[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN102143495A - Method for detecting node attack in wireless sensor network - Google Patents

Method for detecting node attack in wireless sensor network Download PDF

Info

Publication number
CN102143495A
CN102143495A CN2011100654806A CN201110065480A CN102143495A CN 102143495 A CN102143495 A CN 102143495A CN 2011100654806 A CN2011100654806 A CN 2011100654806A CN 201110065480 A CN201110065480 A CN 201110065480A CN 102143495 A CN102143495 A CN 102143495A
Authority
CN
China
Prior art keywords
node
new
neighbouring
nodes
region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011100654806A
Other languages
Chinese (zh)
Other versions
CN102143495B (en
Inventor
叶灿才
卢林发
黄家祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zen science and Technology Co., Ltd.
Original Assignee
ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd filed Critical ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd
Priority to CN2011100654806A priority Critical patent/CN102143495B/en
Publication of CN102143495A publication Critical patent/CN102143495A/en
Application granted granted Critical
Publication of CN102143495B publication Critical patent/CN102143495B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for detecting node attack in a wireless sensor network, belonging to the application field of wireless sensor network and information security cross technology. The invention is characterized in that the method comprises the following steps: the wireless sensor network is divided into four allocation area steps; nodes and allocation areas are numbered to a corresponding mapping relation table, and the nodes are allocated to the corresponding area steps; a node broadcast ID (identity) and area numbers are fed back by the broadcasted node, the received broadcasted node is taken as a neighbouring node, and the ID and the area number for the neighbouring node are recorded in a neighbouring list step; the nodes check the area numbers of all neighbouring nodes in the neighbouring list to form a border area or border area numbers; the border area and four initialized allocation areas form new allocation areas; when the node area numbers change, the neighbouring broadcast ID and the new area are numbered, and the received broadcasted nodes modify the area numbers of the corresponding neighbouring nodes in the neighbouring list to form the wireless sensor network steps with new cells; addition of new nodes is the secondary detection step for replication nodes. The method has the advantages that any auxiliary equipment is not required, the energy consumption is low, the efficiency is high, and the method is easy to realize.

