、SC8)的湿度读值的多数值结果。Among them, the first valid range is the average result of the photometric readings of the photometric sensor SC1, the second valid range is the average result of the temperature readings of the three temperature sensors (SC2, SC3, SC4), and the third valid range is four The multi-value result of the humidity readings from each of the humidity sensors (SC5, SC6, SC7, SC8).
验证参数C’是给由基地节点402到目标感测节点404的每一中间路由节点作为日后回传消息的一个参数。以上述的请求消息为例,则计算验证参数C’的一个范例方式如下:The verification parameter C' is given to each intermediate routing node from the
令i从1至8,make i from 1 to 8,
且则计算C’=h(CSC1)。and Then calculate C'=h(C SC1 ).
当此请求消息送出后,从基地节点402到目标感测节点404中,中间路由节点411-41m的每一中间路由节点把QID及C’储存起来,并且路由此请求消息至下一个节点,如图17所示,与所揭露的某些实施范例一致。这些储存值可在响应消息回传后或是超过某一时间后由节点自动删除,以节省该节点的储存空间。After the request message is sent, from the
当目标感测节点404收到此消息后,解密取出使用者的存取授权acc_auth并且可执行节点移动检测协议来判断本身的位置是否遭到移动,如果目标感测节点404发现自己位置已经遭到移动,则回报此事件给基地节点402并且终止后续操作;反之,目标感测节点404根据请求消息,执行下列操作来向控制节点请求感测读值:After the
目标感测节点→SC1:N,<光度>,Target Sensing Node → SC1:N, <luminosity>,
目标感测节点→SC2、SC3、SC4:N,<温度>,Target sensing node → SC2, SC3, SC4: N, <temperature>,
目标感测节点→SC5、SC6、SC7、SC8:N,<湿度>。Target sensing node → SC5, SC6, SC7, SC8: N, <humidity>.
控制节点收到来自目标感测节点404的消息后,可执行节点移动检测协议来判断本身的位置是否遭到移动,如果发现自己的位置已经遭到移动,则回报此事件给基地节点402进行后续处理;反之,控制节点执行下列操作来回报目标感测节点404所请求的感测读值:After the control node receives the message from the
SCi→目标感测节点:RSCi,i从1至8。SCi→target sensing node: R SCi , i is from 1 to 8.
目标感测节点404收到控制节点回报的感测读值后,进行计算(例如平均值或多数值计算),然后检查计算结果是否符合使用者的存取授权acc_auth及有效范围,,如果有任何一项不符合,则回报次事件给基地节点402并且终止后续操作;反之目标感测节点404多媒体数据(image)并执行下列操作,来将加密的多媒体数据传送至每一控制节点:After the
目标感测节点→SCi:h({多媒体数据}k),i从1至8。Target sensing node→SCi: h({multimedia data} k ), i is from 1 to 8.
每一控制节点SCi收到上述消息后,可利用随机随机数N及本身与基地节点402共享的金钥KSCi,来算出CSCj,然后执行下列操作,来加密h(CSCi)并传送加密的h(CSCi)与一消息验证码i_MAC至目标感测节点404:After receiving the above message, each control node SCi can use the random random number N and the key K SCi shared with the
SCi→目标感测节点:{h(CSCi)}k,i_MAC,i从1至8,SCi→target sensing node: {h(C SCi )} k , i_MAC, i from 1 to 8,
其中,in,
i_MAC=MAC(RSCi//h({多媒体数据}k),h(CSCi//KSCi))。i_MAC=MAC(R SCi //h({multimedia data} k ), h(C SCi //K SCi )).
目标感测节点404解密取出每一个h(CSCi)以计算出出C值,并且也计算光度消息验证码MACL、温度消息验证码MACT、湿度消息验证码MACH,通过MACL、MACT、MACH,再计算出一多模式消息验证码SMAC值,各值计算如下:The
然后,目标感测节点404执行下列操作,来传送给基地节点402的响应消息Repl_message:Then, the
目标感测节点→基地节点:Reply_message,其中,Target sensing node → base node: Reply_message, where,
响应消息Reply_message的内容包括如QID、C、配对{IDSCi:RSCi}、MACL、MACT、MACH、{多媒体数据}k、{SMAC}k,i从1至8;配对{IDSCi:RSCi}表示被基地节点402随机选取到的控制节点SCi的身份及此控制节点SCi所回报的感测读值。The content of the response message Reply_message includes such as QID, C, pairing {ID SCi : R SCi }, MAC L , MAC T , MAC H , {multimedia data} k , {SMAC} k , i from 1 to 8; pairing {ID SCi : R SCi } represents the identity of the control node SCi randomly selected by the
当响应消息在回传的过程中,每一个中间路由节点根据QID验证h(C)使否等于C’,如果不是则舍弃该响应消息;反之则路由响应消息至下一个节点,如图18所示,与所揭露的某些实施范例一致。When the response message is in the process of returning, each intermediate routing node verifies whether h(C) is equal to C' according to the QID, and if not, discards the response message; otherwise, routes the response message to the next node, as shown in Figure 18 It is consistent with some disclosed implementation examples.
