CN103533548A - Deception congestion attack resisting method for timeslot ALOHA wireless network - Google Patents

Deception congestion attack resisting method for timeslot ALOHA wireless network Download PDF

Info

Publication number
CN103533548A
CN103533548A CN201310469461.9A CN201310469461A CN103533548A CN 103533548 A CN103533548 A CN 103533548A CN 201310469461 A CN201310469461 A CN 201310469461A CN 103533548 A CN103533548 A CN 103533548A
Authority
CN
China
Prior art keywords
time slot
deception
base station
assailant
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310469461.9A
Other languages
Chinese (zh)
Other versions
CN103533548B (en
Inventor
郑迪
严勇
杨薇
刘小飞
张恒飞
苏培芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changjiang Institute of Survey Planning Design and Research Co Ltd
Original Assignee
Changjiang Institute of Survey Planning Design and Research Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changjiang Institute of Survey Planning Design and Research Co Ltd filed Critical Changjiang Institute of Survey Planning Design and Research Co Ltd
Priority to CN201310469461.9A priority Critical patent/CN103533548B/en
Publication of CN103533548A publication Critical patent/CN103533548A/en
Application granted granted Critical
Publication of CN103533548B publication Critical patent/CN103533548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a deception congestion attach resisting method for a timeslot ALOHA wireless network. The method comprises the following steps of (1) sensing the occurrence of a congestion attack in the network; (2) determining the direction of a deception congestion attacker; (3) forming wave beams in a specified shape to isolate the attacker outside a communication channel according to the direction of the deception congestion attacker by using a base station. According to the method, broadband and narrowband deception congestion attacks can be effectively coped with; the method is transparent to a terminal, a protocol and hardware of the terminal are not required to be changed, and influence on a normal terminal is limited to a narrow area in a direction the same as that of the deception congestion attacker relative to the base station in a cell; intelligent antennae are widely used for base stations in a conventional wireless communication network, so that the requirement of arrangement of an intelligent antenna on the base station can be more easily met in practice.

Description

In time slot A LOHA wireless network, anti-deception type blocks attack method
Technical field
The invention belongs to secure wireless communication technical field, be specifically related to time slot A LOHA network, intelligent antenna technology, anti-deception type obstruction attack method.
Background technology
Channel in wireless communication system is shared by a plurality of users and easily access, therefore subjects to block to attack.Block to attack the destruction of network is usually expressed as: the signal that the signal that (1) sends disturbs normal terminal to send, causing it can not be correctly received; (2) make normal terminal can not send information because detecting channel busy; (3) make the long-time monitor channel of normal terminal, finally cause its power supply to exhaust.Blocking and attack and can produce huge destruction to network, is common attack form, and therefore how taking precautions against obstruction attack is unavoidable problem in any wireless communication system design.It is to block a typical class in attack that deception type blocks attack, and such attacks the bit stream that promoter sends simulation normal user data continuously, makes its data at media access control layer, show as the successive frame of normal users transmission, has the feature that is difficult for being identified.
As classical medium access control layer protocol, when time slot A LOHA is applied to wireless network, be also faced with and block the threat of attacking, available technology adopting comprehensive statistics is analyzed received signal strength indicator (Received Signal Strength Indicator), carrier sense duration (Carrier Sense Time) and frame and is sent the indexs such as success rate (Packet Delivery Ratio), can effectively detect blocking in time slot A LOHA wireless network to attack.
But the method that can defend obstruction to attack in ALOHA wireless network is but very limited, and all has obvious defect.The strategy that low duty ratio method adopts is when blocking attack generation, increases the dormancy time of normal terminal, thereby avoids its limited power supply victim to exhaust.But this scheme cannot be applied to the scene (as disaster monitoring, intrusion detection etc.) of time-sensitive.And the method for frequency hopping/direct sequence spread spectrum need to increase communication terminal device complexity, and can not successfully manage broadband obstruction attack.
Summary of the invention
The object of the invention is in order to overcome above-mentioned defect and deficiency, provide a kind of and can not change terminal communication mode, do not increase terminal hardware complexity, and can effectively suppress deception type in time slot A LOHA wireless network and block the feasible method of attacking.
For achieving the above object, in the time slot A LOHA wireless network of the present invention's design, anti-deception type blocks attack method, take intelligent antenna technology as basis, comprise the following steps: (1), base station are to blocking detecting of attacking in time slot A LOHA wireless network, if find to block to attack, enter step (2), otherwise continue detecting; (2), base station judges that deception type blocks assailant's direction of living in; (3), base station blocks assailant's direction according to deception type, form and deliberately evade the wave beam of these directions, thereby obstruction assailant is isolated in outside communication channel.The precondition of this method application is that smart antenna has been equipped in base station.Do not use the method and use the network contrast of the method to see Fig. 1.
In the step of technique scheme (2), the concrete grammar of judging deception type obstruction assailant direction of living in is: base station media access control layer and physical layer are by the mode interactive information of cross-layer, adding up the direction of arrival of terminal signaling in each time slot base station, is that deception type blocks the residing direction of assailant by the direction determining of differentiating each time slot in window in one period and receive signal.
Further, in the step of technique scheme (2), the media access control layer of each time slot base station sends a DoA Request(Direction of Arrival Request by name to physical layer, direction of arrival request) message, request physical layer provides current time to the transmit estimated value of direction of arrival of terminal, physical layer is received after this message, by the numerical value of the terminal signaling direction of arrival quantity estimating and each direction of arrival with DoA Info(Direction of Arrival Information, direction of arrival information) form of message feeds back to media access control layer at same time slot, this layer received the direction of arrival of recording all signals of this time slot after feedback, after a plurality of continuous slots (differentiation window), media access control layer is according to the data of record, by the direction determining of differentiating each time slot in window in during this period of time and receive signal, be that deception type blocks the residing direction of assailant, and this result of determination is passed through to Jammer Info(Jammer Information, obstruction assailant information) message sends to physical layer.
Again further, in technique scheme, by increase, differentiate the size (differentiating the quantity of the contained continuous slot of window) of window, improve the differentiation accuracy rate of described obstruction assailant direction of living in.
The inventive method is transparent to terminal, neither needs to change its agreement, does not also need to increase its hardware complexity, only have influence in community with deception type block assailant with respect to base station in unidirectional normal users.Its required smart antenna is widely used at present in cordless communication network, as at TD-SCDMA(Time Division Synchronous Code Division Multiple Access, TD SDMA access) smart antenna has just been equipped in the base station in network.
The algorithm that the estimation of signal direction of arrival and wave beam form is all very ripe.Calculating and emulation show, in the situation that the attack of network internal congestion is deception type, if the estimation of signal direction of arrival accurately, the size that step (2) is differentiated window by increase can be increased to the accuracy rate of judging deception type obstruction assailant orientation to approach 100%, and does not exist and fail to judge.
Accompanying drawing explanation
Fig. 1 a is not for applying the network service schematic diagram of the inventive method;
Fig. 1 b is the network service schematic diagram of application the inventive method;
Fig. 2 is base station media access control layer and physical layer interaction diagrams in step of the present invention (2);
Fig. 3 under different sending probabilities, the determination rate of accuracy of step (2) and the graph of a relation of differentiating window size.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail:
In time slot A LOHA wireless network, anti-deception type blocks attack method, comprises the following steps:
(1), by comprehensive statistics, analyze received signal strength indicator, carrier sense duration and frame sends the indexs such as success rate, to blocking in time slot A LOHA wireless network to attack, detect;
(2), judge that deception type blocks assailant's direction of living in, comprise as shown in Figure 2 following message interaction flow: the media access control layer of each time slot base station sends the message of a DoA Request to physical layer, request physical layer provides current time to the transmit estimated value of direction of arrival of terminal.Physical layer is received after this message, use MUSIC(MUltiple SIgnal Classification, multiple signal classification) etc. ripe algorithm estimates the numerical value of current terminal signaling direction of arrival quantity and each direction of arrival, and (guarantee that media access control layer receive at same time slot) feeds back to media access control layer by these information with the form of DoA Info message in time.Receive after feedback, media access control layer is recorded the direction of arrival of all signals of this time slot.After T continuous slot (differentiation window), media access control layer is according to the data of record, by the direction determining that interior each time slot receives signal during this period of time, be that deception type blocks the residing direction of assailant, and this result of determination is sent to physical layer by Jammer Info message.
If do not determine assailant's direction according to above-mentioned flow process, show that the assailant in network is not deception type.
(3), determine that, after deception type obstruction assailant's direction, physical layer adopts the ripe algorithm formation such as LMS (Least Mean Square, lowest mean square) to evade the wave beam of above direction, thereby obstruction assailant is isolated in outside communication channel.
The checking that the accuracy rate of the inventive method is carried out:
By increase, differentiate the size of window, can improve the differentiation accuracy rate of blocking assailant's direction of living in above step (2).For example, in a time slot A LOHA network that has a N normal terminal, setting size is the differentiation window of T time slot, and the probability of a frame of each time slot transmission of each normal terminal is p, and the probability that does not send frame is 1-p.In the situation that obstruction assailant is deception type, if the estimation of signal direction of arrival is accurate and assailant's not change of position in differentiating window, the accuracy rate of step 2 court verdict, p 0, can be by (1-p t) ncalculate.As shown in Figure 3, for a time slot A LOHA network that has 5 normal terminal, when p is respectively 0.05,0.1,0.2 o'clock, as long as T is more than or equal to 5, the differentiation accuracy rate of blocking assailant's direction of living in approached 100%.
Other unspecified part is prior art.