Description

The detection method that a kind of wireless sensing net node is attacked
Technical field
The present invention is a kind of wireless sensor network security protection scheme, belongs to wireless sensor network and information security interleaving techniques application.
Background technology
Wireless sensor network is a kind of emerging network of comprehensive multi-door technology, is widely used in every field such as military and civilian.Because sensor node makes it be vulnerable to various attack.After the node replication attacks is meant that the assailant captures sensor node, obtain important informations such as key and node ID, forge the massive duplication node, and it is spread to the attack type that carries out destructive activity in the network by these information.This attack is from network internal, and replica node has is captured all legal informations of node. and therefore, they are difficult to be found, and are stronger to the destructive power of network.
The detection method of node replication attacks can be divided into three major types: center detection, local detection and broadcasting detect.It is that all nodes regularly upload to Centroid with neighbor list that the center is detected, and Centroid is found out replica node. this method power consumption is big, and especially will to become the focus energy consumption very fast for the node around the Centroid, and in a single day Centroid is captured method and was lost efficacy immediately.Local detection is that replica node is found out in ballot between the neighbor node, and shortcoming is can't find out distance replica node far away and be subject to blacklist to attack.It is node inundation broadcasting authorization information that broadcasting detects, and receives the nodes records authorization information of information, and this method consumes energy big and needs very big memory space.
Summary of the invention
The objective of the invention is to overcome the shortcoming of prior art, the knot detection method that a kind of wireless sensing net node is attacked is provided, it adopts the network design subregion means and the method for new cautious detection means innovation combination to realize effective detection of replica node.
Below the present invention program is described further:
The detection method that a kind of wireless sensing net node is attacked is characterized in that:
Comprise step,
1) wireless sensor network is divided into four deployment region steps;
2) be the relation table of hinting obliquely at of node and deployment region numbering and formation correspondence, node is deployed to corresponding regional step;
3) node broadcasts ID and zone number receive the feedback of the node be broadcasted, and can receive this broadcasting as neighbor node, and the ID and the zone number of neighbor node be recorded in the neighbor list step;
4) node is checked the zone number of all neighbor nodes of neighbor list, forms borderline region and borderline region numbering; Borderline region and four initialized deployment region form new deployment region and divide;
When 5) node region numbering changes, its neighbours are broadcasted ID and new zone number, the node of receiving that is broadcasted is revised the zone number formation of corresponding neighbors and is had the wireless sensor network step of new subregion in the middle of its neighbor list;
6) new node adds, and this new node is broadcasted its ID and zone number; Neighbor node is received this broadcast message and is judged whether to equal the one's respective area numbering, if then find replica node, otherwise scans its neighbor list, judges whether to exist the neighbours ID that equates with this new node, if then find replica node.
Further optimize, when new node adds, also have step
7) new node selects the neighbouring region of a non-NULL to send authorization information at random, and specifies one of them joint of this neighbouring region to transmit authorization information; Receive of the ID contrast of the node of authorization information, if the ID for equating judges that then this new node is the secondary detection step of replica node by scanning neighbor list and interim tabulation.
Description of drawings
Fig. 1 is the initial deployment area schematic;
Fig. 2 is the new schematic diagram of the deployment region of borderline region;
Fig. 3 is the figure of testing process first of new node;
Fig. 4 is the secondary detection flow chart of new node.
Embodiment
Embodiment one
Referring to figs. 1 to 2, wireless sensor network is divided into four deployment region (being called main region again), i.e. zone 1,2,3 and 4; Then successively:
Be the relation table of hinting obliquely at of node and deployment region numbering and formation correspondence, node is deployed to corresponding zone;
Node broadcasts ID and zone number receive the feedback of the node be broadcasted, and can receive this broadcasting as neighbor node, and the ID and the zone number of neighbor node be recorded in neighbor list;
Node is checked the zone number of all neighbor nodes of neighbor list, forms borderline region and borderline region numbering (as Fig. 2, borderline region is respectively zone 5,6,7,8 and 9); Borderline region and four initialized deployment region form new deployment region;
When node region numbering changes, its neighbours are broadcasted ID and new zone number, the node of receiving that is broadcasted is revised the wireless sensor network that the zone number formation of corresponding neighbors has new subregion in the middle of its neighbor list.
Wherein, will be example with node A below, the rule of modifier area numbering is described:
Variable num xZone number is neighbours' quantity of x in the expression neighbor list, and corresponding code is as follows:
Figure BSA00000453850300041
Here threshold value NUM is in order to prevent that node was captured and the division of destroyed area before area dividing.Therefore, the NUM value generally gets 2. if in the neighbor list of node A num is arranged x<NUM, then A selects 3 neighborss at random, sends this node ID; If neighbor node returns same information, judge that then this ID is a replica node.Zone 2,3 and 4 interior nodes situations roughly the same, the node division in the final deployment region is as shown in Figure 2.
Initiate node has three kinds of possible positions: away from the intersection of the intersection of the main region inside of borderline region, corresponding main region and borderline region, non-corresponding main region and borderline region, at first set up coordinate at these three kinds of situations.
First kind: node region numbering is constant, and the horizontal ordinate of each neighbor node relatively gets wherein that minimum value adds 1, as its coordinate.
Second kind: the ratio that borderline region node and main region node respectively account in elder generation's calculating neighbors, which ratio is greater than 50%, and its zone number just is defined as the numbering in which zone.If the node ratio in zone 9 surpasses 25% in the neighbors, then the zone number of newly added node is that 9. regional 9 interior nodes coordinates are (0,0), other borderline region interior nodes are defined as 0 according to zone number with one of them, and other situation lower node coordinates are with first kind of situation.
The third: node failure.
As shown in Figure 3, new node adds fashionable, and this new node is broadcasted its ID and zone number; Neighbor node is received this broadcast message and is judged whether to equal the one's respective area numbering, if then find replica node, otherwise then scans its neighbor list, judges whether to exist the neighbours ID that equates with this new node, if then find replica node.
As shown in Figure 4, after finishing testing process shown in Figure 3, new node selects the neighbouring region of a non-NULL to send authorization information at random, and specifies one of them joint of this neighbouring region to transmit authorization information; Receive of the ID contrast of the node of authorization information by scanning neighbor list and interim tabulation, if be the ID that equates, judge that then this new node is a replica node, otherwise the node of receiving authorization information selects at random the neighbouring region of a non-NULL to send authorization information to finish secondary detection.
In sum, method contrast prior art of the present invention, it is finished by normal sensor node fully not by any auxiliary equipment, realizes that transmitting-receiving bag number significantly reduces in the attack detecting process, and can directly find out remote replica node; To replica node at the same area, because close together, so need not to launch a large amount of checking lines, thus energy saved, in contrast to conventional method consumed energy is significantly reduced.

Claims (2)

1. the wireless sensing net node detection method of attacking is characterized in that:
Comprise step,
1) wireless sensor network is divided into four deployment region steps;
2) be the relation table of hinting obliquely at of node and deployment region numbering and formation correspondence, node is deployed to corresponding regional step;
3) node broadcasts ID and zone number receive the feedback of the node be broadcasted, and can receive this broadcasting as neighbor node, and the ID and the zone number of neighbor node be recorded in the neighbor list step;
4) node is checked the zone number of all neighbor nodes of neighbor list, forms borderline region and borderline region numbering; Borderline region and four initialized deployment region form new deployment region and divide;
When 5) node region numbering changes, its neighbours are broadcasted ID and new zone number, the node of receiving that is broadcasted is revised the zone number formation of corresponding neighbors and is had the wireless sensor network step of new subregion in the middle of its neighbor list;
6) new node adds, and this new node is broadcasted its ID and zone number; Neighbor node is received this broadcast message and is judged whether to equal the one's respective area numbering, if then find replica node, otherwise scans its neighbor list, judges whether to exist the neighbours ID that equates with this new node, if then find replica node.
2. detection method as claimed in claim 1 is characterized in that, also has step
7) new node selects the neighbouring region of a non-NULL to send authorization information at random, and specifies one of them joint of this neighbouring region to transmit authorization information; Receive of the ID contrast of the node of authorization information, if the ID for equating judges that then this new node is the secondary detection step of replica node by scanning neighbor list and interim tabulation.
CN2011100654806A 2011-03-16 2011-03-16 Method for detecting node attack in wireless sensor network Expired - Fee Related CN102143495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100654806A CN102143495B (en) 2011-03-16 2011-03-16 Method for detecting node attack in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100654806A CN102143495B (en) 2011-03-16 2011-03-16 Method for detecting node attack in wireless sensor network

Publications (2)

Publication Number Publication Date
CN102143495A true CN102143495A (en) 2011-08-03
CN102143495B CN102143495B (en) 2013-12-18

Family

ID=44410658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100654806A Expired - Fee Related CN102143495B (en) 2011-03-16 2011-03-16 Method for detecting node attack in wireless sensor network

Country Status (1)

Country Link
CN (1) CN102143495B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024745A (en) * 2012-12-05 2013-04-03 暨南大学 Replication node detection method of wireless sensor network
CN103037024A (en) * 2012-12-05 2013-04-10 华为技术有限公司 Method and device for dividing node subdomain attribution
CN104702606A (en) * 2015-03-12 2015-06-10 北京理工大学 Method for replication attack detection of distributed type wireless sensor network nodes
CN106385419A (en) * 2016-09-21 2017-02-08 北京联合大学 Wireless sensor network key management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007014182A1 (en) * 2005-07-25 2007-02-01 Honeywell International Inc. Neighbor based tdma slot assignment
CN101159748A (en) * 2007-11-14 2008-04-09 北京科技大学 Entity authentication method in wireless sensor network
CN101610510A (en) * 2009-06-10 2009-12-23 南京邮电大学 Node legitimacy multiple-authentication method in the layer cluster type wireless self-organization network
CN101765095A (en) * 2009-12-14 2010-06-30 浙江大学 Tracking method for wireless sensor network moving target based on mixed cluster