当响应消息传回到基地节点402后,基地节点402验证h(C)使否等于C’、所有的读值是否符合使用者的存取授权acc_auth及有效范围、以及SMAC值是否正确,如果都没问题,则将图像,即{多媒体数据}k,解密后回传到服务器,以提供给该使用者,反之则丢弃响应消息。After the response message is sent back to the
接下来说明可增加中间路由节点的验证功能的MACL、MACT、MACH。当基地节点402一开始传送请求消息到目标感测节点404时,基地节点402可以随机选取部分中间路由节点并且随着请求消息传送不同的验证金钥给这些随机选取的中间路由节点,这些拥有部分验证金钥的中间路由节点便有能力可以验证MACL、MACT、MACH。Next, MAC L , MAC T , and MAC H , which can increase the authentication function of the intermediate routing node, will be described. When the
举例来说,假设基地节点402分别传送验证金钥h(CSC2//KSC2)//h(CSC3//KSC3)//h(CSC4//KSC4)给一第一中间路由节点,以及验证金钥h(CSC1//KSC1)给一第二中间路由节点,则当目标感测节点404回传图像消息给基地节点402时,第一中间路由节点便可以验证MACT,而第二中间路由节点便可以验证MACL。如此,让不合法的响应消息可以在中间的传送过程中就被中间路由节点提早过滤掉,而不用等到传回到基地节点才发现,以节省传送不合法消息的资源。For example, assume that the
本发明的无线感测网络的存取授权技术也可以抵抗如图5至图9的攻击模型,使得攻击者没有办法通过这些攻击来逃避存取授权的控管或是得到不应该有的存取权限。以下一一分析本发明的安全性。The access authorization technology of the wireless sensor network of the present invention can also resist the attack models shown in Figures 5 to 9, so that the attacker has no way to evade the control of access authorization or obtain undue access through these attacks authority. The security of the present invention is analyzed one by one below.
由于目标感测节点响应给基地节点的消息包含了参数C,而参数C是必须由所有被随机或固定选取到的控制节点来算出的信息,因此即使目标感测节点被攻击破坏了,也无法在未请求所有控制节点的感测读值前,响应消息给基地节点。攻击者也无法假造任何消息回传给基地节点;此外,每一中间路由节点也会验证参数C的正确性,未包含正确C的响应消息马上会被舍弃掉。Since the target sensing node responds to the base node with a parameter C, and the parameter C is information that must be calculated by all randomly or fixedly selected control nodes, even if the target sensing node is destroyed by an attack, it cannot Before requesting the sensing readings of all control nodes, a response message is sent to the base node. The attacker cannot forge any message and send it back to the base node; in addition, each intermediate routing node will also verify the correctness of the parameter C, and the response message that does not contain the correct C will be discarded immediately.
因为每一个由被随机或固定选取到的控制节点SCi所回传的感测读值RSCi都用其与基地节点共享的金钥组成的参数来计算消息验证码MAC,例如MACL、MACT、或MACH,并且随机选取到的中间节点以及基地节点都会验证MAC的正确性,任何未包含正确MAC的响应消息马上就会被舍弃掉。所以,被破坏攻击的目标感测节点无法假造符合存取授权的感测读值,攻击者也无法修改感测读值。Because each sensing reading value R SCi sent back by the randomly or fixedly selected control node SCi uses the parameters composed of the key shared with the base node to calculate the message authentication code MAC, such as MAC L , MAC T , or MAC H , and the randomly selected intermediate nodes and base nodes will verify the correctness of the MAC, and any response message that does not contain the correct MAC will be discarded immediately. Therefore, the target sensing node attacked by sabotage cannot forge the sensing read value conforming to the access authorization, and the attacker cannot modify the sensing read value.
因为计算MAC的金钥时,需包含参数CSCi,而参数CSCi是由基地节点每次产生的随机随机数N计算而来的,因此,攻击者无法重送感测读值及消息验证码MAC。Because when calculating the MAC key, the parameter C SCi needs to be included, and the parameter C SCi is calculated from the random number N generated by the base node every time, so the attacker cannot resend the sensing reading value and message verification code MAC.
因为任何被随机选取到的中间路由节点会验证部分的消息验证码MAC,例如MACL、MACT、或MACH,被窜改的多媒体数据在未回传到基地节点时就会被中间路由节点验证到而舍弃掉。因此,攻击者无法窜改目标感测节点回传的多媒体数据。Because any randomly selected intermediate routing node will verify part of the message authentication code MAC, such as MAC L , MAC T , or MAC H , the tampered multimedia data will be verified by the intermediate routing node before it is returned to the base node To give up. Therefore, an attacker cannot tamper with the multimedia data returned by the target sensing node.
