CN103313236B - Base station hidden method in wireless sensor network - Google Patents

Base station hidden method in wireless sensor network Download PDF

Info

Publication number
CN103313236B
CN103313236B CN201310277745.8A CN201310277745A CN103313236B CN 103313236 B CN103313236 B CN 103313236B CN 201310277745 A CN201310277745 A CN 201310277745A CN 103313236 B CN103313236 B CN 103313236B
Authority
CN
China
Prior art keywords
data
node
time slot
child node
send
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310277745.8A
Other languages
Chinese (zh)
Other versions
CN103313236A (en
Inventor
徐恪
谭维
陈文龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201310277745.8A priority Critical patent/CN103313236B/en
Publication of CN103313236A publication Critical patent/CN103313236A/en
Application granted granted Critical
Publication of CN103313236B publication Critical patent/CN103313236B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention proposes base station hidden method in a kind of wireless sensor network, comprising: all nodes determine self child node number N; Data transmitting period T=(the N+1) × s of father node, top n time slot and N number of child node one_to_one corresponding; Father node notice child node starts to send data; At time slot S i, child node C ijudge self whether have True Data to need to send to father node, if had, then to send True Data, if do not had, then send data falsification; Father node judges the type of data, if True Data, then buffer memory True Data, if data falsification, then abandons data falsification; At time slot S n+1, the True Data of buffer memory and the data of self are carried out polymerization process by father node, and polymerization deal with data is sent to superior node.The present invention is in a data transmitting period, and father node and child node all send true or data falsification, and therefore assailant can not obtain between node from the otherness of flow asymmetry or transmission rate hierarchical relationship, achieves the object of hiding base station.