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007014182A1 (en) * 2005-07-25 2007-02-01 Honeywell International Inc. Neighbor based tdma slot assignment
CN101159748A (en) * 2007-11-14 2008-04-09 北京科技大学 Entity authentication method in wireless sensor network
CN101610510A (en) * 2009-06-10 2009-12-23 南京邮电大学 Node legitimacy multiple-authentication method in the layer cluster type wireless self-organization network
CN101765095A (en) * 2009-12-14 2010-06-30 浙江大学 Tracking method for wireless sensor network moving target based on mixed cluster

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024745A (en) * 2012-12-05 2013-04-03 暨南大学 Replication node detection method of wireless sensor network
CN103037024A (en) * 2012-12-05 2013-04-10 华为技术有限公司 Method and device for dividing node subdomain attribution
CN103024745B (en) * 2012-12-05 2015-08-26 暨南大学 The detection method of replica node in a kind of wireless sensor network
CN104702606A (en) * 2015-03-12 2015-06-10 北京理工大学 Method for replication attack detection of distributed type wireless sensor network nodes
CN104702606B (en) * 2015-03-12 2018-01-19 北京理工大学 A kind of Distributed Wireless Sensor Networks Node replication attack detection method
CN106385419A (en) * 2016-09-21 2017-02-08 北京联合大学 Wireless sensor network key management method and system
CN106385419B (en) * 2016-09-21 2019-10-08 北京联合大学 Key management method of wireless sensor network and system

Also Published As

Publication number Publication date
CN102143495B (en) 2013-12-18

Similar Documents

Publication Publication Date Title
Xing et al. Real-time detection of clone attacks in wireless sensor networks
CN112019373B (en) Intelligent home security data acquisition method based on dynamic trust evaluation model
CN101309151B (en) Safe positioning method for wireless sensor
CN102143495B (en) Method for detecting node attack in wireless sensor network
CN102202322A (en) Method for anti-interference of wireless sensor network based on game theory
CN108092826A (en) Based on the hierarchical wireless sense network security model of backbone node security role
CN101257355A (en) Method for detecting wireless sensor network node malfunction
CN102547763B (en) Control method for wireless network topology
CN103731834A (en) Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network
CN103297973A (en) Method for detecting Sybil attack in underwater wireless sensor networks
Rafeh et al. Detecting sybil nodes in wireless sensor networks using two-hop messages
Feng et al. Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment
CN103491542B (en) The sewage pool attack intrusion detection method of Multi-path route in underwater sensor network
CN103281674A (en) Method for configuring wireless sensor network address based on locating information
Alsaedi et al. Energy trust system for detecting sybil attack in clustered wireless sensor networks
CN103401687A (en) System and method for realizing wireless sensor network node data authentication
CN106027567B (en) Utilize the distributed frequency spectrum cognitive method and device for distorting perception data attack signature
Lalar et al. An efficient tree-based clone detection scheme in wireless sensor network
Li et al. Grouping-enhanced resilient probabilistic en-route filtering of injected false data in WSNs
CN109150623B (en) Method for resisting SSDF attack of malicious user based on round robin reputation value
CN105898700A (en) Energy-saving barrier coverage method for mobile sensing nodes on two-dimensional plane
Tian et al. A novel sybil attack detection scheme for wireless sensor network
CN105142149A (en) RSS-based WLAN spoofing attack detection method
CN104702606B (en) A kind of Distributed Wireless Sensor Networks Node replication attack detection method
Wang A three-tier scheme for sybil attack detection in heterogeneous IWSN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 605 room 6, 528400 Xinhua Road, Zhongshan Town, Guangdong, China

Applicant after: Zhongshan Iker Digital Technology Co., Ltd.

Address before: 605 room 6, 528400 Xinhua Road, Zhongshan Town, Guangdong, China

Applicant before: Zhongshan Aike Digital Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: ZHONGSHAN AIKE DIGITAL TECHNOLOGY CO., LTD. TO: ZHONGSHAN IKER DIGITAL TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180425

Address after: 528400 one of the 25 floors of the 1 building of Tazhong square, No. 1 East Convention and exhibition hall, Torch Development Zone, Zhongshan, Guangdong, China.

Patentee after: Guangdong Zen science and Technology Co., Ltd.

Address before: 528400 room 605, Xinhua Road 6, triangle town, Zhongshan, Guangdong.

Patentee before: Zhongshan Iker Digital Technology Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131218

Termination date: 20200316