虽然本发明的实施范例利用随机选取到的中间路由节点来提早验证消息验证码MAC的正确性,然而攻击者还是有部分机率可以攻击破坏被随机选取到的中间路由节点,然后假造感测读值及其MAC。因为被随机选取到的中间路由节点有验证MAC的金钥,便能计算出合法的MAC。然而,当基地节点收到响应的消息后,会解密及验证SMAC,因此任何被窜改的MAC,例如MACL、MACT、或MACH,最后在基地节点都会因为验证SMAC而被发现。Although the implementation example of the present invention uses randomly selected intermediate routing nodes to verify the correctness of the message authentication code MAC in advance, an attacker still has some chances to attack and destroy the randomly selected intermediate routing nodes, and then forge the sensing reading value and its MAC. Because the randomly selected intermediate routing nodes have the key for verifying the MAC, the legal MAC can be calculated. However, when the base node receives the response message, it will decrypt and verify the SMAC, so any tampered MAC, such as MAC L , MAC T , or MAC H , will be discovered at the base node by verifying the SMAC.
移动目标感测节点或是任何的控制节点将会被节点移动检测协议检测出来。因此,可以确保节点位置不会被移动到不该存在的位置或环境当中,而检测的精确度可视周围环境及硬件灵敏度等因素来决定。The moving target sensing node or any control node will be detected by the node movement detection protocol. Therefore, it can be ensured that the node position will not be moved to a location or environment that should not exist, and the detection accuracy can be determined by factors such as the surrounding environment and hardware sensitivity.
综上所述,本发明的实施范例可提供一种无线感测网络的存取授权装置与方法。其响应消息包含一个证明参数C,代表了响应消息的认证性及有效性。而随机或固定式的节点选择,包括控制节点的选择与验证请求或响应消息的中间路由节点的选择,加上参考多数感测节点回报的感测数据,可降低被攻击者破坏攻击的影响。错误的数据也会被中间路由节点发现并提早滤除,可节省无线感测网络的资源。本发明的实施范例只使用轻量化的计算方式,如异或、单向杂凑函式、对称式金钥加密等计算方法来实现安全性功能,因此也很适合于无线感测网络环境。To sum up, the exemplary embodiments of the present invention can provide an access authorization device and method for a wireless sensor network. The response message contains a certification parameter C, representing the authenticity and validity of the response message. Random or fixed node selection, including the selection of control nodes and the selection of intermediate routing nodes for verifying requests or responding messages, plus referring to the sensing data reported by most sensing nodes, can reduce the impact of sabotage attacks by attackers. Wrong data will also be found by the intermediate routing nodes and filtered out early, which can save the resources of the wireless sensor network. The implementation examples of the present invention only use lightweight calculation methods, such as XOR, one-way hash function, symmetric key encryption and other calculation methods to implement security functions, so they are also very suitable for wireless sensor network environments.
此外,每一中间路由节点只需要储存QID及C’(小于10字节),部分被随机选取到的中间路由节点也只需多存少许的验证金钥,例如若用AES-128,则储存一把金钥只需16字节的储存空间,这些储存值也可以在响应消息回传后或超过一时间后由节点自动删除。本发明的安全存取控制结构可防止节点遭受多种攻击模型的破坏或移动,也可用于多模式无线感测网络的存取授权,此多模式无线感测网络中的传感器例如用来感测温度、湿度、光度、压力、气体、浓度等各类型的环境数值。In addition, each intermediate routing node only needs to store QID and C' (less than 10 bytes), and some randomly selected intermediate routing nodes only need to store a little more verification keys. For example, if AES-128 is used, store A key only needs 16 bytes of storage space, and these storage values can also be automatically deleted by the node after the response message is returned or after a period of time. The secure access control structure of the present invention can prevent nodes from being damaged or moved by various attack models, and can also be used for access authorization of multi-mode wireless sensor networks. Sensors in this multi-mode wireless sensor network are used for sensing Various types of environmental values such as temperature, humidity, luminosity, pressure, gas, concentration, etc.
惟,以上所述者仅为本发明的实施范例,当不能依此限定本发明实施的范围。即大凡本发明权利要求范围所作的均等变化与修饰,皆应仍属本发明权利要求涵盖的范围。However, what is described above is only an implementation example of the present invention, and should not limit the implementation scope of the present invention accordingly. That is, all equivalent changes and modifications made within the scope of the claims of the present invention should still fall within the scope covered by the claims of the present invention.
