CN102143495B - Method for detecting node attack of wireless sensor network - Google Patents
Method for detecting node attack of wireless sensor network Download PDFInfo
- Publication number
- CN102143495B CN102143495B CN2011100654806A CN201110065480A CN102143495B CN 102143495 B CN102143495 B CN 102143495B CN 2011100654806 A CN2011100654806 A CN 2011100654806A CN 201110065480 A CN201110065480 A CN 201110065480A CN 102143495 B CN102143495 B CN 102143495B
- Authority
- CN
- China
- Prior art keywords
- node
- area
- nodes
- new
- neighbor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title abstract description 13
- 238000001514 detection method Methods 0.000 claims abstract description 21
- 238000013507 mapping Methods 0.000 claims abstract description 4
- 238000005192 partition Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 14
- 238000005265 energy consumption Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000010076 replication Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 2
- 230000001066 destructive effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000013316 zoning Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域 technical field
本发明是一种无线传感器网络安全保护方案,属于无线传感器网络与信息安全交叉技术应用领域。The invention is a wireless sensor network security protection scheme, which belongs to the application field of wireless sensor network and information security intersecting technology.
背景技术 Background technique
无线传感器网络是一种综合多门技术的新兴网络,被广泛地应用于军事和民用等各个领域。由于传感器节点的特点,使它易受到各种不同的攻击。节点复制攻击是指攻击者俘获传感器节点后,得到密钥和节点ID等重要信息,通过这些信息伪造大量复制节点,并将其散布到网络中进行破坏活动的攻击类型。这种攻击来自网络内部,复制节点具有被俘节点的一切合法信息.因此,它们很难被发现,对网络的破坏力较强。Wireless sensor network is a kind of emerging network integrating multiple technologies, which is widely used in various fields such as military and civilian. Due to the characteristics of sensor nodes, it is vulnerable to various attacks. Node replication attack refers to the attack type in which the attacker obtains important information such as keys and node IDs after capturing sensor nodes, forges a large number of replication nodes through these information, and spreads them into the network to carry out sabotage activities. This kind of attack comes from inside the network, and the copy nodes have all the legal information of the captured nodes. Therefore, they are difficult to be found and have strong destructive power to the network.
节点复制攻击的检测方法可分为三大类:中心检测、局部检测和广播检测。中心检测是所有节点定时将邻居列表上传到中心节点,中心节点找出复制节点.这种方法耗能大,尤其中心节点周围的节点将成为热点能耗很快,中心节点一旦被俘方法立即失效。局部检测是邻居节点之间投票找出复制节点,缺点是无法找出距离较远的复制节点且易受黑名单攻击。广播检测是节点洪泛广播验证信息,收到信息的节点记录验证信息,这种方法耗能大且需要很大的存储空间。The detection methods of node replication attack can be divided into three categories: central detection, local detection and broadcast detection. Central detection means that all nodes regularly upload the neighbor list to the central node, and the central node finds out the duplicate nodes. This method consumes a lot of energy, especially the nodes around the central node will become hot spots, and the energy consumption will be very fast. Once the central node is captured, the method will immediately fail . Local detection is to vote among neighboring nodes to find out the replica nodes. The disadvantage is that it cannot find out the replica nodes that are far away and is vulnerable to blacklist attacks. Broadcast detection means that nodes flood broadcast verification information, and the nodes that receive the information record the verification information. This method consumes a lot of energy and requires a lot of storage space.
发明内容 Contents of the invention
本发明的目的是克服现有技术的缺点,提供结一种无线传感网节点攻击的检测方法,它采用网络部署分区手段和新检点检测手段创新结合的方法实现复制节点的有效检测。The purpose of the present invention is to overcome the shortcoming of prior art, provide a kind of detection method of wireless sensor network node attack, it adopts the method for the innovative combination of network deployment zoning means and new checkpoint detection means to realize the effective detection of duplicated nodes.
