CN102083061B - Attack testing method of routing table security of wireless sensor network - Google Patents
Attack testing method of routing table security of wireless sensor network Download PDFInfo
- Publication number
- CN102083061B CN102083061B CN201110040492.3A CN201110040492A CN102083061B CN 102083061 B CN102083061 B CN 102083061B CN 201110040492 A CN201110040492 A CN 201110040492A CN 102083061 B CN102083061 B CN 102083061B
- Authority
- CN
- China
- Prior art keywords
- network
- node
- networking
- routing
- testing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 89
- 230000006855 networking Effects 0.000 claims abstract description 79
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims abstract description 4
- 238000012546 transfer Methods 0.000 claims description 5
- 238000000034 method Methods 0.000 abstract description 7
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012956 testing procedure Methods 0.000 description 1
Images
Abstract
The invention discloses an attack testing method of routing table security of a wireless sensor network. The method comprises the following steps of: a, acquiring a channel number and a previous access network identifier (PANID) number of the network by using a sniffer tool and a protocol analysis tool; b, configuring a testing route node; c, putting the testing route node into a network to be tested; d, applying for networking, acquiring the identification of the testing route node, sending a networking request to the network to be tested on the basis of the identification and making sure that the identification of the testing route node differs every time a request is added into the network to be tested; e, judging whether networking is successful or not, returning to the step d if the networking is successful and performing a step f if networking is unsuccessful; and f, ending attach testing. A testing route node (or a testing sensor node) which can be added into the network to be tested is configured, so that attack testing of the routing table security of the wireless sensor network is effectively realized and a higher requirement on the security of the wireless sensor network is made.
Description
Technical field
The present invention relates to a kind of attack testing method of routing table security of wireless sensor network, in particular, relate in particular to a kind of can be applicable to routing node to center networking node, sensor node to center networking node and the sensor node attack testing method to the routing table security of wireless sensor network of route node.
Background technology
Wireless sensor network is a kind of wireless self-organization network, and in the environment of arranging net, its data transfer is to utilize routing mechanism, realizes by the multi-hop routing node.In order in wireless sensor network, to realize the route of data, the support of routing table must be arranged, near the sign of routing node must be added its routing table such as center networking node after, could receive from the data of these routing node transmissions.If there is potential safety hazard in the routing table of center networking node, will the availability of whole topology of networks and network be impacted so, and then affect the availability of network.For the routing table of differentiating wireless sensor network product safety whether, it is carried out attack test is a kind of effective ways, and this helps to find fast safety problem, to promote the raising of its security assurance information ability.
At present, although exist multiple routing mechanism to wireless sensor network to implement the method for attack test, as select forwarding attack, fall into the hole attack, Sybil attack, worm hole attack etc., there is not yet the method for testing that routing table is directly attacked.
Summary of the invention
The present invention is in order to overcome the shortcoming of above-mentioned technical problem, provide a kind of can be applicable to routing node to center networking node, sensor node to center networking node and the sensor node attack testing method to the routing table security of wireless sensor network of route node.
The attack testing method of routing table security of wireless sensor network of the present invention, its special feature is may further comprise the steps: a. at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument; B. the configuration testing routing node according to the channel number that obtains among the step a and PANID number, disposes one and has the test routing node that adds network capabilities to be measured; C. will test routing node and place network to be measured; D. networking application, the identify label of obtaining the test routing node sends the networking request take this identify label as the basis to network to be measured, and the identify label of test routing node is different when guaranteeing that each request adds network to be measured; E. whether the networking among the determining step d is successful, such as the networking success, returns steps d; Unsuccessful such as networking, execution in step f; F. attack test finishes.Channel information and the PANID network number in order to obtain network to be measured among the step a, in order to dispose the test routing node that can add network to be measured by step b; The effect of step c is to make the test routing node possess the condition that adds network to be measured; In the process of each networking request, the test routing node all adopts different identify labels in the steps d.When the fail safe of wireless sensor network routing table to be tested is estimated, maybe can only carry out networking and the routing table of limited number of time and do not overflow if the test routing node can not carry out networking, the fail safe that represents the wireless sensor network routing table is higher; If the routing table overflow of center networking node, the fail safe that then represents the wireless sensor network routing table is relatively poor.
The attack testing method of routing table security of wireless sensor network of the present invention, described steps d may further comprise the steps: (d-1). at first transfer the identify label of test routing node; (d-2). the identify label that obtains is added 1 also as the identify label of testing routing node; (d-3). the test routing node adds network to be measured with the identify label request in the step (d-2).By the identify label of test routing node is added 1, so that it all has different identify labels when each request adds network to be measured.Add 1 number of times by calculating identify label, be conducive to the fail safe of wireless sensor network routing table is analyzed.
The attack testing method of routing table security of wireless sensor network of the present invention utilizes GetAddress () function to obtain and return the identify label of self in the described steps d.The effect of GetAddress () function is to transfer the identify label of self and add 1 in this identify label, thereby returns a new identify label.
The attack testing method of routing table security of wireless sensor network of the present invention, described step b, the test routing node of configuration comprises the CC2430 chip.CC2430 is a System on Chip/SoC, and the 2.4GHz ISM wave band that it can satisfy take ZigBee as the basis is used, and it combines a high-performance 2.4GHz DSSS radio-frequency (RF) transceiver core and small and exquisite efficient 8051 controllers of technical grade.
The attack testing method of routing table security of wireless sensor network of the present invention, the criterion of networking success is that the routing table of center networking node is not overflowed among the described step e; The unsuccessful criterion of networking is the routing table overflow of center networking node.Because the memory space of routing table is certain, if network routing security to be measured is relatively poor, after repeatedly networking request and distribution address, routing table will be overflowed.
In wireless sensor network, if the node of sensor node as the transmission request, just can carry out sensor node center networking node and sensor node are tested the routing table security of route node, its testing procedure is as follows:
(1). at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument; (2). the configuration testing sensor node, according to the channel number that obtains in the step (1) and PANID number, dispose one and have the testing sensor node that adds network capabilities to be measured; (3). the testing sensor node is placed network to be measured; (4). the networking application, the identify label of obtaining the testing sensor node sends networking request as basic to routing node or center networking node take this identify label, and guarantees that the identify label of each request adding routing node or center networking node is different; (5). whether the networking in the determining step (4) is successful, such as the networking success, returns step (4); Unsuccessful such as networking, execution in step (6); (6). attack test finishes.
The invention has the beneficial effects as follows: the present invention has the test routing node (or testing sensor node) that adds network capabilities to be measured by configuration, namely effectively realized the attack test to routing table security of wireless sensor network, also wireless sensor network security has been had higher requirement.
Description of drawings
Fig. 1 is the flow chart that routing node adds wireless sensor network;
Fig. 2 is the program flow diagram of embodiment among the present invention.
Embodiment
The invention will be further described below in conjunction with accompanying drawing and embodiment.
If wireless sensor network will be realized routing mechanism, then networking node in center must allow routing node to add network, and this process is to add its routing table by the identify label with routing node to realize.The process of center networking node permission routing node adding network as shown in Figure 1.After routing node sends route requests to center networking node, networking node in center judges at first whether the routing node that sends connection request is a node that has been present in the routing table, if then again for it distributes a short address, and send " connection response " order.Otherwise, illustrate that the node that sends connection request is a new node.At this moment, networking node in center will judge whether the route entry of the routing table of self has reached the upper limit, if reach, illustrates that then networking node in center can't allow new node to add, and this moment, it can send the adding of command reject (CMDR) new node; Otherwise networking node in center can add routing table entry with the longways location of new node, and sends " connection response " order.
As can be seen from Figure 1, after the routing table of center networking node is full, then can not allow new routing node to add network.Utilize this point, we can allow a test routing node constantly add the network that networking node in center forms, and adding fashionable fixed amount of identify label increase with oneself at every turn, cause center networking node that it is judged as a new routing node, and new identify label is added its routing table.When the test routing node repeats said process, can cause at short notice the routing table overflow of center networking node, cause new legal routing node can't add network, thereby destroyed the extensibility of network fully.
As shown in Figure 2, provided the flow chart of the attack testing method of routing table security of wireless sensor network of the present invention, it may further comprise the steps:
A. at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument;
B. the configuration testing routing node according to the channel number that obtains among the step a and PANID number, disposes one and has the test routing node that adds network capabilities to be measured; The test routing node can dispose by the CC2430 chip;
C. will test routing node and place network to be measured; Make the test routing node possess the condition that adds network to be measured;
D. networking application, the identify label of obtaining the test routing node sends the networking request take this identify label as the basis to network to be measured, and the identify label of test routing node is different when guaranteeing that each request adds network to be measured; Can realize by following three steps in this step: (d-1). at first transfer the identify label of test routing node; (d-2). the identify label that obtains is added 1 also as the identify label of testing routing node; (d-3). the test routing node adds network to be measured with the identify label request in the step (d-2);
E. whether the networking among the determining step d is successful, such as the networking success, returns steps d; Unsuccessful such as networking, execution in step f; In this step, the criterion of networking success is that the routing table of center networking node is not overflowed; The unsuccessful criterion of networking is the routing table overflow of center networking node;
F. attack test finishes.
In above-mentioned steps d, if in the system of test routing node GetAddress () function is arranged, can obtain former identity mark and obtain new identify label by GetAddress () function.
After in network design environment to be measured, opening the test routing node, this test routing node can repeatedly add network, and because its each network that adds all adopts new identify label, can cause center networking node that these signs are all added in its routing table, and after center networking node sends " refusal add " order, mean that then its routing table overflowed, at this moment, the extensibility of network is destroyed fully, and new routing node can't add network.
What the above provided comes the safety detection of the routing table of inspection center's organization node also to may be used on by sensor node to center networking node or by the detection of sensor node to the routing table security of route node, it can be realized by following steps by the test routing node:
(1). at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument; (2). the configuration testing sensor node, according to the channel number that obtains in the step (1) and PANID number, dispose one and have the testing sensor node that adds network capabilities to be measured; (3). the testing sensor node is placed network to be measured; (4). the networking application, the identify label of obtaining the testing sensor node sends networking request as basic to routing node or center networking node take this identify label, and guarantees that the identify label of each request adding routing node or center networking node is different; (5). whether the networking in the determining step (4) is successful, such as the networking success, returns step (4); Unsuccessful such as networking, execution in step (6); (6). attack test finishes.
Claims (6)
1. the attack testing method of a routing table security of wireless sensor network is characterized in that may further comprise the steps:
A. at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the network number of this network by the protocal analysis instrument;
B. the configuration testing routing node according to the channel number that obtains among the step a and network number, disposes one and has the test routing node that adds network capabilities to be measured;
C. will test routing node and place network to be measured;
D. networking application, the identify label of obtaining the test routing node sends the networking request take this identify label as the basis to network to be measured, and the identify label of test routing node is different when guaranteeing that each request adds network to be measured;
E. whether the networking among the determining step d is successful, such as the networking success, returns steps d; Unsuccessful such as networking, execution in step f;
F. attack test finishes.
2. the attack testing method of routing table security of wireless sensor network according to claim 1, it is characterized in that: described steps d may further comprise the steps:
(d-1). at first transfer the identify label of test routing node;
(d-2). the identify label that obtains is added 1 also as the identify label of testing routing node;
(d-3). the test routing node adds network to be measured with the identify label request in the step (d-2).
3. the attack testing method of routing table security of wireless sensor network according to claim 1 and 2 is characterized in that: utilize GetAddress () function to obtain and return the identify label of self in the described steps d.
4. the attack testing method of routing table security of wireless sensor network according to claim 1 and 2, it is characterized in that: described step b, the test routing node of configuration comprises the CC2430 chip.
5. the attack testing method of routing table security of wireless sensor network according to claim 1 is characterized in that: the criterion of networking success is that the routing table of center networking node is not overflowed among the described step e; The unsuccessful criterion of networking is the routing table overflow of center networking node.