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009102073519A CN102045887A (en) | 2009-10-26 | 2009-10-26 | Access authorization device and method for wireless sensing network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009102073519A CN102045887A (en) | 2009-10-26 | 2009-10-26 | Access authorization device and method for wireless sensing network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102045887A true CN102045887A (en) | 2011-05-04 |
Family
ID=43911499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009102073519A Pending CN102045887A (en) | 2009-10-26 | 2009-10-26 | Access authorization device and method for wireless sensing network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102045887A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024060077A1 (en) * | 2022-09-21 | 2024-03-28 | Lenovo (Beijing) Limited | Method and apparatus for integrated sensing and communication |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020197979A1 (en) * | 2001-05-22 | 2002-12-26 | Vanderveen Michaela Catalina | Authentication system for mobile entities |
US6567121B1 (en) * | 1996-10-25 | 2003-05-20 | Canon Kabushiki Kaisha | Camera control system, camera server, camera client, control method, and storage medium |
CN1739039A (en) * | 2003-01-15 | 2006-02-22 | 皇家飞利浦电子股份有限公司 | System and method for providing subject location information |
US20060126501A1 (en) * | 2004-12-09 | 2006-06-15 | Honeywell International Inc. | Fault tolerance in a wireless network |
CN1838600A (en) * | 2005-03-24 | 2006-09-27 | 株式会社日立制作所 | Sensor network system, data transmission method |
US20080084294A1 (en) * | 2006-10-05 | 2008-04-10 | Electronics And Telecommunications Research Institute | Wireless sensor network and adaptive method for monitoring the security thereof |
-
2009
- 2009-10-26 CN CN2009102073519A patent/CN102045887A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567121B1 (en) * | 1996-10-25 | 2003-05-20 | Canon Kabushiki Kaisha | Camera control system, camera server, camera client, control method, and storage medium |
US20030189649A1 (en) * | 1996-10-25 | 2003-10-09 | Canon Kabushiki Kaisha | Camera control system, camera server, camera client, control method, and storage medium |
US20020197979A1 (en) * | 2001-05-22 | 2002-12-26 | Vanderveen Michaela Catalina | Authentication system for mobile entities |
CN1739039A (en) * | 2003-01-15 | 2006-02-22 | 皇家飞利浦电子股份有限公司 | System and method for providing subject location information |
US20060126501A1 (en) * | 2004-12-09 | 2006-06-15 | Honeywell International Inc. | Fault tolerance in a wireless network |
CN1838600A (en) * | 2005-03-24 | 2006-09-27 | 株式会社日立制作所 | Sensor network system, data transmission method |
US20060242285A1 (en) * | 2005-03-24 | 2006-10-26 | Norihiko Moriwaki | Sensor network system and data transfer method for sensing data |
US20080084294A1 (en) * | 2006-10-05 | 2008-04-10 | Electronics And Telecommunications Research Institute | Wireless sensor network and adaptive method for monitoring the security thereof |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024060077A1 (en) * | 2022-09-21 | 2024-03-28 | Lenovo (Beijing) Limited | Method and apparatus for integrated sensing and communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI401979B (en) | Access authorization method and apparatus for a wireless sensor network | |
Al‐Turjman et al. | An overview of security and privacy in smart cities' IoT communications | |
Al-Hadhrami et al. | DDoS attacks in IoT networks: a comprehensive systematic literature review | |
Hou et al. | A survey on internet of things security from data perspectives | |
Miranda et al. | A collaborative security framework for software-defined wireless sensor networks | |
Ashibani et al. | Cyber physical systems security: Analysis, challenges and solutions | |
Karthiga et al. | Intelligent intrusion detection system for VANET using machine learning and deep learning approaches | |
Rowan et al. | Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels | |
Ssu et al. | Detecting Sybil attacks in Wireless Sensor Networks using neighboring information | |
Ghahramani et al. | RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack | |
Singh et al. | Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks | |
Mahapatra et al. | A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges | |
Qaddoori et al. | An efficient security model for industrial internet of things (IIoT) system based on machine learning principles | |
KR101048509B1 (en) | Method and apparatus for detecting civil attack node using location information and hash chain in ubiquitous sensor network | |
Ahamed Ahanger et al. | Distributed blockchain‐based platform for unmanned aerial vehicles | |
Rudra | Impact of Blockchain for internet of Things Security | |
Li et al. | ZPA: A smart home privacy analysis system based on ZigBee encrypted traffic | |
Feraudo et al. | DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA | |
Alrubaiei et al. | Internet of Things in Cyber Security Scope | |
Thamilarasu et al. | Intrusion detection in RFID systems | |
Acharjya et al. | Recognizing attacks in wireless sensor network in view of internet of things | |
Parvathy et al. | Certain Investigation of Attacks in the Field of Internet of Things and Blockchain Technology | |
Patel et al. | Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities | |
Navinkumar et al. | Developing an optimized routing protocol with rumor riding technique for detection of Sybil attack in VANET environment | |
CN102045887A (en) | Access authorization device and method for wireless sensing network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110504 |