Claims (4)

1. in time slot A LOHA wireless network, anti-deception type blocks attack method, it is characterized in that comprising the following steps:
(1), to detecting of block attacking in time slot A LOHA wireless network, if find to block to attack, enter step (2), otherwise continue detecting;
(2), judge that deception type blocks the orientation of the relative base station of assailant;
(3), determine that the wave beam that orientation Hou, base station that deception type blocks assailant forms given shape is isolated in obstruction assailant outside communication channel.
2. in time slot A LOHA wireless network according to claim 1, anti-deception type blocks attack method, it is characterized in that the method for judging deception type obstruction assailant orientation of living in is: in being equipped with the base station of smart antenna, media access control layer and physical layer are by the mode interactive information of cross-layer, add up the direction of arrival of the terminal signaling that each time slot base station receives, the direction determining that each time slot in one period is received to signal is that deception type blocks the residing direction of assailant.
3. in time slot A LOHA wireless network according to claim 2, anti-deception type blocks attack method, it is characterized in that, described media access control layer and physical layer by the method for the mode interactive information of cross-layer are: the media access control layer of each time slot base station sends the message of a DoA Request by name to physical layer, request physical layer provides current time to the transmit estimated value of direction of arrival of terminal, physical layer is received after this message, estimate the numerical value of current terminal signaling direction of arrival quantity and each direction of arrival, and with the form of DoA Info message in same time slot internal feedback to media access control layer, this layer received the direction of arrival of recording all signals of this time slot after feedback, through some continuous slots, differentiate after window, media access control layer is according to recorded, the direction determining that each time slot in this period is all received to signal is that deception type blocks the residing direction of assailant, and this result of determination is informed to physical layer by Jammer Info message.
4. in time slot A LOHA wireless network according to claim 3, anti-deception type blocks attack method, it is characterized in that: the size of differentiating window by increasing time slot differentiates the quantity of the contained time slot of window, improves the differentiation accuracy rate that described deception type blocks the relative base station of assailant direction of living in.
CN201310469461.9A 2013-10-09 2013-10-09 Anti-deception type block attacks method in CDMA slotted ALOHA wireless network Active CN103533548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310469461.9A CN103533548B (en) 2013-10-09 2013-10-09 Anti-deception type block attacks method in CDMA slotted ALOHA wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310469461.9A CN103533548B (en) 2013-10-09 2013-10-09 Anti-deception type block attacks method in CDMA slotted ALOHA wireless network