Description

Base station hidden method in wireless sensor network
Technical field
The invention belongs to wireless sensor network security technical field, be specifically related to base station hidden method in a kind of wireless sensor network.
Background technology
The application of wireless sensor network is more and more extensive, such as, for environmental monitoring, the monitoring of wild animal life habit, battlefield monitoring, household safe monitoring etc.A wireless sensor network generally includes the ordinary node of responsible Data Collection and some base stations, ordinary node is all generally resource-constrained, namely its computing capability, storage capacity, radio communication ability, communication bandwidth are limited, especially, they are all that the energy is limited, and be generally deployed in rugged environment be thus not easy to change battery.Perception data is sent to base station in the mode of multi-hop, radio communication by ordinary node, storage, the computing capability of base station are more powerful, the data collected are carried out polymerization process by the one hand, on the other hand for Internet user provides data access interface, be therefore equivalent to sensor network and internet gateway.
Suppose in a wireless sensor network, the radio communication scope of node is r, is namely in ordinary node in circle that radius is r and base station can direct communication each other.Assailant has more powerful radiofrequency launcher usually, therefore the radiofrequency signal that it is launched can propagate the distance being distal to r, that is the interference range of assailant is larger than the communication range of node, but, the eavesdropping radius of hypothesize attack person is also r, because the RF signal power of node is smaller, assailant needs highstrung radio frequency receiver just can intercept radiofrequency signal beyond scope r.Therefore, assailant only has the local knowledge of wireless sensor network, but does not possess overall information to destroy whole wireless sensor network, large-scale wireless sensor network particularly.Assailant can determine the position of direct message sending node by the mode of eavesdropping, thus it can by destroy or the mode of ordinary node of compromising reduces the function of wireless sensor network, but more efficiently attack pattern is the position finding in network the base station being in Central Position, then the attack that destructive power is more powerful is started, such as near base station, send block signal, or directly smash up base station.Therefore, the base station concealing technology in wireless sensor network is extremely important.
Be illustrated in figure 1 data transmission timing figure in common wireless sensor network.Node P has a father node and 5 child nodes within the scope of its radio communication, is C respectively 1, C 2, C 3, C 4and C 5, data have fixing size and data transmitting time is all Δ t, and wherein data transmitting time comprises data transmission period and data dissemination time.When certain child node has data to send, it sends the data to its father node P immediately, a node can only be had to carry out data transmission at every turn, otherwise can data collision be there is and cause data to send unsuccessfully, node uses the multiple access protocol of MAC layer (Media Access Control, media access control layer) to avoid this collision.In Fig. 1, child node C 1, C 2, C 3, C 4and C 5have sent data to node P successively, the time delay between data is random.Same, also immediately these data are sent to its father node after the data that node P sends in the child node receiving it.
Use in the wireless sensor network of this general data transmission method for uplink, the position of base station is easy to victim and finds.First, data always send to father node from child node, father node continues the superior node being transmitted to it, therefore the data transmitting time of child node, father node also exists association, namely the delay in data transmitting time and delayed, assailant can find the hierarchical relationship of father and son's node by this temporal association mode, the root node of this level is base station, and therefore it can vectored attack person be followed the trail of towards direction, base station.Secondly, because data finally all send to base station, therefore the node that distance base station is near is faster than the data transmission rate of the node away from base station, namely flow is large, otherness in this message transmission rate in other words flow asymmetry also discloses the hierarchical relationship of wireless sensor network to a certain extent, can utilize tracking base station location by victim.
Summary of the invention
The present invention one of is intended to solve the problems of the technologies described above at least to a certain extent or at least provides a kind of useful business to select.For this reason, the object of the invention is to propose base station hidden method in a kind of wireless sensor network, comprise the following steps: S1: all nodes determine self child node number N, and described child node is designated as C respectively 1, C 2..., C n, wherein, N is positive integer; S2: data transmitting period T=(the N+1) × s of father node, wherein s is time slot, and namely described data transmitting period T is divided into N+1 time slot, and each time slot is designated as S respectively 1, S 2..., S n, S n+1, top n time slot and N number of child node one_to_one corresponding; S3: described father node notifies that the child node of self starts to send data; S4: at time slot S i, child node C ijudge self whether have True Data to need to send to father node, if had, then to send described True Data, if do not had, then send data falsification; S5: when described father node receives the data from child node, judge the type of described data, if True Data, then True Data described in buffer memory, if data falsification, then abandons described data falsification; S6: at time slot S n+1, the described True Data of buffer memory and the data of self are carried out polymerization process by described father node, and polymerization deal with data is sent to superior node.
Preferably, at time slot S i, child node C ithe time sending described data is data transmitting time Δ t, and Δ t < s.
According to base station hidden method in the wireless sensor network of the embodiment of the present invention, in a data transmitting period, father node and its all child node all send true or data falsification, therefore assailant can not obtain between node from the otherness of flow asymmetry or transmission rate hierarchical relationship, also just can not track the position of base station, achieve the object of hiding base station.
Additional aspect of the present invention and advantage will part provide in the following description, and part will become obvious from the following description, or be recognized by practice of the present invention.
Accompanying drawing explanation
Above-mentioned and/or additional aspect of the present invention and advantage will become obvious and easy understand from accompanying drawing below combining to the description of embodiment, wherein:
Fig. 1 is data transmission timing figure in common wireless sensor network;
Fig. 2 is typical wireless sensor network structure chart;
Fig. 3 is the data transmission timing figure that in the wireless sensor network of the embodiment of the present invention, base station hides;
Fig. 4 is the flow chart of base station hidden method in the wireless sensor network of the embodiment of the present invention.
Embodiment
Be described below in detail embodiments of the invention, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has element that is identical or similar functions from start to finish.Be exemplary below by the embodiment be described with reference to the drawings, be intended to for explaining the present invention, and can not limitation of the present invention be interpreted as.
In describing the invention, it will be appreciated that, term " " center ", " longitudinal direction ", " transverse direction ", " length ", " width ", " thickness ", " on ", D score, " front ", " afterwards ", " left side ", " right side ", " vertically ", " level ", " top ", " end " " interior ", " outward ", " clockwise ", orientation or the position relationship of the instruction such as " counterclockwise " are based on orientation shown in the drawings or position relationship, only the present invention for convenience of description and simplified characterization, instead of indicate or imply that the device of indication or element must have specific orientation, with specific azimuth configuration and operation, therefore limitation of the present invention can not be interpreted as.
In addition, term " first ", " second " only for describing object, and can not be interpreted as instruction or hint relative importance or imply the quantity indicating indicated technical characteristic.Thus, be limited with " first ", the feature of " second " can express or impliedly comprise one or more these features.In describing the invention, the implication of " multiple " is two or more, unless otherwise expressly limited specifically.
In the present invention, unless otherwise clearly defined and limited, the term such as term " installation ", " being connected ", " connection ", " fixing " should be interpreted broadly, and such as, can be fixedly connected with, also can be removably connect, or connect integratedly; Can be mechanical connection, also can be electrical connection; Can be directly be connected, also indirectly can be connected by intermediary, can be the connection of two element internals.For the ordinary skill in the art, above-mentioned term concrete meaning in the present invention can be understood as the case may be.
In the present invention, unless otherwise clearly defined and limited, fisrt feature second feature it " on " or D score can comprise the first and second features and directly contact, also can comprise the first and second features and not be directly contact but by the other characterisation contact between them.And, fisrt feature second feature " on ", " top " and " above " comprise fisrt feature directly over second feature and oblique upper, or only represent that fisrt feature level height is higher than second feature.Fisrt feature second feature " under ", " below " and " below " comprise fisrt feature immediately below second feature and tiltedly below, or only represent that fisrt feature level height is less than second feature.
As shown in Figure 2, be typical wireless sensor network structure chart.Node in wireless sensor network has oneself scope of enlivening or communication range, within the scope of this, can intercom mutually between node.Node organization becomes a tree, each node also exists a father node and several child nodes in its communication range, data from its child node are sent to its father node together with self data by node, before transmitting, it also may carry out data aggregate, to save transmitting energy.The root node of every tree is a base station, and the size of its scale of wireless sensor network because may also exist one or more base station.From the appearance other node in base station and wireless sensor network is as broad as long, but base stations being in charge collects the data of all nodes in a tree, and provides the data access interface of Internet user.Therefore for a wireless sensor network, base station plays a part very crucial, once the position of base station exposes, assailant just can start the attack that various destructive power is powerful, and the method that the embodiment of the present invention provides effectively can hide the base station in wireless sensor network.
As shown in Figure 3, for the data transmission timing figure that base station in the wireless sensor network of the embodiment of the present invention hides, and the flow chart of base station hidden method in the wireless sensor network of the embodiment of the present invention shown in composition graphs 4, the key hiding base station is the hierarchical relationship of hiding tree-shaped sensor network, the technology that the embodiment of the present invention adopts buffer memory, time division multiplexing, polymerization and generation data falsification to combine realizes this purpose, concrete, comprise the following steps:
S1: all nodes determine self child node number N, and child node is designated as C respectively 1, C 2..., C n, wherein, N is positive integer.
S2: data transmitting period T=(the N+1) × s of father node, wherein s is time slot, and namely data transmitting period T is divided into N+1 time slot, and each time slot is designated as S respectively 1, S 2..., S n, S n+1, top n time slot and N number of child node one_to_one corresponding.
S3: father node notifies that the child node of self starts to send data.
S4: at time slot S i, child node C ijudge self whether have True Data to need to send to father node, if had, then to send True Data, if do not had, then send data falsification.
At time slot S i, child node C ithe time sending data is data transmitting time Δ t, and Δ t < s.
S5: when father node receives the data from child node, judge the type of data, if True Data, then buffer memory True Data, if data falsification, then abandons data falsification.
S6: at time slot S n+1, the True Data of buffer memory and the data of self are carried out polymerization process by father node, and polymerization deal with data is sent to superior node.
So far, a data transmission cycle T terminates.
According to base station hidden method in the wireless sensor network of the embodiment of the present invention, in a data transmitting period, father node and its all child node all send true or data falsification, therefore assailant can not obtain between node from the otherness of flow asymmetry or transmission rate hierarchical relationship, also just can not track the position of base station, achieve the object of hiding base station.
Describe and can be understood in flow chart or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
In the description of this specification, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, identical embodiment or example are not necessarily referred to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiment or example.
Although illustrate and describe embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, those of ordinary skill in the art can change above-described embodiment within the scope of the invention when not departing from principle of the present invention and aim, revising, replacing and modification.

