CN101309151B - Safe positioning method for wireless sensor - Google Patents
Safe positioning method for wireless sensor Download PDFInfo
- Publication number
- CN101309151B CN101309151B CN2008101503089A CN200810150308A CN101309151B CN 101309151 B CN101309151 B CN 101309151B CN 2008101503089 A CN2008101503089 A CN 2008101503089A CN 200810150308 A CN200810150308 A CN 200810150308A CN 101309151 B CN101309151 B CN 101309151B
- Authority
- CN
- China
- Prior art keywords
- beacon
- checkpoint
- safety
- max
- transducer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 77
- 230000007246 mechanism Effects 0.000 claims abstract description 23
- 238000001914 filtration Methods 0.000 claims abstract description 8
- 238000012795 verification Methods 0.000 claims description 28
- 238000012216 screening Methods 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 11
- 238000005516 engineering process Methods 0.000 claims description 10
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000007689 inspection Methods 0.000 claims description 7
- 238000012360 testing method Methods 0.000 claims description 7
- 231100000572 poisoning Toxicity 0.000 claims description 6
- 230000000607 poisoning effect Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 5
- 230000004807 localization Effects 0.000 claims description 4
- 238000007476 Maximum Likelihood Methods 0.000 claims description 3
- 238000004321 preservation Methods 0.000 claims description 3
- 238000010168 coupling process Methods 0.000 claims description 2
- 238000005859 coupling reaction Methods 0.000 claims description 2
- 239000000203 mixture Substances 0.000 claims description 2
- 230000001360 synchronised effect Effects 0.000 claims description 2
- 230000008878 coupling Effects 0.000 claims 1
- 238000005259 measurement Methods 0.000 abstract description 13
- 238000004422 calculation algorithm Methods 0.000 abstract description 12
- 238000004891 communication Methods 0.000 abstract description 10
- 238000001514 detection method Methods 0.000 abstract description 10
- 238000004458 analytical method Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 230000000875 corresponding effect Effects 0.000 description 6
- 238000002474 experimental method Methods 0.000 description 6
- 238000002955 isolation Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 244000188472 Ilex paraguariensis Species 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 206010000234 Abortion spontaneous Diseases 0.000 description 1
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003467 diminishing effect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000009940 knitting Methods 0.000 description 1
- 238000012067 mathematical method Methods 0.000 description 1
- 208000015994 miscarriage Diseases 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 208000000995 spontaneous abortion Diseases 0.000 description 1
Images
Landscapes
- Position Fixing By Use Of Radio Waves (AREA)
Abstract
The invention discloses a safe positioning method for a wireless sensor; the safe positioning method adopts two safe positioning methods which are the malicious beacon detection based on the checkpoint and the malicious beacon detection algorithm based on the regional voting mechanism to solve the positioning safety problem of the sensor network nodes. The positioning method improves the anti-attack capability of the system through filtering the malicious beacons directly so that not only the known attacks can be defended, but also the unknown attacks can be defended; the corresponding defending measurement for every possible specific attack is avoided; the implementation of the safety strategy of the positioning system is simplified; the two detection methods are combined effectively to adjust the defending strategy automatically according to the attack types; the safe positioning is guaranteed and the computation cost is reduced effectively; the neighbor communication authentication technique based on the unidirectional key chain is adopted to avoid the support of other network safety protocols so that the storage cost of the sensor nodes is reduced; the neighbor communication authentication technique can be compatible and used together with the present wireless sensor network protocol; the safety target of the positioning system of the sensor network nodes is realized.
Description
Technical field
The invention belongs to network communications technology field; Relate to the wireless self-organization network safe practice; Specifically be based on conforming verification inside and outside the beacon, propose a kind of safe wireless sensor network node locating method, solve the safety problem of node locating in the sensor network; Be how node is correctly obtaining the geographical location information of oneself after disposing at random, prevent various internaling attack and external attack to node positioning system.
Background technology
The wireless multi-hop network that wireless sensor network is made up of the sensor node miniature in a large number, low-cost, low-power consumption that is deployed in the monitored area is realized collection, processing and issue to sensitive data in the monitored area.Sensor network has numerous advantages such as quick deployment, collaborative perception, high fault tolerance, therefore has application prospect in association areas such as military affairs, Homeland Security, environmental surveillance and city management.
As the bridge that connects physical world and digital world, the positional information of node is most important to the monitor activities of network in the sensor network.Sensor network must rely on the spatial relationship that the positional information of node is come building network, and reporting event or follow the tracks of external object according to this.In addition, the positional information of node also provides the important foundation of network functions such as network topology self-configuring, statistics network covering quality.Therefore transducer must adopt certain mechanism to realize the location after disposing earlier, could get into monitoring state.
1. the basic fixed position method of wireless senser
Receive the restriction of factors such as cost, volume, power consumption and autgmentability; Most of sensor networks adopt the auxiliary location mechanism of beaconing nodes; Its principle is as shown in Figure 1: network is disposed in advance on a small quantity through modes such as GPS and is realized the beaconing nodes of locating; Beacon obtains transducer and the position relation of peripheral a plurality of beaconing nodes through receiving and measuring, and adopts mathematical method to confirm himself position then.As shown in Figure 1: s is through measuring to b
1, b
2, b
3Range information d
1, d
2, d
3Confirm self-position.These location algorithms are broadly divided into: based on range finding location and non-distance measuring location.The former uses method calculating locations such as trilateration, triangulation or maximum likelihood estimation through distance or orientation between measured node, and ranging technology commonly used has RSSI, TOA, TDOA and AOA.And the latter only realizes location Calculation according to information such as network connectivties, and common algorithm has centroid algorithm, DV-Hop algorithm, convex programming algorithm and APIT algorithm etc.