下面对本发明方案做进一步描述:The scheme of the present invention is further described below:
一种无线传感网节点攻击的检测方法,其特征在于:A detection method for a wireless sensor network node attack, characterized in that:
包括步骤,include steps,
1)无线传感器网络被划分为四个部署区域步骤;1) The wireless sensor network is divided into four deployment area steps;
2)为节点及部署区域编号并形成对应的影射关系表,节点被部署到相应的区域步骤;2) Number the nodes and deployment areas and form a corresponding mapping relationship table, and the nodes are deployed to the corresponding area steps;
3)节点广播ID和区域编号,接收被广播的节点的反馈,并将能接收到该广播的作为邻居节点,并将邻居节点的ID和区域编号记录在邻居列表步骤;3) The node broadcasts the ID and the area number, receives the feedback of the broadcasted node, and regards the node that can receive the broadcast as a neighbor node, and records the ID and the area number of the neighbor node in the neighbor list step;
4)节点检查邻居列表所有邻居节点的区域编号,形成边界区域及边界区域编号;边界区域和四个初始化的部署区域形成新的部署区域划分;4) The node checks the area numbers of all neighbor nodes in the neighbor list to form the border area and the border area number; the border area and the four initialized deployment areas form a new deployment area division;
5)节点区域编号发生变化时,对它的邻居广播ID和新的区域编号,收到的被广播节点在其邻居列表当中修改对应邻节点的区域编号形成具有新分区的无线传感器网络步骤;5) When the node area number changes, broadcast ID and new area number to its neighbors, and the received broadcasted node modifies the area number of the corresponding adjacent node in its neighbor list to form a wireless sensor network step with a new partition;
6)新节点加入,该新节点广播其ID及区域编号;邻居节点收到该广播信息并判断是否等于本区域编号,如果是则发现复制节点,否则扫描其邻居列表,判断是否存在与该新节点相等的邻居ID,如果是则发现复制节点。6) A new node joins, and the new node broadcasts its ID and area number; the neighbor node receives the broadcast information and judges whether it is equal to the area number, and if so, finds the duplicate node, otherwise scans its neighbor list to determine whether there is an ID related to the new node. Neighbor IDs for nodes equal, if so to discover duplicate nodes.
进一步优化,新节点加入时候,还具有步骤Further optimization, when a new node joins, there are also steps
7)新节点随机选择一个非空的邻区域发送验证信息,并指定该邻区域其中一个节转发验证信息;收到验证信息的节点通过扫描邻居列表和临时列表的ID对比,如果为相等的ID,则判断该新节点为复制节点的二次检测步骤。7) The new node randomly selects a non-empty adjacent area to send the verification information, and specifies one of the nodes in the adjacent area to forward the verification information; the node receiving the verification information compares the IDs of the neighbor list and the temporary list by scanning, if they are equal IDs , the second detection step of judging that the new node is a duplicate node.
附图说明 Description of drawings
图1是初始部署区域示意图;Figure 1 is a schematic diagram of the initial deployment area;
图2是边界区域的部署区域新示意图;Figure 2 is a new schematic diagram of the deployment area in the border area;
图3是新节点的首次检测流程图;Fig. 3 is the first detection flow chart of new node;
图4是新节点的二次检测流程图。Fig. 4 is a flow chart of secondary detection of new nodes.
具体实施方式 Detailed ways
实施例一Embodiment one
参考图1至2,无线传感器网络被划分为四个部署区域(又称为主区域),即区域1、2、3和4;然后依次:Referring to Figures 1 to 2, the wireless sensor network is divided into four deployment areas (also known as main areas), namely
为节点及部署区域编号并形成对应的影射关系表,节点被部署到相应的区域;Number the nodes and deployment areas and form a corresponding mapping relationship table, and the nodes are deployed to the corresponding areas;
节点广播ID和区域编号,接收被广播的节点的反馈,并将能接收到该广播的作为邻居节点,并将邻居节点的ID和区域编号记录在邻居列表;The node broadcasts the ID and area number, receives the feedback from the broadcasted node, and regards the node that can receive the broadcast as a neighbor node, and records the ID and area number of the neighbor node in the neighbor list;
节点检查邻居列表所有邻居节点的区域编号,形成边界区域及边界区域编号(如图2,边界区域分别为区域5、6、7、8和9);边界区域和四个初始化的部署区域形成新的部署区域;The node checks the area numbers of all neighbor nodes in the neighbor list to form border areas and border area numbers (as shown in Figure 2, the border areas are
节点区域编号发生变化时,对它的邻居广播ID和新的区域编号,收到的被广播节点在其邻居列表当中修改对应邻节点的区域编号形成具有新分区的无线传感器网络。When the area number of a node changes, it broadcasts the ID and the new area number to its neighbors, and the received broadcast node modifies the area number of the corresponding neighbor node in its neighbor list to form a wireless sensor network with a new partition.