Publications (2)

Publication Number Publication Date
CN103533548A true CN103533548A (en) 2014-01-22
CN103533548B CN103533548B (en) 2016-06-29

Family

ID=49935139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310469461.9A Active CN103533548B (en) 2013-10-09 2013-10-09 Anti-deception type block attacks method in CDMA slotted ALOHA wireless network

Country Status (1)

Country Link
CN (1) CN103533548B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494484A (en) * 2008-01-24 2009-07-29 中兴通讯股份有限公司 Downlink beam forming method
US20090325478A1 (en) * 2007-11-20 2009-12-31 National Tsing Hua University Mobile jamming attack method in wireless sensor network and method defending the same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090325478A1 (en) * 2007-11-20 2009-12-31 National Tsing Hua University Mobile jamming attack method in wireless sensor network and method defending the same
CN101494484A (en) * 2008-01-24 2009-07-29 中兴通讯股份有限公司 Downlink beam forming method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JALEL BEN-OTHMAN,ALI HAMIEH: "Defending Method Against Jamming Attack in Wireless Ad Hoc Networks", 《IEEE》 *
买那: "定向MAC协议提高无线局域网的性能", 《万方数据库》 *
买那: "定向MAC协议提高无线局域网的性能", 《中国学位论文全文数据库》 *

Also Published As

Publication number Publication date
CN103533548B (en) 2016-06-29

Similar Documents

Publication Publication Date Title
US11933874B2 (en) Electronic device for performing ranging by using ultra-wideband in wireless communication system, and method of operating the electronic device
Xiao et al. AmpN: Real-time LOS/NLOS identification with WiFi
Spuhler et al. Detection of reactive jamming in DSSS-based wireless communications
US11330434B2 (en) Security detection for a physical layer authentication system that considers signal-discriminating capability of an active adversary
Xu et al. TRIEDS: Wireless events detection through the wall
Cheng et al. Time series analysis for jamming attack detection in wireless networks
US20200169883A1 (en) Security Detection Method for Physical Layer Authentication System
de Lima Pinto et al. A machine learning approach for detecting spoofing attacks in wireless sensor networks
CN102595411B (en) Sensor-based method for detecting various attacks in cognitive radio network
CN103795479A (en) Cooperative spectrum sensing method based on characteristic values
Cai et al. Joint reactive jammer detection and localization in an enterprise WiFi network
CN101615926A (en) Asynchronous cooperation frequency spectrum sensing method in the cognitive radio
Caso et al. Cooperative Spectrum Sensing based on Majority decision under CFAR and CDR constraints
CN110601745A (en) Unmanned aerial vehicle communication method of communication/ranging dual system
Gu et al. Attack-aware synchronization-free data timestamping in lorawan
CN114222202A (en) Environment self-adaptive activity detection method and system based on WiFi CSI
Li et al. Dynamic spectrum tracking using energy and cyclostationarity-based multi-variate non-parametric quickest detection for cognitive radios
O’Mahony et al. Identifying distinct features based on received samples for interference detection in wireless sensor network edge devices
CN109348503A (en) A kind of monitor method of wireless communication link, device, equipment and system
Sutton et al. Modelling capture effect for 802.11 DCF under Rayleigh fading
Paso et al. Feasibility study of ieee 802.15. 4e dsme utilizing ir-uwb and s-aloha
Long et al. A mechanism for detecting session hijacks in wireless networks
CN103533548A (en) Deception congestion attack resisting method for timeslot ALOHA wireless network
Choi et al. Simultaneous crowd estimation in counting and localization using WiFi CSI
Gu et al. Secure data timestamping in synchronization-free lorawan

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant