CN103619011A - Method for tolerating malicious nodes in wireless sensor network - Google Patents

Method for tolerating malicious nodes in wireless sensor network Download PDF

Info

Publication number
CN103619011A
CN103619011A CN201310597049.5A CN201310597049A CN103619011A CN 103619011 A CN103619011 A CN 103619011A CN 201310597049 A CN201310597049 A CN 201310597049A CN 103619011 A CN103619011 A CN 103619011A
Authority
CN
China
Prior art keywords
node
time
sensor network
tolerance
wireless sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310597049.5A
Other languages
Chinese (zh)
Other versions
CN103619011B (en
Inventor
姜禹
黄杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310597049.5A priority Critical patent/CN103619011B/en
Publication of CN103619011A publication Critical patent/CN103619011A/en
Application granted granted Critical
Publication of CN103619011B publication Critical patent/CN103619011B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for tolerating malicious nodes in a wireless sensor network. According to the method for tolerating the malicious nodes in the wireless sensor network, a traditional safety protection method based on an encryption model, an authentication model and a trust model is changed, and an active protection method which is achieved in a mode of actively destroying the malicious nodes is adopted to achieve the purpose of attack tolerance. The energy of the malicious nodes is consumed by transmitting nonsignificant data in the network, in an attack tolerance state, normal nodes generate energy consumption only when data are sent, the malicious nodes are in a radio frequency working state all the time, and small energy consumption of all the normal nodes is exchanged for the large energy consumption of the malicious nodes so that the malicious node can not work. By the adoption of the method for tolerating the malicious nodes in the wireless sensor network, the malicious nodes are effectively prevented on the premise that the normal data communication of the wireless sensor network is guaranteed, and a new idea is provided for the safety communication of the wireless sensor network.