6. the attack testing method of a routing table security of wireless sensor network is characterized in that may further comprise the steps:
(1). at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the network number of this network by the protocal analysis instrument;
(2). the configuration testing sensor node, according to the channel number and the network number that obtain in the step (1), dispose one and have the testing sensor node that adds network capabilities to be measured;
(3). the testing sensor node is placed network to be measured;
(4). the networking application, the identify label of obtaining the testing sensor node sends networking request as basic to routing node or center networking node take this identify label, and guarantees that the identify label of each request adding routing node or center networking node is different;
(5). whether the networking in the determining step (4) is successful, such as the networking success, returns step (4); Unsuccessful such as networking, execution in step (6);
(6). attack test finishes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110040492.3A CN102083061B (en) | 2011-02-18 | 2011-02-18 | Attack testing method of routing table security of wireless sensor network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110040492.3A CN102083061B (en) | 2011-02-18 | 2011-02-18 | Attack testing method of routing table security of wireless sensor network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102083061A CN102083061A (en) | 2011-06-01 |
CN102083061B true CN102083061B (en) | 2013-03-20 |
Family
ID=44088776
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110040492.3A Expired - Fee Related CN102083061B (en) | 2011-02-18 | 2011-02-18 | Attack testing method of routing table security of wireless sensor network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102083061B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102209325B (en) * | 2011-06-02 | 2013-07-10 | 安徽南瑞继远软件有限公司 | Authentication method based on ZigBee network |
CN109195159B (en) * | 2018-08-23 | 2021-11-09 | 中国联合网络通信集团有限公司 | Addressing test method, device and system for sensor gateway |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043384A (en) * | 2006-05-25 | 2007-09-26 | 华为技术有限公司 | System and method for network test |
CN101072135A (en) * | 2007-06-29 | 2007-11-14 | 杭州华三通信技术有限公司 | Wireless LAN testing method and system |
EP1871045A1 (en) * | 2006-06-19 | 2007-12-26 | NTT DoCoMo Inc. | Detecting and bypassing misbehaving nodes in distrusted ad hoc networks |
CN101945016A (en) * | 2009-07-09 | 2011-01-12 | 中兴通讯股份有限公司 | Method and device for testing stability of device webmaster |
-
2011
- 2011-02-18 CN CN201110040492.3A patent/CN102083061B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043384A (en) * | 2006-05-25 | 2007-09-26 | 华为技术有限公司 | System and method for network test |
EP1871045A1 (en) * | 2006-06-19 | 2007-12-26 | NTT DoCoMo Inc. | Detecting and bypassing misbehaving nodes in distrusted ad hoc networks |
CN101072135A (en) * | 2007-06-29 | 2007-11-14 | 杭州华三通信技术有限公司 | Wireless LAN testing method and system |
CN101945016A (en) * | 2009-07-09 | 2011-01-12 | 中兴通讯股份有限公司 | Method and device for testing stability of device webmaster |
Non-Patent Citations (2)
Title |
---|
一种可扩展的分布式网络攻击测试系统;宇佳 等;《计算机应用》;20060901;第26卷(第9期);全文 * |
宇佳 等.一种可扩展的分布式网络攻击测试系统.《计算机应用》.2006,第26卷(第9期), |
Also Published As
Publication number | Publication date |
---|---|
CN102083061A (en) | 2011-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103208204B (en) | Parking lot stall monitoring system based on radio frequency identification technology and working method | |
CN105788355B (en) | A kind of parking stall monitoring System and method for based on Beacon technology | |
JP2011504865A5 (en) | ||
CN105208132A (en) | Intelligent terminal cloud management system | |
CN105021917B (en) | A kind of status of electric power detection method based on IPV6 mobile terminals and RFID label tag | |
RU2011125590A (en) | METHOD FOR PREVENTING AND IDENTIFYING MOBILE DEVICES AND FORECASTING AND NOTIFICATION SYSTEM FOR IDENTIFICATION OF MOBILE DEVICES | |
CN107925893A (en) | Radio environment information collection system and method | |
CN104854472A (en) | Position location system architecture: messaging and ranging links | |
CN107730955A (en) | Reverse car seeking method and device based on electronic license plate | |
ATE489810T1 (en) | DYNAMIC FAULT ANALYSIS FOR A CENTRALLY MANAGED NETWORK ELEMENT IN A TELECOMMUNICATIONS SYSTEM | |
CN107992919A (en) | The method of RFID quick countings | |
CN105227365A (en) | Based on the internet-of-things terminal managing and control system of Android platform | |
CN108924759A (en) | Identify the method, apparatus and system of mobile generator | |
CN110267268A (en) | The recognition methods of pseudo-base station, apparatus and system | |
CN102158551B (en) | Information source unified description and access method for Internet of things | |
CN102083061B (en) | Attack testing method of routing table security of wireless sensor network | |
EP2592875A1 (en) | Method and apparatus to select an access point | |
Chen et al. | Design and implementation of a ZigBee-based wireless automatic meter reading system | |
CN104030121B (en) | A kind of elevator safety operation data coupling devices and method of work | |
CN101252477B (en) | Determining method and analyzing apparatus of network fault root | |
CN102457903A (en) | Access control method for accessing wireless sensor network to telecommunication network by multiple gateways and apparatus thereof | |
WO2022029415A1 (en) | Identifying wireless network devices | |
CN205210973U (en) | System is examined to equipment point | |
CN109451511A (en) | Driver test system and method based on 1800M electric power wireless communication private network | |
CN102737207B (en) | Communication method based on radio frequency identification system, apparatus and system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130320 |