CN102083061B - Attack testing method of routing table security of wireless sensor network - Google Patents

Attack testing method of routing table security of wireless sensor network Download PDF

Info

Publication number
CN102083061B
CN102083061B CN201110040492.3A CN201110040492A CN102083061B CN 102083061 B CN102083061 B CN 102083061B CN 201110040492 A CN201110040492 A CN 201110040492A CN 102083061 B CN102083061 B CN 102083061B
Authority
CN
China
Prior art keywords
network
node
networking
routing
testing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110040492.3A
Other languages
Chinese (zh)
Other versions
CN102083061A (en
Inventor
赵华伟
郭强
舒明雷
刘瑞霞
吕家亮
魏诺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Computer Science Center
Original Assignee
Shandong Computer Science Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Computer Science Center filed Critical Shandong Computer Science Center
Priority to CN201110040492.3A priority Critical patent/CN102083061B/en
Publication of CN102083061A publication Critical patent/CN102083061A/en
Application granted granted Critical
Publication of CN102083061B publication Critical patent/CN102083061B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an attack testing method of routing table security of a wireless sensor network. The method comprises the following steps of: a, acquiring a channel number and a previous access network identifier (PANID) number of the network by using a sniffer tool and a protocol analysis tool; b, configuring a testing route node; c, putting the testing route node into a network to be tested; d, applying for networking, acquiring the identification of the testing route node, sending a networking request to the network to be tested on the basis of the identification and making sure that the identification of the testing route node differs every time a request is added into the network to be tested; e, judging whether networking is successful or not, returning to the step d if the networking is successful and performing a step f if networking is unsuccessful; and f, ending attach testing. A testing route node (or a testing sensor node) which can be added into the network to be tested is configured, so that attack testing of the routing table security of the wireless sensor network is effectively realized and a higher requirement on the security of the wireless sensor network is made.

Description

A kind of attack testing method of routing table security of wireless sensor network
Technical field
The present invention relates to a kind of attack testing method of routing table security of wireless sensor network, in particular, relate in particular to a kind of can be applicable to routing node to center networking node, sensor node to center networking node and the sensor node attack testing method to the routing table security of wireless sensor network of route node.
Background technology
Wireless sensor network is a kind of wireless self-organization network, and in the environment of arranging net, its data transfer is to utilize routing mechanism, realizes by the multi-hop routing node.In order in wireless sensor network, to realize the route of data, the support of routing table must be arranged, near the sign of routing node must be added its routing table such as center networking node after, could receive from the data of these routing node transmissions.If there is potential safety hazard in the routing table of center networking node, will the availability of whole topology of networks and network be impacted so, and then affect the availability of network.For the routing table of differentiating wireless sensor network product safety whether, it is carried out attack test is a kind of effective ways, and this helps to find fast safety problem, to promote the raising of its security assurance information ability.
At present, although exist multiple routing mechanism to wireless sensor network to implement the method for attack test, as select forwarding attack, fall into the hole attack, Sybil attack, worm hole attack etc., there is not yet the method for testing that routing table is directly attacked.
Summary of the invention
The present invention is in order to overcome the shortcoming of above-mentioned technical problem, provide a kind of can be applicable to routing node to center networking node, sensor node to center networking node and the sensor node attack testing method to the routing table security of wireless sensor network of route node.
The attack testing method of routing table security of wireless sensor network of the present invention, its special feature is may further comprise the steps: a. at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument; B. the configuration testing routing node according to the channel number that obtains among the step a and PANID number, disposes one and has the test routing node that adds network capabilities to be measured; C. will test routing node and place network to be measured; D. networking application, the identify label of obtaining the test routing node sends the networking request take this identify label as the basis to network to be measured, and the identify label of test routing node is different when guaranteeing that each request adds network to be measured; E. whether the networking among the determining step d is successful, such as the networking success, returns steps d; Unsuccessful such as networking, execution in step f; F. attack test finishes.Channel information and the PANID network number in order to obtain network to be measured among the step a, in order to dispose the test routing node that can add network to be measured by step b; The effect of step c is to make the test routing node possess the condition that adds network to be measured; In the process of each networking request, the test routing node all adopts different identify labels in the steps d.When the fail safe of wireless sensor network routing table to be tested is estimated, maybe can only carry out networking and the routing table of limited number of time and do not overflow if the test routing node can not carry out networking, the fail safe that represents the wireless sensor network routing table is higher; If the routing table overflow of center networking node, the fail safe that then represents the wireless sensor network routing table is relatively poor.
The attack testing method of routing table security of wireless sensor network of the present invention, described steps d may further comprise the steps: (d-1). at first transfer the identify label of test routing node; (d-2). the identify label that obtains is added 1 also as the identify label of testing routing node; (d-3). the test routing node adds network to be measured with the identify label request in the step (d-2).By the identify label of test routing node is added 1, so that it all has different identify labels when each request adds network to be measured.Add 1 number of times by calculating identify label, be conducive to the fail safe of wireless sensor network routing table is analyzed.
The attack testing method of routing table security of wireless sensor network of the present invention utilizes GetAddress () function to obtain and return the identify label of self in the described steps d.The effect of GetAddress () function is to transfer the identify label of self and add 1 in this identify label, thereby returns a new identify label.
The attack testing method of routing table security of wireless sensor network of the present invention, described step b, the test routing node of configuration comprises the CC2430 chip.CC2430 is a System on Chip/SoC, and the 2.4GHz ISM wave band that it can satisfy take ZigBee as the basis is used, and it combines a high-performance 2.4GHz DSSS radio-frequency (RF) transceiver core and small and exquisite efficient 8051 controllers of technical grade.
The attack testing method of routing table security of wireless sensor network of the present invention, the criterion of networking success is that the routing table of center networking node is not overflowed among the described step e; The unsuccessful criterion of networking is the routing table overflow of center networking node.Because the memory space of routing table is certain, if network routing security to be measured is relatively poor, after repeatedly networking request and distribution address, routing table will be overflowed.
In wireless sensor network, if the node of sensor node as the transmission request, just can carry out sensor node center networking node and sensor node are tested the routing table security of route node, its testing procedure is as follows:
(1). at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument; (2). the configuration testing sensor node, according to the channel number that obtains in the step (1) and PANID number, dispose one and have the testing sensor node that adds network capabilities to be measured; (3). the testing sensor node is placed network to be measured; (4). the networking application, the identify label of obtaining the testing sensor node sends networking request as basic to routing node or center networking node take this identify label, and guarantees that the identify label of each request adding routing node or center networking node is different; (5). whether the networking in the determining step (4) is successful, such as the networking success, returns step (4); Unsuccessful such as networking, execution in step (6); (6). attack test finishes.
The invention has the beneficial effects as follows: the present invention has the test routing node (or testing sensor node) that adds network capabilities to be measured by configuration, namely effectively realized the attack test to routing table security of wireless sensor network, also wireless sensor network security has been had higher requirement.
Description of drawings
Fig. 1 is the flow chart that routing node adds wireless sensor network;
Fig. 2 is the program flow diagram of embodiment among the present invention.
Embodiment
The invention will be further described below in conjunction with accompanying drawing and embodiment.
If wireless sensor network will be realized routing mechanism, then networking node in center must allow routing node to add network, and this process is to add its routing table by the identify label with routing node to realize.The process of center networking node permission routing node adding network as shown in Figure 1.After routing node sends route requests to center networking node, networking node in center judges at first whether the routing node that sends connection request is a node that has been present in the routing table, if then again for it distributes a short address, and send " connection response " order.Otherwise, illustrate that the node that sends connection request is a new node.At this moment, networking node in center will judge whether the route entry of the routing table of self has reached the upper limit, if reach, illustrates that then networking node in center can't allow new node to add, and this moment, it can send the adding of command reject (CMDR) new node; Otherwise networking node in center can add routing table entry with the longways location of new node, and sends " connection response " order.
As can be seen from Figure 1, after the routing table of center networking node is full, then can not allow new routing node to add network.Utilize this point, we can allow a test routing node constantly add the network that networking node in center forms, and adding fashionable fixed amount of identify label increase with oneself at every turn, cause center networking node that it is judged as a new routing node, and new identify label is added its routing table.When the test routing node repeats said process, can cause at short notice the routing table overflow of center networking node, cause new legal routing node can't add network, thereby destroyed the extensibility of network fully.
As shown in Figure 2, provided the flow chart of the attack testing method of routing table security of wireless sensor network of the present invention, it may further comprise the steps:
A. at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument;
B. the configuration testing routing node according to the channel number that obtains among the step a and PANID number, disposes one and has the test routing node that adds network capabilities to be measured; The test routing node can dispose by the CC2430 chip;
C. will test routing node and place network to be measured; Make the test routing node possess the condition that adds network to be measured;
D. networking application, the identify label of obtaining the test routing node sends the networking request take this identify label as the basis to network to be measured, and the identify label of test routing node is different when guaranteeing that each request adds network to be measured; Can realize by following three steps in this step: (d-1). at first transfer the identify label of test routing node; (d-2). the identify label that obtains is added 1 also as the identify label of testing routing node; (d-3). the test routing node adds network to be measured with the identify label request in the step (d-2);
E. whether the networking among the determining step d is successful, such as the networking success, returns steps d; Unsuccessful such as networking, execution in step f; In this step, the criterion of networking success is that the routing table of center networking node is not overflowed; The unsuccessful criterion of networking is the routing table overflow of center networking node;
F. attack test finishes.
In above-mentioned steps d, if in the system of test routing node GetAddress () function is arranged, can obtain former identity mark and obtain new identify label by GetAddress () function.
After in network design environment to be measured, opening the test routing node, this test routing node can repeatedly add network, and because its each network that adds all adopts new identify label, can cause center networking node that these signs are all added in its routing table, and after center networking node sends " refusal add " order, mean that then its routing table overflowed, at this moment, the extensibility of network is destroyed fully, and new routing node can't add network.
What the above provided comes the safety detection of the routing table of inspection center's organization node also to may be used on by sensor node to center networking node or by the detection of sensor node to the routing table security of route node, it can be realized by following steps by the test routing node:
(1). at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the PANID number of this network by the protocal analysis instrument; (2). the configuration testing sensor node, according to the channel number that obtains in the step (1) and PANID number, dispose one and have the testing sensor node that adds network capabilities to be measured; (3). the testing sensor node is placed network to be measured; (4). the networking application, the identify label of obtaining the testing sensor node sends networking request as basic to routing node or center networking node take this identify label, and guarantees that the identify label of each request adding routing node or center networking node is different; (5). whether the networking in the determining step (4) is successful, such as the networking success, returns step (4); Unsuccessful such as networking, execution in step (6); (6). attack test finishes.

Claims (6)

1. the attack testing method of a routing table security of wireless sensor network is characterized in that may further comprise the steps:
A. at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the network number of this network by the protocal analysis instrument;
B. the configuration testing routing node according to the channel number that obtains among the step a and network number, disposes one and has the test routing node that adds network capabilities to be measured;
C. will test routing node and place network to be measured;
D. networking application, the identify label of obtaining the test routing node sends the networking request take this identify label as the basis to network to be measured, and the identify label of test routing node is different when guaranteeing that each request adds network to be measured;
E. whether the networking among the determining step d is successful, such as the networking success, returns steps d; Unsuccessful such as networking, execution in step f;
F. attack test finishes.
2. the attack testing method of routing table security of wireless sensor network according to claim 1, it is characterized in that: described steps d may further comprise the steps:
(d-1). at first transfer the identify label of test routing node;
(d-2). the identify label that obtains is added 1 also as the identify label of testing routing node;
(d-3). the test routing node adds network to be measured with the identify label request in the step (d-2).
3. the attack testing method of routing table security of wireless sensor network according to claim 1 and 2 is characterized in that: utilize GetAddress () function to obtain and return the identify label of self in the described steps d.
4. the attack testing method of routing table security of wireless sensor network according to claim 1 and 2, it is characterized in that: described step b, the test routing node of configuration comprises the CC2430 chip.
5. the attack testing method of routing table security of wireless sensor network according to claim 1 is characterized in that: the criterion of networking success is that the routing table of center networking node is not overflowed among the described step e; The unsuccessful criterion of networking is the routing table overflow of center networking node.
6. the attack testing method of a routing table security of wireless sensor network is characterized in that may further comprise the steps:
(1). at first, utilize the sniffer instrument to obtain the wireless signal of wireless sensor network to be measured, and obtain channel number and the network number of this network by the protocal analysis instrument;
(2). the configuration testing sensor node, according to the channel number and the network number that obtain in the step (1), dispose one and have the testing sensor node that adds network capabilities to be measured;
(3). the testing sensor node is placed network to be measured;
(4). the networking application, the identify label of obtaining the testing sensor node sends networking request as basic to routing node or center networking node take this identify label, and guarantees that the identify label of each request adding routing node or center networking node is different;
(5). whether the networking in the determining step (4) is successful, such as the networking success, returns step (4); Unsuccessful such as networking, execution in step (6);
(6). attack test finishes.
CN201110040492.3A 2011-02-18 2011-02-18 Attack testing method of routing table security of wireless sensor network Expired - Fee Related CN102083061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110040492.3A CN102083061B (en) 2011-02-18 2011-02-18 Attack testing method of routing table security of wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110040492.3A CN102083061B (en) 2011-02-18 2011-02-18 Attack testing method of routing table security of wireless sensor network

Publications (2)

Publication Number Publication Date
CN102083061A CN102083061A (en) 2011-06-01
CN102083061B true CN102083061B (en) 2013-03-20

Family

ID=44088776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110040492.3A Expired - Fee Related CN102083061B (en) 2011-02-18 2011-02-18 Attack testing method of routing table security of wireless sensor network

Country Status (1)

Country Link
CN (1) CN102083061B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102209325B (en) * 2011-06-02 2013-07-10 安徽南瑞继远软件有限公司 Authentication method based on ZigBee network
CN109195159B (en) * 2018-08-23 2021-11-09 中国联合网络通信集团有限公司 Addressing test method, device and system for sensor gateway

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043384A (en) * 2006-05-25 2007-09-26 华为技术有限公司 System and method for network test
CN101072135A (en) * 2007-06-29 2007-11-14 杭州华三通信技术有限公司 Wireless LAN testing method and system
EP1871045A1 (en) * 2006-06-19 2007-12-26 NTT DoCoMo Inc. Detecting and bypassing misbehaving nodes in distrusted ad hoc networks
CN101945016A (en) * 2009-07-09 2011-01-12 中兴通讯股份有限公司 Method and device for testing stability of device webmaster

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043384A (en) * 2006-05-25 2007-09-26 华为技术有限公司 System and method for network test
EP1871045A1 (en) * 2006-06-19 2007-12-26 NTT DoCoMo Inc. Detecting and bypassing misbehaving nodes in distrusted ad hoc networks
CN101072135A (en) * 2007-06-29 2007-11-14 杭州华三通信技术有限公司 Wireless LAN testing method and system
CN101945016A (en) * 2009-07-09 2011-01-12 中兴通讯股份有限公司 Method and device for testing stability of device webmaster

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种可扩展的分布式网络攻击测试系统;宇佳 等;《计算机应用》;20060901;第26卷(第9期);全文 *
宇佳 等.一种可扩展的分布式网络攻击测试系统.《计算机应用》.2006,第26卷(第9期),

Also Published As

Publication number Publication date
CN102083061A (en) 2011-06-01

Similar Documents

Publication Publication Date Title
CN103208204B (en) Parking lot stall monitoring system based on radio frequency identification technology and working method
CN105788355B (en) A kind of parking stall monitoring System and method for based on Beacon technology
JP2011504865A5 (en)
CN105208132A (en) Intelligent terminal cloud management system
CN105021917B (en) A kind of status of electric power detection method based on IPV6 mobile terminals and RFID label tag
RU2011125590A (en) METHOD FOR PREVENTING AND IDENTIFYING MOBILE DEVICES AND FORECASTING AND NOTIFICATION SYSTEM FOR IDENTIFICATION OF MOBILE DEVICES
CN107925893A (en) Radio environment information collection system and method
CN104854472A (en) Position location system architecture: messaging and ranging links
CN107730955A (en) Reverse car seeking method and device based on electronic license plate
ATE489810T1 (en) DYNAMIC FAULT ANALYSIS FOR A CENTRALLY MANAGED NETWORK ELEMENT IN A TELECOMMUNICATIONS SYSTEM
CN107992919A (en) The method of RFID quick countings
CN105227365A (en) Based on the internet-of-things terminal managing and control system of Android platform
CN108924759A (en) Identify the method, apparatus and system of mobile generator
CN110267268A (en) The recognition methods of pseudo-base station, apparatus and system
CN102158551B (en) Information source unified description and access method for Internet of things
CN102083061B (en) Attack testing method of routing table security of wireless sensor network
EP2592875A1 (en) Method and apparatus to select an access point
Chen et al. Design and implementation of a ZigBee-based wireless automatic meter reading system
CN104030121B (en) A kind of elevator safety operation data coupling devices and method of work
CN101252477B (en) Determining method and analyzing apparatus of network fault root
CN102457903A (en) Access control method for accessing wireless sensor network to telecommunication network by multiple gateways and apparatus thereof
WO2022029415A1 (en) Identifying wireless network devices
CN205210973U (en) System is examined to equipment point
CN109451511A (en) Driver test system and method based on 1800M electric power wireless communication private network
CN102737207B (en) Communication method based on radio frequency identification system, apparatus and system thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130320