2. the security threat that faces of node positioning system
Owing to self have fragility, node positioning system very easily suffers from inside and outside attack.On the one hand, the assailant possibly obtain inner trust through capturing node, thereby implements the location deception.On the other hand, the assailant also possibly adopt modes such as displacement node and interference signal to implement external attack.Obviously, the physics mobile node is to the most direct security threat of node positioning system.In addition, because all being some physical phenomenon (like time delay, power consumption, go into the angle and transmit jumping figure etc.) according to wireless beacon transmission, navigation system comes the position relation between measured node.The assailant is easy to adopt duplicate, block and to change means such as propagation path and distorts these measurement results.Because external attack directly is directed against the tender spots of location mechanism, need not to obtain inner trust, therefore can walk around the protection of various conventional security mechanism (like encryption and authentication etc.).
3. existing wireless sensor node safe positioning method
Node positioning system comes down to the coordination mechanism that a kind of physical attribute according to radio communication is confirmed the node space relation, and it realizes facing great challenge safely.At present, domestic and international existing security solution roughly can be generalized into three major types: (1) is based on the safety location of beacon attribute verification.For example, the safe location mechanism SeRLoc of a kind of non-distance measuring of people such as the L.Lazos proposition of the U.S. in 2004.Its principle is: beaconing nodes adopts directional antenna to send beacon to different sectors, and unknown node is estimated self-position according to the overlapping situation of beacon sector again.Utilize the uniqueness and the communication distance boundary property of beacon sector, SeRLoc can take precautions against Replay Attack.The people such as S.Capkun of the U.S. in 2006 propose a kind of based on the VM mechanism apart from threshold agreement.Utilization is apart from threshold agreement and triangle calibration technology, and the VM algorithm can be resisted various attacks of distorting range finding.(2) locate based on the safety of robust regression algorithm.These class methods are primarily aimed at the fragility problem that least square method exists, and come the ability of enhanced positioning system tolerant attack through the robustness that improves location Calculation.For example, the people such as Z.Li of the U.S. in 2005 introduce minimum intermediate value two and take advantage of the ability of estimating to improve navigation system tolerance attack.(3) locate based on the safety of intrusion detection.For example; A kind of malice beaconing nodes detection scheme that the people such as D.Liu of the U.S. in 2005 propose; Its principle is: each beaconing nodes uses detection ID to disguise oneself as sensor node initiatively to neighbours' beaconing nodes request positioning service; And with reference to self coordinate inspection the other side whether correct beacon is provided, at last by the base station unification with malice beaconing nodes isolation network.
But there is following shortcoming respectively in these above-mentioned 3 kinds of safe positioning strategies:
Strategy (1): these class methods often rely on the integrality that certain checkpoint comes verification beacon attribute, and system robustness is poor.For example, the VM calibration technology be based upon the assailant can not with the strong assumption of checkpoint collusion on; SeRLoc is based upon on the strong assumption that beacon signal can not get clogged, if the assailant has blocked the signal of relevant beaconing nodes, two geometrical properties (sector uniqueness and communication distance boundary property) that then are used to detect Replay Attack all can lose efficacy.
Strategy (2): the greatest problem of these class methods is calculated too complicated exactly.The amount of calculation of robust regression algorithm is often all bigger, can't be applicable to low-power consumption, sensor application field cheaply.For example, because median can not differential, the Z.Li scheme need adopt the bigger Monte Carlo random device of space-time complexity to find the solution minimum median problem.
Strategy (3): these class methods are detected object with the malice beaconing nodes, can only have potential safety hazard to internaling attack.For example; In the Liu detection scheme; If the assailant adopts the beacon message in the external attack method attack channel such as signal interference, though then the location of unknown node can not receive the influence of malice beacon, the source node of beacon is malice beaconing nodes and isolation network with scheme erroneous judgement to be detected; Thereby reduced the service quality of navigation system, even caused its paralysis.
In sum, with regard to the demand for security of whole node navigation system, existing solution does not all also form perfect security system, can only resist the attack pattern of part mostly, can't tackle the attack with characteristics such as knitting hidden and compound more.The content of invention
The object of the invention is to solve the deficiency of existing safe positioning method; Fully investigate the characteristic of sensor network and node locating mechanism; Propose a kind of wireless sensor safe positioning method, this method improves the anti-attack ability of transducer self poisoning through filtering malice beacon.The present invention comprises based on " the beacon screening of checkpoint " and " based on the beacon screening of checkpoint " two kinds of beacon screening techniques; Discern and filtering fallacious beacon through the internal consistency and the outside consistency of verification beacon respectively, and be applied to take precautions against the external attacker and the person of internaling attack respectively.
Method 1: based on the beacon screening technique of checkpoint
In position fixing process, utilize the redundant configuration of sensor network, introduce the part-time beacon that transmits in the monitor channel of checkpoint that serves as of beaconing nodes.The checkpoint is reference with the self-position, and whether inner consistent (whether computed range matees measuring distance) come the detection of malicious beacon through the inspection beacon.If beacon inside is inconsistent, then explanation is the malice beacon.Find the malice beacon when the checkpoint and then send a warning information to neighbours' unknown node.Transducer statistics each receive beacon by alarm number of times, the beacon that defendant's number of times wherein is no more than thresholding τ is regarded as safety beacon, and all the other beacons are regarded as the suspicion beacon, i.e. the unknown beacon of safe condition.
Method 2: based on the beacon screening technique of regional voting mechanism
On the basis of method 1, introduce regional voting mechanism and further check inconsistent (localizing objects of malice beacon and the localizing objects of optimum beacon are often inconsistent, abbreviate as outside inconsistent) between beacon, and discern and filtering fallacious beacon according to majority principle.Its basic thought is: the target area is divided into a uniform lattice, and utilizes each beacon maybe residing unit to vote for transducer, then with the maximum unit of poll as verification unit, further detect whether malice of remaining suspicion beacon.If certain suspicion beacon can mate verification unit, explain that then it is a safety beacon, otherwise be the malice beacon.
The anti-wireless senser localization method of attacking of the present invention is on conventional location mechanism basis, through introducing the ability that the malice beacon isolation mech isolation test of mixing and lightweight security protocol improve the navigation system resisting attacks.Its basic thought is following: in position fixing process, the alarm that transducer at first receives neighbours' inspection through method 1 detects and isolates the malice beacon.The safety beacon that filters out when transducer satisfy the location Calculation condition (based on the location Calculation of range finding at least three of needs with reference to beacon); Then abandon all suspicion beacons; Directly carry out self poisoning and calculate, otherwise the regional voting mechanism of employing method 2 further screens safety beacon from the suspicion beacon with reference to safety beacon.
With existing node security localization method contrast, the present invention has the following advantages:
(1) the present invention improves the anti-attack ability of transducer self poisoning through filtering malice beacon; The measure that need not to take to take precautions against one by one to every kind of particular attack behavior that possibly occur is (like worm hole testing mechanism; The playback testing mechanism; The anti-tamper mechanism etc. of finding range), thus simplified the enforcement of security strategy.Not only be highly resistant to known attack, can also defend unknown attack.
(2) the beacon triage techniques based on the checkpoint can effectively filter the malice beacon that seat offence causes, and computing cost is little, but (captured node possibly lodge a false accusation against optimum beacon be the malice beacon) attacked in the false accusation that can't resist the person of internaling attack.And based on the beacon triage techniques strong robustness of voting in the zone, can effectively take precautions against the person's of internaling attack false accusation to attack, but resource overhead is bigger.The present invention has organically combined the advantage of two kinds of beacon triage techniqueses, can regulate defence policies according to adversary's attack pattern self adaptation, thereby when guaranteeing positioning security, effectively lower the computing cost of transducer.
(3) the present invention only adopts the neighbours' communication authentication technology based on one-way key chain.Its advantage comprises: 1. computing cost is little, and the generation of one-way key chain and distribution are accomplished by central server, and communication node only needs the hash computing of lightweight; 2. storage overhead is little, and 200 beaconing nodes are arranged in the hypothetical network, and node ID is used 8 bit representations, and the Hash function is output as 128.Then the storage overhead of transducer needs is (8+128) * 200=3400B, and MICA1 Motes has the 128kB flash memory, can satisfy the demand of embodiment of the present invention.3. need not key management; 4. need not whole message is carried out the MAC authentication.
Description of drawings
Fig. 1 is a sensor node navigation system sketch map
Fig. 2 is the position relation of beacon and checkpoint
Fig. 3 is the checkpoint principle schematic
Fig. 4 is for confirming the example of region of search: Fig. 4 (a) supposition transducer receives 4 beacon bs
1~bs
4Fig. 4 (b) bs
4Situation for safety beacon; All beacons of Fig. 4 (c) all are the situation of suspicion beacon
Fig. 5 is the example of selected candidate unit and ballot screening: Fig. 5 (a) bs
4Situation for safety beacon; Fig. 5 (b) bs
2And bs
4Situation for safety beacon; All beacons of Fig. 5 (c) all are the situation of suspicion beacon
Fig. 6 is the particular flow sheet of node security localization method
The functional arrangement of Fig. 7 formula (1)
Fig. 8 is the functional arrangement of formula (3)
Fig. 9 is provided with figure for simulating scenes
Figure 10 is the simulation result figure of verification and measurement ratio
Specific embodiments
In conjunction with above-mentioned accompanying drawing and subordinate list, the embodiment of the included various technical schemes of wireless sensor node safe positioning method of the present invention is described further.Enforcement of the present invention is supposed and precondition based on following being correlated with:
(1) the supposition sensor network uses the secret positioning and communicating of group key, mixes receive mode monitoring beacon on every side so that other nodes can adopt; (2) the supposition location Calculation is the center with the transducer, and transducer has certain wireless distance finding ability (like RSSI and TDOA etc.); (3) hypothetical network is disposed node at random with certain density, and this deployment model can be regarded the even poisson process on the geometry as; (4) if two nodes are in mutually in the other side's the communication coverage, then be referred to as neighbor node.
1. based on the enforcement explanation of the beacon screening technique of checkpoint
As shown in Figure 2, in position fixing process, utilize the redundant configuration of sensor network, introduce the part-time beacon that transmits in the monitor channel of checkpoint that serves as of beaconing nodes.The checkpoint is reference with the self-position, and whether inner consistent (whether computed range matees measuring distance) come the detection of malicious beacon through the inspection beacon.
Checkpoint: adopt and mix the receiving mode monitor channel,, check then whether the measuring distance of this beacon and computed range mate when the destination node that listens to beacon signal and this beacon is a neighbor node.If do not match, be the malice beacon, then generate a warning message to relevant this beacon of unknown node report.The beacon of checkpoint inspection principle is as shown in Figure 3: self coordinate of supposition checkpoint is (x
c, y
c), the reference coordinates of claiming in the beacon message is (x
b, y
b), the measuring distance between checkpoint and the beaconing nodes is D
MeasureThen legal beacon should satisfy relation:
E wherein
MaxBe the maximum measure distance error that allows.Suppose navigation system range error error~N (0, σ
2), according to 3-σ criterion, then can make e
Max=3 σ, the probability of miscarriage of justice of checkpoint is reduced to 0.0026 like this.
Transducer: construct a locating information table (like table 1), all beacons that preservation receives and corresponding quilt alarm number of times thereof; And with the beacon adding safety beacon collection that wherein be no more than thresholding τ by the accusation number of times.With table 1 is example: supposition τ is 5, then beacon
4Be suspicion beacon (the alarm number of times surpasses 5), and beacon
1~beacon
3Be safety beacon.
Beacon ID | The position is with reference to information | Defendant's number of times |
Beacon 1 | (x 1,y 1,d 1) | 1 |
Beacon 2 | (x 2,y 2,d 2) | 0 |
Beacon 3 | (z 3,y 3,d 3) | 0 |
Beacon 4 | (x 4,y 4,d 4) | 6 |
2. the enforcement based on the beacon screening technique of zone ballot comprises the steps
With Fig. 4 is that example further specifies.Shown in Fig. 4 (a), suppose BS={bs
1, bs
2, bs
3, bs
4.If BS
*={ bs
4, region of search (x then
Min, y
Min) * (x
Max, y
Max)=(x
4-d
4, y
4-d
4) * (x
4+ d
4, y
4+ d
4), like the dash area among Fig. 4 (b).If BS
*=φ, then (x
Min, y
Min) * (x
Max, y
Max)=(x
4-d
4, y
3-d
3) * (x
1+ d
1, y
2+ d
2), like the dash area among Fig. 4 (c).
The present invention further specifies step 2 and 3 (supposition k=10) through Fig. 5.Among Fig. 5 (a), bs
*={ bs
4, then candidate unit is all and bs
4The unit that is complementary; Candidate unit cell [2,9] while and suspicion beacon bs
1And bs
2Coupling (who gets the most votes, 2) therefore is chosen as verification unit; At last, bs
*=bs
*∪ { bs
1∪ { bs
2}={ bs
1, bs
2, bs
4.Among Fig. 5 (b), bs
*={ bs
2, bs
4, then candidate unit is all and bs
4And bs
2The unit that is complementary (cell [1,3], cell [2,9]); Through ballot, cell [2,9] is chosen as verification unit; Therefore, bs
*=bs
*∪ { bs
1}={ bs
1, bs
2, bs
4.Among Fig. 5 (c), bs
*=φ, then all unit all are candidate unit; Through ballot, cell [4,7] is chosen as verification unit; So bs
*=bs
*∪ { bs
1∪ { bs
2∪ { bs
4}={ bs
1, bs
2, bs
4.
3. sensor safe positioning method is implemented to comprise the steps
(1) generation of one-way key chain: central server is that each beaconing nodes b distributes a unique password PW
b, and use a unidirectional Hash function of crash-resistant (like SHA-1 or MD5) to generate a unidirectional key chain:
<math><mrow><mtext><</mtext><msubsup><mi>k</mi><mi>b</mi><mn>0</mn></msubsup><mtext>,</mtext><msubsup><mi>k</mi><mi>b</mi><mn>1</mn></msubsup><mtext>, &CenterDot; &CenterDot; &CenterDot; ,</mtext><msubsup><mi>k</mi><mi>b</mi><mi>n</mi></msubsup><mtext>>=<p</mtext><msub><mi>w</mi><mi>b</mi></msub><mtext>, h</mtext><mrow><mo>(</mo><mi>p</mi><msub><mi>w</mi><mi>b</mi></msub><mo>)</mo></mrow><mtext>, &CenterDot; &CenterDot; &CenterDot; ,</mtext><msup><mi>h</mi><mi>n</mi></msup><mrow><mo>(</mo><mi>p</mi><msub><mi>w</mi><mi>b</mi></msub><mo>)</mo></mrow><mtext>>,</mtext></mrow></math> Wherein, n depends on that beaconing nodes need send the quantity of message (beacon message and warning message);
(2) sensor network disposition: before sensor network disposition, central server distributes the key chain that produces in the step 1 for each beaconing nodes, and with the ID of all beaconing nodes and the begin chain k of correspondence
b nBe loaded into each network node.
(3) Location Request: the transducer s of no-fix broadcasts Location Request: s → * a: s to neighbours;
(4) beacon is replied: each the neighbours' beaconing nodes b that receives Location Request replys a beacon:
Wherein, (x
b, y
b) be the position coordinates of beaconing nodes b; k
b N-jAuthentication code for b current message (j); J is the Hash counter, if receiving node has missed some middle cryptographic hash, then can come to be synchronized to again up-to-date key according to the j value;
(5) supervision of checkpoint: the checkpoint is adopted and is mixed the receiving mode monitor channel.C listens to bs when the checkpoint
b jThe time, check at first whether the sensor of interest of this beacon is neighbor node, if then carry out following processing:
1. authentication: the checkpoint is through the checking equality
Whether judge this message truly from b, wherein k
b N-jBe the authentication code of carrying in the beacon message, k
b N-j+1The current authentication key of preserving for receiving node about b (is initially preallocated begin chain k
b n).If authentication is passed through, then k is used in the checkpoint
b N-jK in the substitute memory
b N-j+1, otherwise abandon this beacon, do not do further processing;
2. beacon verification: checkpoint c obtains the distance B between itself and the beaconing nodes through wireless distance finding technology
Measure, and through the checking inequality
Judge this beacon whether malice, wherein (x
c, y
c) be the coordinate position of checkpoint c self, e
MaxBe the maximum measure distance error that allows.If find it is the malice beacon, then checkpoint c sends a warning message to transducer s:
K wherein
c N-i+1With the implication of i and the k in the step (4)
b N-jSimilar with j;
(6) transducer location: transducer receives the beacon and the warning message of all answers, and verifies the authenticity (being similar to step 5 1.) of these messages, utilizes these beacons and warning message to position calculating then.Concrete position fixing process is: construct a locating information table, all beacons that preservation receives and corresponding quilt alarm number of times thereof.If wherein the number of safety beacon (being no more than thresholding τ by alarming number of times) is less than 3, then execution area ballot method is further screened safety beacon; At last, transducer adopts the maximum likelihood estimation technique to estimate self-position with reference to safety beacon.
The flow process that sensor safe positioning method is implemented is as shown in Figure 6.
4. invention effect analysis
The present invention sets forth effect of the present invention from safety analysis, the verification and measurement ratio analysis of malice beacon and three aspects of emulation experiment assessment.Suppose and around a unknown node, disposed n optimum beaconing nodes and m malice beaconing nodes at random.
(1) attacks analysis
Obviously, malice beacon that seat offence caused inevitable because of exist inner inconsistent and seized make an inventory of find.What need special analysis here is local Replay Attack.The assailant possibly lure this beacon of checkpoint accusation into through retransmitting local beacon.But; Because the beacon of directly propagating is certain to arrive receiving node earlier than the beacon of resetting; Receiving node has also obtained up-to-date authentication code thus, and therefore the beacon of any playback can't be through the authentication of receiving node because its authentication code of carrying is out-of-date.
And lodge a false accusation against attack is the main attack pattern to this paper scheme.Legal beacon possibly lodged a false accusation against through making up warning message in a captive checkpoint, also possibly implement to lodge a false accusation against through the warning message of distorting other checkpoints and attack.With Fig. 2 is example, supposes that the assailant passes through monitor channel and collected a warning message alert who has nothing to do with s; When b sent beacon, the assailant took out alert and changes alarm object wherein into beacon that b sends, resends then to s; Then because the authentication code among the alert is fresh with respect to s, so s has accepted this accusation.Though it is truly feasible that two kinds of above-mentioned false accusations are attacked for the assailant, the influence of its generation is very limited.At first, this paper scheme is provided with a tolerance thresholding τ.The assailant need capture a checkpoint, τ+1 at least or distort the warning message that τ+1 has up-to-date authentication code and could effectively lodge a false accusation against a legal beacon.Secondly, even all beacons are all lodged a false accusation against, unknown node is accessible region territory ballot algorithm screening safety beacon still.
(2) the theoretical verification and measurement ratio p of method 1
1p
1Equal a malice beacon and reported to the authorities the probability of number of times, promptly listen to the probability of the checkpoint number of this beacon greater than τ above thresholding τ.Can get by Poisson distribution:
Wherein, p
bBe the deployment density of beaconing nodes, A (o) is the area (like the dash area among Fig. 2) in the common neighbours zone of beaconing nodes and unknown node.Fig. 7 is the functional arrangement of formula (1).As shown in the figure: p
1Along with p
bIncrease and increase, and along with τ increases and reduces.Therefore can be according to p
bActual setting, through selecting suitable τ, to guarantee p
1Can satisfy the demand for security of using.For example, make p
1=0.99, work as P
b=0.01 o'clock, then τ got 5.
(3) the theoretical verification and measurement ratio p of technology 2
2p
2Equal zone ballot screening method and select the probability of correct unit, promptly the number of votes obtained of correct unit is higher than the probability of number of votes obtained of the error unit of malice beacon indication.Because a beacon possibly mate a plurality of unit (promptly possibly vote to a plurality of unit); Removing optimum beacon votes to object element certainly; The fixing ballot of malice beacon (considering the sight of conspiracy attack) is given outside certain error unit, and remaining ballot can be thought random fashion.Therefore:
Wherein, Prob (ξ=x) open probability, p with air ticket for certain candidate unit obtains x just
vBe that a beacon is voted to the probability (1≤p of certain unit at random
v≤2/k).Fig. 8 is functional arrangement (the supposition p of formula (3)
v=2/k).As shown in the figure: p
2Increase with m reduces, when optimum checkpoint accounts for plurality, and p
2Value is very good.For example, though when the ratio of malice beaconing nodes up to 40%, the p under the different n values
2All still be higher than 85%.
(4) emulation experiment assessment.
Adopt matlab to realize that the present invention suggests plans.The test scene is as shown in Figure 9: a transducer is placed by central authorities in one 40 * 40 (rice) zone; Dispose some beaconing nodes (wherein n=16) on every side at random; The communication radius of node is 30 meters (so that transducer can receive the signal of all beaconing nodes); Thresholding τ is set at 5, whole experiment repetition 1000 times.Attack and external attack through malice beaconing nodes simulated interior: 1. internal attack behavior: the malice beaconing nodes conspires to issue wrong beacon, and lodges a false accusation against all legal beacons; 2. external attack behavior: the malice beaconing nodes is issued wrong beacon at random, and this is because external attacker is difficult to accurately to handle beacon and can't implements the malice accusation and attack.
Following two parameter indexs of the main assessment of experiment: 1. verification and measurement ratio, it equals the ratio that success filters out experiment number with total experiment number of all malice beacons.2. computing cost refers to the number of times of performance element and beacon matching test in this paper scheme.In the detection design of this paper, unknown node need not sent data, so the present invention only investigates computing cost.
Figure 10 provides the verification and measurement ratio experimental result of the present invention program to two types of attacks.As can beappreciated from fig. 10: 1. experimental result and theory analysis basically identical, wherein, to the verification and measurement ratio of external attack a little less than theoretical value p
1(p
1=0.99), to the verification and measurement ratio of internaling attack then a little more than theoretical value p
2This is because in actual motion, and unknown node might not need execution area voting mechanism algorithm, and the ballot quantity of each beacon possibly (be pv≤2/k) less than 2k also.Therefore in addition, because the k value of each run all is dynamic change, the theoretical value with k=10 and k=20 compares.2. the increase with σ 2 values reduces to the verification and measurement ratio of internaling attack, and this is because the resolution high more (the k value is big more) of σ 2 more little then grids, and verification and measurement ratio is also high more.
Table 2 has provided computing cost situation of the present invention: 1. the computing cost to external attack all is 0 under different m values, and this is because this paper scheme only adopts the checkpoint to take precautions against external attack, need not execution area ballot step.2. internaling attack under the scene, when the m value hour, computing cost all levels off to 0; Along with the m value further increases, computing cost begins to enlarge markedly; Increase to a certain degree but work as the m value, computing cost tends towards stability again.This be because: when having only a small amount of malice checkpoint, unknown node can receive enough safety beacons and need not the execution area step; Along with the further increase of m value, the probability that normal beacons is lodged a false accusation against becomes greatly gradually, and the probability of unknown node execution area ballot step also increases gradually, so the corresponding increase of computing cost; But when this probability increased to 100%, computing cost tended towards stability again.3. then enlarge markedly with diminishing of σ 2 to the computing cost of internaling attack, this is that computing cost is also big more because the resolution of σ 2 more little then grids is high more.
Table 2
Experimental result shows that the composite defense strategy that this method adopts has effectively lowered computing cost when guaranteeing positioning security.
Though through describing practical implementation process of the present invention and analysis, showed advantage of the present invention,, the present invention does not receive the restriction of said detail, exemplary, typical method and emulation tool.Therefore, under the situation of the spirit of the general notion that does not depart from the applicant invention and scope, can be different with the details of claims.
Symbol description:
GPS: global positioning system
VM:Verifiable Multilateration can verify polygon measurement
MAC: message authentication code
The h:hash function
A (o): the area of regional o
BS: beacon collection
BS
*: be the safety beacon collection,
Claims (5)
1. wireless sensor safe positioning method; Improve the anti-attack ability of transducer self poisoning through filtering malice beacon; It is characterized in that: this localization method comprises " based on the beacon sieve of checkpoint " and " based on the beacon sieve of regional voting mechanism " two kinds of beacon screening techniques; Discern and filtering fallacious beacon through the internal consistency and the outside consistency of verification beacon respectively, and be applied to take precautions against the external attacker and the person of internaling attack respectively;
Method 1: based on the beacon screening of checkpoint, utilize the redundant configuration of sensor network, introduce the part-time beacon that transmits in the monitor channel of checkpoint that serves as of beaconing nodes; The checkpoint is reference with the self-position; Whether mate through inspection computed range that beacon provided and measuring distance and to judge its whether malice beacon,, then explain it is the malice beacon if do not match; Find the malice beacon when the checkpoint and then send a warning information to neighbours' sensor node; Each sensor node statistics each receive beacon by alarm number of times, the beacon that wherein is no more than thresholding τ by the alarm number of times is regarded as safety beacon, and all the other beacons is regarded as the suspicion beacon;
Method 2: based on the beacon screening of regional voting mechanism; On the basis of method 1, introduce regional voting mechanism and further check inconsistent between beacon, and discern and filtering fallacious beacon, that is: the target area is divided into a uniform lattice based on majority principle; Utilize each beacon possibly to vote residing unit for sensor; Then with the maximum unit of poll as verification unit, further detect whether malice of remaining suspicion beacon, if certain suspicion beacon can mate verification unit; Illustrate that then it is a safety beacon, otherwise be the malice beacon;
Wherein, the transducer method of carrying out safety location comprises the steps:
1) generation of one-way key chain: central server distributes a unique password PW for each beaconing nodes
b, and use a unidirectional Hash function of crash-resistant to generate a unidirectional key chain:
Wherein, n depends on that beaconing nodes need send the quantity of message;
2) sensor network disposition: before sensor network disposition; Central server distributes the key chain of a step 1) generation for each beaconing nodes, and the ID and the corresponding begin chain
of all beaconing nodes is loaded into each network node;
3) Location Request: the transducer s of no-fix is to Location Request of neighbours' beaconing nodes b broadcasting;
4) beacon is replied: each the neighbours' beaconing nodes b that receives Location Request replys a beacon:
Wherein, (x
b, y
b) be the position coordinates of neighbours' beaconing nodes b;
Authentication code for neighbours' beaconing nodes b current message; J is the Hash counter, if receiving node has missed some middle cryptographic hash, then can come to be synchronized to again up-to-date key according to the j value;
5) supervision of checkpoint: the checkpoint is adopted and is mixed the receiving mode monitor channel; When checkpoint c listens to beacon
; Whether the sensor of interest of at first checking this beacon is neighbor node; If then carry out following processing:
1. authentication: the checkpoint judges that through checking equality
whether this message is truly from neighbours' beaconing nodes b; Wherein
is the authentication code of carrying in the beacon message; The current authentication key that
preserves for receiving node about neighbours' beaconing nodes b; If authentication is passed through; Then the checkpoint is used
in
substitute memory otherwise is abandoned this beacon, does not do further processing;
2. beacon verification: checkpoint c obtains the distance B between itself and the beaconing nodes through wireless distance finding technology
Measure, and through the checking inequality
Judge this beacon whether malice, wherein (x
c, y
c) be the coordinate position of checkpoint c self, e
MaxBe the maximum measure distance error that allows; If find it is the malice beacon, then checkpoint c sends a warning message to transducer s:
With in the implication of i and the step 4)
Identical with j;
6) transducer location: transducer receives the beacon and the warning message of all answers; And the authenticity of checking message; Utilize the beacon and the warning message of replying to position calculating then, concrete position fixing process is: construct a locating information table, all beacons that preservation receives and corresponding quilt alarm number of times thereof; If wherein the number of safety beacon is less than 3; Then execution area ballot method is further screened safety beacon, and is last, and transducer adopts the maximum likelihood estimation technique to estimate self-position with reference to safety beacon.
2. wireless sensor safe positioning method according to claim 1; It is characterized in that on conventional location mechanism basis; Introducing is based on the beacon screening technique of checkpoint and beacon screening technique based on regional voting mechanism; Improve the ability of navigation system resisting attacks, in position fixing process, transducer at first receives alarm that neighbours check through " method 1 " and detects and isolate the malice beacon; The safety beacon number that filters out when transducer satisfies the location Calculation condition, then abandons all suspicion beacons, directly carries out self poisoning with reference to safety beacon and calculates; Otherwise adopt " method 2 " regional voting mechanism from the suspicion beacon, further to screen safety beacon.
3. wireless sensor safe positioning method according to claim 2 is characterized in that employing method 1 directly carries out the safety beacon quantity that self poisoning calculates and be at least 3.
4. wireless sensor safe positioning method according to claim 1 is characterized in that carrying out beacon screening step based on the checkpoint comprises:
(1) the beacon inspection is carried out in the checkpoint: adopt and mix the receiving mode monitor channel; When the destination node that listens to beacon signal and this beacon is a neighbor node; Check then whether measuring distance and computed range between this beacon and the checkpoint mate; If coupling is legal beacon, not matching is the malice beacon, then generates a warning message to relevant this beacon of unknown node report;
(2) locating information table of sensor arrangement is used to preserve all beacons of receiving and corresponding to the alarm number of times, is added the safety beacon collection with wherein reporting to the authorities the beacon that number of times is no more than thresholding τ, and it then is the suspicion beacon that the alarm number of times surpasses τ.
5. wireless sensor safe positioning method according to claim 1 is characterized in that the beacon screening technique that carries out the zone ballot comprises the steps:
Step 1: transducer is at first confirmed a regional (x of self residing rectangular search
Min, y
Min) * (x
Max, y
Max), suppose beacon collection BS={bs
i| i=1,2 ..., n} is all beacons that transducer receives, BS
*For safety beacon collection, if BS through method 1 screening
*Promptly there is safety beacon in ≠ φ, then appoints and gets a safety beacon bs
i=(x
i, y
i, d
i), then make (x
Min, y
Min) * (x
Max, y
Max)=(x
i-d
i, y
i-d
i) * (x
i+ d
i, y
i+ d
i); If BS
*=φ, then order:
Step 2: selected candidate unit, transducer evenly is divided into the grid G that is made up of k * k unit, k=max (x with the region of search
Max-x
Min, y
Max-y
Min)/e
Max, e
MaxBe the range error of maximum, if BS
*≠ φ, the then selected unit that wherein can mate all safety beacons is as candidate unit, if BS
*=φ, then selected all unit are as candidate unit; Unit g
MnWith beacon bs
iMatching condition do || g
Mn-(x
i, y
i) ||
Max>=d
i>=|| g
Mn-(x
i, y
i) ||
Min, wherein || g
Mn-(x
i, y
i) ||
MaxWith || g
Mn-(x
i, y
i) ||
MinBe respectively coordinate (x
i, y
i) to unit g
MnMaximum distance and minimum distance;
Step 3: the ballot screening, it is corresponding with grid G to set up a two-dimentional ballot table; When initial, the poll that each candidate unit is corresponding is 0, if a candidate unit can mate a suspicion beacon, then its corresponding poll adds 1; Repeat this process, all accomplish matching test with all suspicion beacons up to each candidate unit; After the ballot, transducer is a verification unit with the highest unit of poll, and all suspicion beacons that can mate verification unit are added the safety beacon collection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101503089A CN101309151B (en) | 2008-07-11 | 2008-07-11 | Safe positioning method for wireless sensor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101503089A CN101309151B (en) | 2008-07-11 | 2008-07-11 | Safe positioning method for wireless sensor |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101309151A CN101309151A (en) | 2008-11-19 |
CN101309151B true CN101309151B (en) | 2012-08-08 |
Family
ID=40125387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008101503089A Expired - Fee Related CN101309151B (en) | 2008-07-11 | 2008-07-11 | Safe positioning method for wireless sensor |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101309151B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075997B (en) * | 2011-02-24 | 2013-08-14 | 山东省计算中心 | Energy consumption attack testing method for wireless sensor network |
CN102123389B (en) * | 2011-02-28 | 2013-03-27 | 河海大学常州校区 | Safe positioning method of wireless sensor network |
CN102186171B (en) * | 2011-03-11 | 2013-07-10 | 北京工业大学 | Anti-attack reliable wireless sensor network node positioning method |
CN102438310B (en) * | 2011-09-23 | 2014-01-22 | 华东理工大学 | Wireless sensor network positioning method based on trust rating |
CN102378217B (en) * | 2011-11-01 | 2014-05-28 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
CN102497636A (en) * | 2011-12-12 | 2012-06-13 | 湖南科技大学 | Wireless sensor network safety locating system and method based on watermark |
CN103702280A (en) * | 2013-11-26 | 2014-04-02 | 中国十七冶集团有限公司 | Secure routing protocol of Internet of Things based on node position detection |
CN105158435B (en) * | 2015-07-22 | 2018-05-18 | 南华大学 | Radionuclide water and soil pollution monitoring and positioning system based on wireless sensor network |
CN105407527B (en) * | 2015-10-26 | 2019-02-19 | 南京邮电大学 | Wireless sensor network security locating and tracking and quantitative evaluating method |
FR3046324B1 (en) * | 2015-12-23 | 2018-12-14 | Sagemcom Broadband Sas | METHOD FOR DETERMINING A TIME REFERENCE AND / OR AT LEAST ONE SPATIAL REFERENCE IN A COMMUNICATION SYSTEM |
CN105911970B (en) * | 2016-06-14 | 2018-10-02 | 中山市顺通快递服务有限公司 | A kind of hybrid power cargo carrying system based on bee colony control |
CN106443130B (en) * | 2016-10-10 | 2019-04-19 | 广东必达电器有限公司 | A kind of voltage monitoring system |
US11405185B2 (en) * | 2017-09-28 | 2022-08-02 | Apple Inc. | Methods and architectures for secure ranging |
CN108008353B (en) * | 2017-12-05 | 2021-06-15 | 南京沃旭通讯科技有限公司 | Method for ensuring anchor position stability by utilizing anchor point mutual ranging |
CN110868246B (en) * | 2019-09-02 | 2020-10-27 | 北京邮电大学 | Information transmission method and system |
CN112929882B (en) * | 2021-01-15 | 2022-05-03 | 电子科技大学 | Method for identifying Sybil nodes and overlapped nodes |
CN114484732B (en) * | 2022-01-14 | 2023-06-02 | 南京信息工程大学 | Air conditioning unit sensor fault diagnosis method based on voting network |
-
2008
- 2008-07-11 CN CN2008101503089A patent/CN101309151B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN101309151A (en) | 2008-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101309151B (en) | Safe positioning method for wireless sensor | |
Zeng et al. | Secure localization and location verification in wireless sensor networks: a survey | |
Chen et al. | Detecting and localizing wireless spoofing attacks | |
Lazos et al. | SeRLoc: Secure range-independent localization for wireless sensor networks | |
Du et al. | Lad: Localization anomaly detection for wireless sensor networks | |
Jiang et al. | Secure localization in wireless sensor networks: a survey | |
Lazos et al. | HiRLoc: high-resolution robust localization for wireless sensor networks | |
Yu et al. | Localized algorithms for detection of node replication attacks in mobile sensor networks | |
Labraoui et al. | Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks | |
Ding et al. | Fault-tolerant target localization in sensor networks | |
Abbas et al. | Masquerading attacks detection in mobile ad hoc networks | |
Wang et al. | Secure localization algorithms in wireless sensor networks: a review | |
Ren et al. | Secure and fault-tolerant event boundary detection in wireless sensor networks | |
García-Otero et al. | Detection of wormhole attacks in wireless sensor networks using range-free localization | |
Liu et al. | Identification of location spoofing in wireless sensor networks in non-line-of-sight conditions | |
Liang et al. | Detection of global positioning system spoofing attack on unmanned aerial vehicle system | |
Han et al. | A two-step secure localization for wireless sensor networks | |
Won et al. | Robust sensor localization against known sensor position attacks | |
Srinivas et al. | Spoofing attacks in wireless sensor networks | |
Delaët et al. | Deterministic secure positioning in wireless sensor networks | |
Yang et al. | Voting-on-grid clustering for secure localization in wireless sensor networks | |
Ammar et al. | Secure localization in wireless sensor networks: A survey | |
Tang et al. | A RSSI-based cooperative anomaly detection scheme for wireless sensor networks | |
Kotwal et al. | Approaches of self localization in wireless sensor networks and directions in 3D | |
Zhang et al. | Trust based secure localization in wireless sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120808 |