Claims (2)

1. a base station hidden method in wireless sensor network, is characterized in that, comprise the following steps:
S1: all nodes determine self child node number N, and described child node is designated as C respectively 1, C 2..., C n, wherein, N is positive integer;
S2: data transmitting period T=(the N+1) × s of father node, wherein s is time slot, and namely described data transmitting period T is divided into N+1 time slot, and each time slot is designated as S respectively 1, S 2..., S n, S n+1, top n time slot and N number of child node one_to_one corresponding;
S3: described father node notifies that the child node of self starts to send data;
S4: at time slot S i, child node C ijudge self whether have True Data to need to send to father node, if had, then to send described True Data, if do not had, then send data falsification, wherein, at time slot S i, child node C ithe time sending described data is data transmitting time Δ t, and Δ t < s;
S5: when described father node receives the data from child node, judge the type of described data, if True Data, then True Data described in buffer memory, if data falsification, then abandons described data falsification;
S5: at time slot S n+1, the described True Data of buffer memory and the data of self are carried out polymerization process by described father node, and polymerization deal with data is sent to superior node.
2. base station hidden method in wireless sensor network as claimed in claim 1, is characterized in that, at time slot S i, child node C ithe time sending described data is data transmitting time Δ t, and Δ t < s.
CN201310277745.8A 2013-07-03 2013-07-03 Base station hidden method in wireless sensor network Active CN103313236B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310277745.8A CN103313236B (en) 2013-07-03 2013-07-03 Base station hidden method in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310277745.8A CN103313236B (en) 2013-07-03 2013-07-03 Base station hidden method in wireless sensor network

Publications (2)

Publication Number Publication Date
CN103313236A CN103313236A (en) 2013-09-18
CN103313236B true CN103313236B (en) 2015-10-28

Family

ID=49137916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310277745.8A Active CN103313236B (en) 2013-07-03 2013-07-03 Base station hidden method in wireless sensor network

Country Status (1)

Country Link
CN (1) CN103313236B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994506B (en) * 2015-07-20 2018-06-19 大连海事大学 A kind of mobile base station guarded by location method and system based on attacker's detection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127696A (en) * 2006-08-15 2008-02-20 华为技术有限公司 Data forwarding method for layer 2 network and network and node devices
CN101394325A (en) * 2008-11-06 2009-03-25 上海交通大学 Combined routing-multiple address access method based on wireless human body domain network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL2003736C2 (en) * 2009-10-30 2011-05-03 Ambient Systems B V Communication method for high density wireless networks, terminal, cluster master device, central node, and system therefor.

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127696A (en) * 2006-08-15 2008-02-20 华为技术有限公司 Data forwarding method for layer 2 network and network and node devices
CN101394325A (en) * 2008-11-06 2009-03-25 上海交通大学 Combined routing-multiple address access method based on wireless human body domain network

Also Published As

Publication number Publication date
CN103313236A (en) 2013-09-18

Similar Documents

Publication Publication Date Title
US20160007181A1 (en) Method, apparatus, and computer program product for device tracking
Casari et al. A detailed simulation study of the UWAN-MAC protocol for underwater acoustic networks
US20160212740A1 (en) Asynchronous broadcast communication based on time-based events in channel-hopping networks
Hussaini et al. Enhanced clustering routing protocol for power-efficient gathering in wireless sensor network
CN103458478A (en) Source hiding method and system based on dynamic forged sources
CN109446866A (en) A kind of method of quick counting wireless terminal
Bernardo et al. A fire monitoring application for scattered wireless sensor networks-a peer-to-peer cross-layering approach
Renold et al. Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks
CN103491536B (en) The key reception validator of mobile node condition control method and mobile node
CN103313236B (en) Base station hidden method in wireless sensor network
Kim et al. An energy efficient and optimal randomized clustering for wireless sensor networks
Luo et al. Time‐aware and energy‐efficient opportunistic routing with residual energy collection in wireless sensor networks
Thaskani et al. Mobility tolerant TDMA based MAC protocol for WSN
Duan et al. Shortest path routing protocol for multi-layer mobile wireless sensor networks
Karkazis et al. Geographical routing in wireless sensor networks
Peng et al. An energy-efficient mobility-supporting MAC protocol in wireless sensor networks
Khari Wireless sensor networks: a technical survey
Chauhan et al. Energy efficient sleep scheduled clustering & spanning tree based data aggregation in wireless sensor network
Alassery et al. Smart wireless sensor networks powered by remaining energy cluster head selection protocol
Padyal et al. Continuous neighbour discovery approach for improvement of routing performance in WSN
Sahota et al. Performance modeling and simulation studies of MAC protocols in sensor network performance
CN102088741B (en) Method for coping with malicious interference in wireless sensor network (WSN)
Viswanathan et al. 'Smart packet'for energy optimisation in wireless sensor networks
Abouelkhair et al. Hierarchal energy efficient network protocol for wireless sensing
Yazdi et al. Shortening orphan time in ieee 802.15. 4: What can be gained?

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant