CN103619011B - A kind of malicious node tolerance method in wireless sensor network - Google Patents

A kind of malicious node tolerance method in wireless sensor network Download PDF

Info

Publication number
CN103619011B
CN103619011B CN201310597049.5A CN201310597049A CN103619011B CN 103619011 B CN103619011 B CN 103619011B CN 201310597049 A CN201310597049 A CN 201310597049A CN 103619011 B CN103619011 B CN 103619011B
Authority
CN
China
Prior art keywords
node
time
tolerance
sensor network
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310597049.5A
Other languages
Chinese (zh)
Other versions
CN103619011A (en
Inventor
姜禹
黄杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310597049.5A priority Critical patent/CN103619011B/en
Publication of CN103619011A publication Critical patent/CN103619011A/en
Application granted granted Critical
Publication of CN103619011B publication Critical patent/CN103619011B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the malicious node tolerance method in a kind of wireless sensor network, change traditional safety protecting method based on encryption, certification and trust model, use the mode actively destroying malicious node to carry out active defense and reach to attack the purpose of tolerance.The energy of malicious node is consumed by transmitting nonsignificant data in a network, under attacking tolerance state, normal node only just produces energy expenditure in the moment sending data, and malicious node is constantly in radio frequency operation state, exchange the big energy expenditure of malicious node for the little energy expenditure of all normal node so that it can not work.On the premise of ensureing sensor network normal data communication, completing the effective protection to malicious node, the secure communication for wireless sensor network provides new thinking.

Description

A kind of malicious node tolerance method in wireless sensor network
Technical field
The present invention relates to the malicious node in a kind of wireless sensor network and attack tolerance method, belong to radio communication and network safety filed.
Background technology
In recent years, along with sensor, computer, radio communication, the development of the technology such as micro electronmechanical and mutually merge, create wireless sensor network (WSN:wirelesssensornetworks), people can monitor external environment condition finally in real time, it is achieved on a large scale, the information gathering of automatization.WSN has broad application prospects in military and civilian fields such as military surveillance, environmental monitoring, medical monitoring, space exploration, urban traffic control, warehousing managements.
Wireless sensor network is made up of the sensor node that the substantial amounts of energy content of battery, computing capability, storage capacity, communication capacity are limited.If network node uncontrollable (such as, enemy region of war) or WSN are in large scale, then node will be arranged by the way of broadcasting sowing at random.Owing to WSN is radio communication, assailant can monitor channel in the task domain of this network easily, in channel, inject bit stream, the packet listened to before resetting.If additionally, sensor random placement is at unattended space outerpace, assailant can capture this node easily, rewrites internal memory, or substitutes this node with the sensor of oneself, is filled with acquisition data message by emitting.
But, WSN, due to own resource and the restriction of computing capability, causes its safety ratio common computer network security to face more stern challenge.Accordingly, it would be desirable to significantly more efficient safety precaution is machine-processed.
At present, malicious node in some wireless sensor network models be assumed be energy and resource unrestricted, but often it is false in the actual this hypothesis in application scenario, wireless senser in reality is laid under scene, infinite energy and the hardly possible realization of resource, this is only applicable to the scene of cable network.Therefore, for malicious node, equally exist situation about cannot work when depleted of energy.
Malicious node attack pattern in sensor network includes selecting forwarding, altered data, playback and dos attack etc., if malicious node to carry out above-mentioned attack, transmit when network has packet, it is necessary to assure radio circuit is in running order, be otherwise unable to reach it and attack purpose.The working time of the radio circuit of malicious node determines its life cycle, makes malicious node work in radio-frequency receiving-transmitting state for a long time and allows its energy exhaust rapidly to reach the purpose that tolerance is attacked.
For wireless sensor node, the consumption of its energy is mainly at control circuit and radio circuit, and the power consumption that radio circuit is under transmitting or reception state is usually 3~6 times of control circuit.The most effectively make the resting state (closedown radio circuit) that wireless sensor node is coordinated in its work, make the key that the guarantee whole Chief Web Officer time is effectively run.
Summary of the invention
Technical problem: in order to overcome the deficiencies in the prior art, the present invention proposes the malicious node tolerance method in a kind of wireless sensor network, operational characteristics for malicious node, work under normal node in wireless sensor network network communication protocol after the modification, the energy making malicious node exhausts rapidly, reaches tolerance and destroys the purpose of malicious node.
Technical scheme: for achieving the above object, the technical solution used in the present invention is:
Malicious node tolerance method in a kind of wireless sensor network, comprises the steps:
(1) base station sends to the whole network and attacks tolerance order, and this command messages transmits in a network in the mode of flooding, and the normal node in each sensor network is ready for after receiving this order entering from normal operating conditions attacking tolerance state;
(2) normal node i (i=1,2 ... N) enter attack tolerance state, N represents the node number in wireless sensor network.Node i sets two intervalometer T respectivelyi1And Ti2, and random wake-up times Wi, wherein WiDetermine according to the attack interstitial content in network, when attacking node and being uncertain, set Wi=3, WiIncrease, T along with the increase attacking interstitial content in networki1Represent that node i enters the total time attacking tolerance state, Ti2Represent the time that node i wakes up up for the first time, and Ti1> Wi·Ti2
(3) node i closes radio circuit, and according to Ti1The time set enters park mode, when dormancy time reaches Ti2Time, node i wakes up and opens radio circuit up, and sends random data bag D to network.After packet D is sent completely, Wi=Wi-1, Ti1=Ti1-Ti2, node i recalculates Ti2Meet Ti1> Wi·Ti2, and set Ti1And Ti2
(4) step (3) is repeated, until Wi=0, node i closes radio circuit, and according to Ti1The time set enters park mode;
(5) T is reached when dormancy timei1Time, node i wakes up up and opens radio circuit, reentering normal operating conditions.
Malicious node tolerance method in described wireless sensor network can use when sensor network normally works, and all nodes of sensor network are periodically in normal operating conditions SNWith attack tolerance state STThe most alternately.The requirement of real-time property is determined by cycle time alternately by sensor network, the highest then S of requirement of real-timeNTime be greater than STTime, otherwise, STTime be greater than SNTime.
Described it is in normal operating conditions SNWith attack tolerance state STUnder time can set when netinit, it is possible to according to real-time property require change adjust in real time.
Malicious node tolerance method in described wireless sensor network is in attack tolerance state S at all-network nodeTUnder, do not carry out the mutual of data and routing iinformation.
Malicious node tolerance method in described wireless sensor network, in network exigent to real-time property, can use the method for sub-clustering to realize.Each bunch is independently run malicious node tolerance method, sent by bunch head node to oneself place bunch and attack tolerance order and then each bunch of complete method attacking tolerance of interior nodes operation, each bunch of head is still within normal operating conditions, receive and cache the data from upper strata or route requests, this bunch enter normal operating conditions time and bunch interior nodes carry out data interaction.
The method of described sub-clustering realizes in the malicious node tolerance method in wireless sensor network, and bunch head in each bunch needs the energy according to self and resource situation to carry out a bunch great wheel and change, it is ensured that node energy and the balance of resource.
Malicious node tolerance method in described wireless sensor network can in conjunction with malicious node intrusion detection method use, when intrusion detection method is not detected by malicious node, all nodes in sensor network remain stationary state work;When intrusion detection method detects malicious node, sensor network enters normal operating conditions and attacks replacing of tolerance state.Along with the eliminating of malicious node, network recovery is to former duty.
Beneficial effect: the present invention provides the malicious node tolerance method in wireless sensor network, change traditional safety protecting method based on encryption, certification and trust model, use the mode actively destroying malicious node to carry out active defense and reach to attack the purpose of tolerance.The energy of malicious node is consumed by transmitting nonsignificant data in a network, under attacking tolerance state, normal node only just produces energy expenditure in the moment sending data, and malicious node is constantly in radio frequency operation state, exchange the big energy expenditure of malicious node for the little energy expenditure of all normal node so that it can not work.On the premise of ensureing sensor network normal data communication, completing the effective protection to malicious node, the secure communication for wireless sensor network provides new thinking.
Accompanying drawing explanation
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is the inventive method flow chart in Cluster Networks;
Fig. 3 is the working timing figure of normal node in the present invention;
Fig. 4 is the working timing figure that in the present invention, normal node combines intrusion detection method;
Fig. 5 is the node energy consumption figure after using the inventive method.
Detailed description of the invention
Below in conjunction with the accompanying drawings the present invention is further described.
The malicious node tolerance method being illustrated in figure 1 in a kind of wireless sensor network flow chart in Cluster Networks, comprises the steps:
(1) base station sends to the whole network and attacks tolerance order, and this command messages transmits in a network in the mode of flooding, and the normal node in each sensor network is ready for after receiving this order entering from normal operating conditions attacking tolerance state;
(2) normal node i (i=1,2 ... N) enter attack tolerance state, N represents the node number in wireless sensor network.Node i sets two intervalometer T respectivelyi1And Ti2, and random wake-up times Wi, wherein WiDetermine according to the attack interstitial content in network, when attacking node and being uncertain, set Wi=3, WiIncrease, T along with the increase attacking interstitial content in networki1Represent that node i enters the total time attacking tolerance state, Ti2Represent the time that node i wakes up up for the first time, and Ti1> Wi·Ti2
(3) node i closes radio circuit, and according to Ti1The time set enters park mode, when dormancy time reaches Ti2Time, node i wakes up and opens radio circuit up, and sends random data bag D to network.After packet D is sent completely, Wi=Wi-1, Ti1=Ti1-Ti2, node i recalculates Ti2Meet Ti1> Wi·Ti2, and set Ti1And Ti2
(4) step (3) is repeated, until Wi=0, node i closes radio circuit, and according to Ti1The time set enters park mode;
(5) T is reached when dormancy timei1Time, node i wakes up up and opens radio circuit, reentering normal operating conditions.
The flow chart of the malicious node tolerance method being illustrated in figure 2 in a kind of wireless sensor network, comprises the steps:
(1) base station sends to the leader cluster node of the whole network and attacks tolerance order, and this command messages transmits in a network in the mode of flooding, and the leader cluster node in each sensor network receives this order;
(2) each leader cluster node each sensor node to place bunch sends and attacks tolerance order, and the normal node in each bunch is ready for after receiving this order entering from normal operating conditions attacking tolerance state;
(3) bunch interior normal node i (i=1,2 ... N) enter attack tolerance state, N represents a bunch interior node number.Node i sets two intervalometer T respectivelyi1And Ti2, and random wake-up times Wi, wherein WiDetermine according to the attack interstitial content in this bunch, when attacking node and being uncertain, set Wi=3, WiIncrease, T along with the increase attacking interstitial content in networki1Represent that node i enters the total time attacking tolerance state, Ti2Represent the time that node i wakes up up for the first time, and Ti1> Wi·Ti2
(4) node i closes radio circuit, and according to Ti1The time set enters park mode, when dormancy time reaches Ti2Time, node i wakes up and opens radio circuit up, and sends random data bag D to network.After packet D is sent completely, Wi=Wi-1, Ti1=Ti1-Ti2, node i recalculates Ti2Meet Ti1> Wi·Ti2, and set Ti1And Ti2
(5) step (3) is repeated, until Wi=0, node i closes radio circuit, and according to Ti1The time set enters park mode;
(6) T is reached when dormancy timei1Time, node i wakes up up and opens radio circuit, reentering normal operating conditions.
It is illustrated in figure 3 the working timing figure that normal node uses the malicious node tolerance method of the present invention, as can be seen from the figure, normal node is carried out alternately with T for the cycle between normal operating conditions and attack tolerance state, and the time being wherein in normal operating conditions is T1, the time being in attack tolerance state is T2。T1And T2The situation of the actual application environment according to sensor network and attack node is adjusted, T2The biggest, the best to the tolerance effect of malicious node, but the real-time of network data communication can decline.
Being illustrated in figure 4 normal node in the present invention and combine the working timing figure of intrusion detection method, it can be seen that normal node carries out the intrusion detection of malicious node the most simultaneously, the time being in this state is T1, when normal node detects that malicious node is notified that base station or a bunch head make all normal node enter and attack tolerance state, therefore T1Do not fix, if network is not detected by malicious node, then normal node is constantly in normal work and intrusion detection state.Node be in attack tolerance state time be T2, T2For fixed value.Along with the eliminating of malicious node, network recovery is to former duty.
In a particular embodiment, we assume that wireless sensor network has 100 normal node, there is 1 malicious node, malicious node is in the radio frequency coverage of the normal node of 10%, i.e. it can carry out data communication with 10 normal node, after malicious node receives the packet of normal node, twice forwarding can be carried out.In order to the effect of the inventive method is described, need the energy consumption values of node is quantified.As a example by using CC2530 as sensor node master chip, assume that its working clock frequency is 32MHz, the operating current of CPU is 6.5mA, the operating current that radio frequency reception is opened is 24.3mA, the operating current that radio-frequency transmissions is opened is 33.5mA, and the operating current only opening a timer interruption under resting state is 90uA.
Node is operated according to the normal node working timing figure shown in Fig. 3, T1=1s, T2=4s, and take W=3 and W=30 respectively and test, observe the 100s time, result is as it is shown in figure 5, abscissa is the time, and unit s, vertical coordinate is power consumption, unit mAs.As can be seen from the figure, the curve of bottom is that the power consumption of normal node is the least, therefore the method employing the present invention increases the consumption of normal node energy hardly, and the two of top curves represent the power consumption of malicious node, its energy expenditure is the hundred times of normal node, W is the biggest, and the energy expenditure of malicious node is the fastest.Along with the increase of working time, use the inventive method that the energy of malicious node can be made quickly to consume so that it is cannot operate, and for the more network of malicious node, the inventive method better.
The above is only the preferred embodiment of the present invention; it is noted that, for those skilled in the art; under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (7)

1. the malicious node in a wireless sensor network attacks tolerance method, it is characterised in that: the method comprises the steps:
1) base station sends to the whole network and attacks tolerance order, and this command messages transmits in a network in the mode of flooding, and the normal node in each sensor network is ready for after receiving this order entering from normal operating conditions attacking tolerance state;
2) normal node i entrance attack tolerance state, i=1,2 ... N, N represent the node number in wireless sensor network, and node i sets two intervalometer T respectivelyi1And Ti2, and random wake-up times Wi, wherein WiDetermine according to the attack interstitial content in network, when attacking node and being uncertain, set Wi=3, WiIncrease, T along with the increase attacking interstitial content in networki1Represent that node i enters the total time attacking tolerance state, Ti2Represent the time that node i wakes up up for the first time, and Ti1>Wi·Ti2
3) node i closes radio circuit, and according to Ti1The time set enters park mode, when dormancy time reaches Ti2Time, node i wakes up and opens radio circuit up, and sends random data bag D, after packet D is sent completely, W to networki=Wi-1, Ti1=Ti1-Ti2, node i recalculates Ti2Meet Ti1>Wi·Ti2, and set Ti1And Ti2
4) step 3 is repeated), until Wi=0, node i closes radio circuit, and according to Ti1The time set enters park mode;
5) T is reached when dormancy timei1Time, node i wakes up up and opens radio circuit, reentering normal operating conditions.
Malicious node in a kind of wireless sensor network the most according to claim 1 attacks tolerance method, it is characterised in that: the method uses when sensor network normally works, and all nodes of sensor network are periodically in normal operating conditions SNWith attack tolerance state STThe most alternately, the requirement of real-time property is determined by cycle time alternately by sensor network, requirement of real-time height then SNTime be greater than STTime, otherwise, STTime be greater than SNTime.
Malicious node in a kind of wireless sensor network the most according to claim 2 attacks tolerance method, it is characterised in that: it is in normal operating conditions SNWith attack tolerance state STUnder time set when netinit, or according to real-time property require change adjust in real time.
Malicious node in a kind of wireless sensor network the most according to claim 1 attacks tolerance method, it is characterised in that: the method, under all-network node is in attack tolerance state, does not carry out the mutual of data and routing iinformation.
Malicious node in a kind of wireless sensor network the most according to claim 1 attacks tolerance method, it is characterised in that: real-time property is being required in high network by the method, uses the method for sub-clustering to realize;Each bunch is independently run malicious node tolerance method, sent by bunch head node to oneself place bunch and attack tolerance order and then each bunch of complete method attacking tolerance of interior nodes operation, each bunch of head is still within normal operating conditions, receive and cache the data from upper strata or route requests, this bunch enter normal operating conditions time and bunch interior nodes carry out data interaction.
Malicious node in a kind of wireless sensor network the most according to claim 5 attacks tolerance method, it is characterized in that: in the malicious node tolerance method that the method for described sub-clustering realizes in wireless sensor network, bunch head in each bunch needs the energy according to self and resource situation to carry out a bunch great wheel and change, it is ensured that node energy and the balance of resource.
Malicious node in a kind of wireless sensor network the most according to claim 1 attacks tolerance method, it is characterized in that the method combines the intrusion detection method use of malicious node, when intrusion detection method is not detected by malicious node, all nodes in sensor network remain stationary state work;When intrusion detection method detects malicious node, sensor network enters normal operating conditions and attacks replacing of tolerance state, and along with the eliminating of malicious node, network recovery is to former duty.
CN201310597049.5A 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network Expired - Fee Related CN103619011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310597049.5A CN103619011B (en) 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310597049.5A CN103619011B (en) 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network

Publications (2)

Publication Number Publication Date
CN103619011A CN103619011A (en) 2014-03-05
CN103619011B true CN103619011B (en) 2016-08-03

Family

ID=50169715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310597049.5A Expired - Fee Related CN103619011B (en) 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network

Country Status (1)

Country Link
CN (1) CN103619011B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843672A (en) * 2012-08-08 2012-12-26 中国电力科学研究院 Malicious node detection method for sensing network based on energy fields

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7051102B2 (en) * 2002-04-29 2006-05-23 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) security infrastructure and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843672A (en) * 2012-08-08 2012-12-26 中国电力科学研究院 Malicious node detection method for sensing network based on energy fields

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《容忍入侵的无线传感器网络模糊信任评估模型》;王良民;《通信学报》;20101231;第31卷(第12期);全文 *

Also Published As

Publication number Publication date
CN103619011A (en) 2014-03-05

Similar Documents

Publication Publication Date Title
Boubiche et al. Cross layer intrusion detection system for wireless sensor network
CN102244658B (en) Partitioned type dynamic safety routing method for wireless sensor network on basis of hash chains
CN105636053B (en) A kind of detection method attacked towards Sybil in WSN
CN101013976A (en) Mixed intrusion detection method of wireless sensor network
Zhijie et al. Intrusion detection for wireless sensor network based on traffic prediction model
Boubiche et al. A defense strategy against energy exhausting attacks in wireless sensor networks
CN103619016A (en) Self-adaptive grid safe routing method in wireless sensor network
Zhou et al. An anonymous routing scheme for preserving location privacy in wireless sensor networks
Khari Wireless sensor networks: a technical survey
CN103491542A (en) Method for detecting sewage pool attack intrusion of multi-path route in underwater sensor network
CN103619011B (en) A kind of malicious node tolerance method in wireless sensor network
Ruan et al. A distance clustering routing algorithm considering energy for wireless sensor networks
Mengyao et al. Ring-based security energy-efficient routing protocol for WSN
Laeeq Security challenges & preventions in wireless communications
Kaur et al. Securing the wireless sensor network from denial of sleep attack by isolating the nodes
Kaushik et al. Security Technique against Power Exhausting Attacks in WSN
Singh et al. Security in communication for intelligent wireless sensor networks: issues and challenges
Periyanayagi et al. Swarm based defense technique for denial-of-sleep attacks in wireless sensor networks
Goudar et al. Mechanisms for detecting and preventing denial of sleep attacks and strengthening signals in wireless sensor networks
Jaiswal et al. A Security and Application of Wireless Sensor Network: A Comprehensive Study
Parvathy et al. A Review on Network Layer Attacks in Wireless Sensor Networks
Kishtwal et al. A review: wireless sensor networks (WSN) and security aspects
Almana’seh et al. A wake-up receiver sensor node model for WSNs
Saidu et al. PREVENTION TECHNIQUE AGAINST DENIAL OF SLEEP ATTACK IN WIRELESS SENSOR NETWORKS
Zeng et al. A distributed and shortest-path-based algorithm for maximum cover sets problem in wireless sensor networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

Termination date: 20191121