其中,下面将以节点A为例,说明修改区域编号的规则:Among them, the following will take node A as an example to illustrate the rules for modifying the area number:
变量numx表示邻居列表中区域编号为x的邻居数量,相应的代码如下:The variable num x indicates the number of neighbors whose area number is x in the neighbor list, and the corresponding code is as follows:
这里阈值NUM是为了防止节点在区域划分之前被俘而破坏区域的划分。因此,NUM值一般取2.若节点A的邻居列表中有numx<NUM,则A随机选择3个邻节点,发送该节点ID;若邻居节点返回同样信息,则判定该ID为复制节点。区域2、3和4内节点情况类同,最终部署区域内的节点划分如图2所示。Here the threshold NUM is to prevent the node from being captured before the region division and destroying the division of the region. Therefore, the NUM value is generally taken as 2. If num x <NUM exists in the neighbor list of node A, then A randomly selects 3 neighbor nodes and sends the node ID; if the neighbor node returns the same information, it is determined that the ID is a duplicate node. The nodes in
新加入的节点有三种可能的位置:远离边界区域的主区域内部、对应主区域和边界区域的交界处、非对应主区域和边界区域的交界处,首先针对这三种情况建立坐标。There are three possible locations for the newly added nodes: the interior of the main area away from the boundary area, the junction of the corresponding main area and the border area, and the junction of the non-corresponding main area and the border area. First, establish coordinates for these three situations.
第一种:节点区域编号不变,比较各个邻居节点的横纵坐标,取其中最小值加1,作为它的坐标。The first one: the number of the node area remains unchanged, compare the horizontal and vertical coordinates of each neighboring node, and take the minimum value plus 1 as its coordinate.
第二种:先计算邻节点中边界区域节点和主区域节点各占的比例,哪一个的比例大于50%,它的区域编号就确定为哪一个区域的编号。若邻节点中区域9的节点比例超过25%,则新加入节点的区域编号为9.区域9内节点坐标为(0,0),其他边界区域内节点根据区域编号将其中一个确定为0,其他情况下节点坐标同第一种情况。The second method: firstly calculate the respective ratios of border region nodes and main region nodes among adjacent nodes, and whichever ratio is greater than 50%, its region number is determined to be the number of that region. If the proportion of nodes in
第三种:节点失效。The third type: node failure.
如图3所示,新节点加入时,该新节点广播其ID及区域编号;邻居节点收到该广播信息并判断是否等于本区域编号,如果是则发现复制节点,否则则扫描其邻居列表,判断是否存在与该新节点相等的邻居ID,如果是则发现复制节点。As shown in Figure 3, when a new node joins, the new node broadcasts its ID and area number; the neighbor node receives the broadcast information and judges whether it is equal to the area number, if so, finds the duplicate node, otherwise scans its neighbor list, Determine whether there is a neighbor ID equal to the new node, and if so, find the duplicate node.
如图4所示,在完成图3所示的检测流程后,新节点随机选择一个非空的邻区域发送验证信息,并指定该邻区域其中一个节转发验证信息;收到验证信息的节点通过扫描邻居列表和临时列表的ID对比,如果为相等的ID,则判断该新节点为复制节点,否则收到验证信息的节点随机选择一个非空的邻区域发送验证信息以完成二次检测。As shown in Figure 4, after completing the detection process shown in Figure 3, the new node randomly selects a non-empty adjacent area to send verification information, and designates one of the nodes in the adjacent area to forward the verification information; the node that receives the verification information passes Scan the neighbor list and compare the IDs of the temporary list. If the IDs are equal, it is judged that the new node is a duplicate node. Otherwise, the node receiving the verification information randomly selects a non-empty adjacent area to send verification information to complete the secondary detection.
综上所述,本发明的方法对比现有技术,它不借助任何辅助设备,完全由正常的传感器节点完成,实现攻击检测过程中收发包数大大减少,并可以直接找出远距离的复制节点;对在同一区域的复制节点,由于距离较近,所以无需发射大量的验证线,从而节省了能量,对比于传统方法将消耗能量大幅降低。In summary, compared with the prior art, the method of the present invention is completely completed by normal sensor nodes without any auxiliary equipment, so that the number of sending and receiving packets in the process of attack detection is greatly reduced, and the remote replication node can be directly found ; For the replication nodes in the same area, due to the short distance, there is no need to send a large number of verification lines, thereby saving energy, and compared with the traditional method, the energy consumption will be greatly reduced.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100654806A CN102143495B (en) | 2011-03-16 | 2011-03-16 | Method for detecting node attack of wireless sensor network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100654806A CN102143495B (en) | 2011-03-16 | 2011-03-16 | Method for detecting node attack of wireless sensor network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102143495A CN102143495A (en) | 2011-08-03 |
CN102143495B true CN102143495B (en) | 2013-12-18 |
Family
ID=44410658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100654806A Expired - Fee Related CN102143495B (en) | 2011-03-16 | 2011-03-16 | Method for detecting node attack of wireless sensor network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102143495B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103037024B (en) * | 2012-12-05 | 2016-06-29 | 华为技术有限公司 | Method and device for dividing node subdomain attribution |
CN103024745B (en) * | 2012-12-05 | 2015-08-26 | 暨南大学 | The detection method of replica node in a kind of wireless sensor network |
CN104702606B (en) * | 2015-03-12 | 2018-01-19 | 北京理工大学 | A kind of Distributed Wireless Sensor Networks Node replication attack detection method |
CN106385419B (en) * | 2016-09-21 | 2019-10-08 | 北京联合大学 | Key management method of wireless sensor network and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159748A (en) * | 2007-11-14 | 2008-04-09 | 北京科技大学 | An Entity Authentication Method in Wireless Sensor Networks |
CN101610510A (en) * | 2009-06-10 | 2009-12-23 | 南京邮电大学 | Multi-Authentication Method of Node Legitimacy in Layer-Cluster Wireless Ad Hoc Networks |
CN101765095A (en) * | 2009-12-14 | 2010-06-30 | 浙江大学 | Tracking method for wireless sensor network moving target based on mixed cluster |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7804803B2 (en) * | 2005-07-25 | 2010-09-28 | Honeywell International Inc. | Neighbor based TDMA slot assignment |
-
2011
- 2011-03-16 CN CN2011100654806A patent/CN102143495B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159748A (en) * | 2007-11-14 | 2008-04-09 | 北京科技大学 | An Entity Authentication Method in Wireless Sensor Networks |
CN101610510A (en) * | 2009-06-10 | 2009-12-23 | 南京邮电大学 | Multi-Authentication Method of Node Legitimacy in Layer-Cluster Wireless Ad Hoc Networks |
CN101765095A (en) * | 2009-12-14 | 2010-06-30 | 浙江大学 | Tracking method for wireless sensor network moving target based on mixed cluster |
Also Published As
Publication number | Publication date |
---|---|
CN102143495A (en) | 2011-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xing et al. | Real-time detection of clone attacks in wireless sensor networks | |
CN101309151B (en) | Safe positioning method for wireless sensor | |
CN102143495B (en) | Method for detecting node attack of wireless sensor network | |
Fotohi et al. | A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks | |
Cho et al. | Classification and experimental analysis for clone detection approaches in wireless sensor networks | |
AU2013100319A4 (en) | Apparatus and method for Malicious Node Detection for Network Security Based on Uncertain Decisions | |
Mishra et al. | A comparative analysis of node replica detection schemes in wireless sensor networks | |
Han et al. | A two-step secure localization for wireless sensor networks | |
CN101594271A (en) | Establishment and working methods of wireless ad hoc networks and related networks and equipment | |
Dorri et al. | A new approach for detecting and eliminating cooperative black hole nodes in MANET | |
CN102378217A (en) | Beacon node credit assessment method in localization in wireless sensor networks | |
Moore | A collusion attack on pairwise key predistribution schemes for distributed sensor networks | |
CN103024745B (en) | The detection method of replica node in a kind of wireless sensor network | |
CN103491542B (en) | The sewage pool attack intrusion detection method of Multi-path route in underwater sensor network | |
Lalar et al. | An efficient tree-based clone detection scheme in wireless sensor network | |
Guo et al. | Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks | |
CN112929882B (en) | A method to identify witch nodes and overlapping nodes | |
Liu | Protecting neighbor discovery against node compromises in sensor networks | |
Alhindawi et al. | Node-replication attack detection in vehicular Ad-hoc networks based on automatic approach | |
Raj et al. | Sink Hole attack detection using two step verification technique in wireless sensor networks | |
Daniel et al. | A survey on detection of clones in wireless sensor networks | |
Qu et al. | A robust key predistribution scheme for wireless sensor networks | |
Grewal et al. | A survey on proficient techniques to mitigate clone attack in wireless sensor networks | |
Gupta et al. | Wireless Sensor Networks:“A Review on Replica Detection Techniques” | |
CN107623553B (en) | A Robust Cooperative Spectrum Sensing Method Based on Reliable Evaluation Criteria |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: 605 room 6, 528400 Xinhua Road, Zhongshan Town, Guangdong, China Applicant after: Zhongshan Iker Digital Technology Co., Ltd. Address before: 605 room 6, 528400 Xinhua Road, Zhongshan Town, Guangdong, China Applicant before: Zhongshan Aike Digital Technology Co., Ltd. |
|
COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: ZHONGSHAN AIKE DIGITAL TECHNOLOGY CO., LTD. TO: ZHONGSHAN IKER DIGITAL TECHNOLOGY CO., LTD. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180425 Address after: 528400 one of the 25 floors of the 1 building of Tazhong square, No. 1 East Convention and exhibition hall, Torch Development Zone, Zhongshan, Guangdong, China. Patentee after: Guangdong Zen science and Technology Co., Ltd. Address before: 528400 room 605, Xinhua Road 6, triangle town, Zhongshan, Guangdong. Patentee before: Zhongshan Iker Digital Technology Co., Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20131218 Termination date: 20200316 |