Description

Malicious node tolerance method in a kind of wireless sensor network
Technical field
The malicious node the present invention relates in a kind of wireless sensor network is attacked tolerance method, belongs to radio communication and network safety filed.
Background technology
In recent years, along with the development of transducer, computer, radio communication, the technology such as micro electronmechanical with mutually merge, produced wireless sensor network (WSN:wireless sensor networks), people finally can Real-Time Monitoring external environment condition, realizes on a large scale, the information gathering of automation.WSN has broad application prospects in military and civilian fields such as military surveillance, environmental monitoring, medical monitoring, space exploration, urban traffic control, warehousing managements.
Wireless sensor network is comprised of a large amount of energy contents of battery, computing capability, storage capacity, the limited sensor node of communication capacity.For example, if network node uncontrollable (, enemy region of war) or WSN are in large scale, node will be arranged by the mode of broadcasting sowing at random so.Because WSN is radio communication, assailant is monitor channel in the task domain of this network easily, in channel, injects bit stream, the packet listening to before resetting.In addition, if transducer random placement at unattended space outerpace, assailant can catch this node easily, rewrite internal memory, or substitute this node with the transducer of oneself, by pretending to be to obtain data message.
But WSN, due to the restriction of own resource and computing capability, causes its safety ratio common computer network security to face more stern challenge.Therefore, need more effectively safety precaution mechanism.
At present, malicious node in some wireless sensor network models is that energy and resource are unrestricted by hypothesis, but this hypothesis is often false in actual application scenario, at real wireless senser, lay under scene, infinite energy and resource may realize hardly, and this is only applicable to the scene of cable network.Therefore, for malicious node, the same situation about cannot work when depleted of energy that exists.
The attack pattern of malicious node in sensor network comprises selects forwarding, altered data, playback and dos attack etc., malicious node is if carry out above-mentioned attack, in network, there is data packet transmission, must guarantee that radio circuit is in running order, otherwise cannot reach it, attack object.The operating time of the radio circuit of malicious node determines its life cycle, makes for a long time malicious node work in radio-frequency receiving-transmitting state and exhausts rapidly to reach by its energy the object that tolerance is attacked.
For wireless sensor node, the consumption of its energy is mainly at control circuit and radio circuit, and the power consumption of radio circuit under transmitting or accepting state is generally 3~6 times of control circuit.How effectively to make wireless sensor node coordinate the resting state (closing radio circuit) in its work, make the key that guarantees that the whole Chief Web Officer time is effectively moved.
Summary of the invention
Technical problem: in order to overcome the deficiencies in the prior art, the present invention proposes the malicious node tolerance method in a kind of wireless sensor network, operational characteristics for malicious node, normal node in wireless sensor network is worked under amended network communication protocol, the energy of malicious node is exhausted rapidly, reach the object of tolerance and destruction malicious node.
Technical scheme: for achieving the above object, the technical solution used in the present invention is:
A malicious node tolerance method in wireless sensor network, comprises the steps:
(1) base station sends and attacks tolerance order to the whole network, and this command messages transmits in network in the mode of flooding, and the normal node in each sensor network is prepared to enter from normal operating conditions the tolerance state of attacking after receiving this order;
(2) normal node i (i=1,2 ... N) enter and attack tolerance state, N represents the node number in wireless sensor network.Node i is set respectively two timer T i1and T i2, and a random wake-up times W i, W wherein iaccording to the attack interstitial content in network, determine, when attack node is uncertain, set W i=3, W ialong with the increase of the attack interstitial content in network, increase T i1represent that node i enters the total time of attacking tolerance state, T i2represent the time that node i is waken up for the first time, and T i1> W it i2;
(3) node i is closed radio circuit, and according to T i1the time of setting enters park mode, when dormancy time reaches T i2time, radio circuit is waken and opened to node i up, and send random data bag D to network.After packet D is sent completely, W i=W i-1, T i1=T i1-T i2, node i recalculates T i2meet T i1> W it i2, and set T i1and T i2;
(4) repeating step (3), until W i=0, node i is closed radio circuit, and according to T i1the time of setting enters park mode;
(5) when dormancy time reaches T i1time, radio circuit is waken and opened to node i up, reenters normal operating conditions.
Malicious node tolerance method in described wireless sensor network can be used under the state of sensor network normal operation, and all nodes of sensor network are periodically at normal operating conditions S nwith attack tolerance state S talternately lower.Determined the requirement of real-time property by sensor network cycle time alternately, the higher S of requirement of real-time ntime be greater than S ttime, otherwise, S ttime be greater than S ntime.
Described in normal operating conditions S nwith attack tolerance state S tunder time can when netinit, set, the variation that also can require according to real-time property be adjusted in real time.
Malicious node tolerance method in described wireless sensor network at all-network node in attacking tolerance state S tunder, do not carry out the mutual of data and routing iinformation.
Malicious node tolerance method in described wireless sensor network, in the exigent network to real-time property, can adopt the method for sub-clustering to realize.Each bunch be independent operating malicious node tolerance method respectively, node by bunch head to own place bunch sends the method that tolerance order and then each bunch of interior nodes are moved complete attack tolerance of attacking, each bunch of head is still in normal operating conditions, receive and buffer memory from data or the route requests on upper strata, when this bunch enters normal operating conditions and bunch interior nodes carry out data interaction.
The method of described sub-clustering realizes in the malicious node tolerance method in wireless sensor network, and bunch head in each bunch need to carry out a bunch great wheel according to the energy of self and resource situation and change, and guarantees the balance of node energy and resource.
Malicious node tolerance method in described wireless sensor network can be used in conjunction with the intrusion detection method of malicious node, when intrusion detection method does not detect malicious node, and the state work of remaining stationary of all nodes in sensor network; When intrusion detection method detects malicious node, sensor network enters normal operating conditions and attacks replacing of tolerance state.Along with the eliminating of malicious node, network recovery is to former operating state.
Beneficial effect: the invention provides the malicious node tolerance method in wireless sensor network, changed and traditional take encryption, authentication and trust model as basic safety protecting method, adopted the mode of initiatively destroying malicious node to carry out initiatively protection and reach and attack the object of tolerating.By transmit nonsignificant data in network, consume the energy of malicious node, attacking under tolerance state, normal node is only in the just produce power consumption of the moment that sends data, and malicious node is always in radio frequency operation state, with the little energy consumption of all normal node exchange for malicious node macro-energy consumption so that its can not work.Guaranteeing, under the prerequisite of sensor network normal data communication, to have completed the effective protection to malicious node, for the secure communication of wireless sensor network provides new thinking.
Accompanying drawing explanation
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is the flow chart of the inventive method in Cluster Networks;
Fig. 3 is the working timing figure of normal node in the present invention;
Fig. 4 be in the present invention normal node in conjunction with the working timing figure of intrusion detection method;
Fig. 5 is for being used the node energy consumption figure after the inventive method.
Embodiment
Below in conjunction with accompanying drawing, the present invention is further described.
Be illustrated in figure 1 malicious node tolerance method in a kind of wireless sensor network flow chart in Cluster Networks, comprise the steps:
(1) base station sends and attacks tolerance order to the whole network, and this command messages transmits in network in the mode of flooding, and the normal node in each sensor network is prepared to enter from normal operating conditions the tolerance state of attacking after receiving this order;
(2) normal node i (i=1,2 ... N) enter and attack tolerance state, N represents the node number in wireless sensor network.Node i is set respectively two timer T i1and T i2, and a random wake-up times W i, W wherein iaccording to the attack interstitial content in network, determine, when attack node is uncertain, set W i=3, W ialong with the increase of the attack interstitial content in network, increase T i1represent that node i enters the total time of attacking tolerance state, T i2represent the time that node i is waken up for the first time, and T i1> W it i2;
(3) node i is closed radio circuit, and according to T i1the time of setting enters park mode, when dormancy time reaches T i2time, radio circuit is waken and opened to node i up, and send random data bag D to network.After packet D is sent completely, W i=W i-1, T i1=T i1-T i2, node i recalculates T i2meet T i1> W it i2, and set T i1and T i2;
(4) repeating step (3), until W i=0, node i is closed radio circuit, and according to T i1the time of setting enters park mode;
(5) when dormancy time reaches T i1time, radio circuit is waken and opened to node i up, reenters normal operating conditions.
The flow chart that is illustrated in figure 2 the malicious node tolerance method in a kind of wireless sensor network, comprises the steps:
(1) base station sends attack tolerance order to the leader cluster node of the whole network, and this command messages transmits in network in the mode of flooding, and the leader cluster node in each sensor network receives this order;
(2) each leader cluster node each sensor node to place bunch sends and attacks tolerance order, and the normal node in each bunch is prepared to enter attack tolerance state from normal operating conditions after receiving this order;
(3) bunch the normal node i in (i=1,2 ... N) enter the tolerance state of attacking, the node number in N represents bunch.Node i is set respectively two timer T i1and T i2, and a random wake-up times W i, W wherein iaccording to the attack interstitial content in this bunch, determine, when attack node is uncertain, set W i=3, W ialong with the increase of the attack interstitial content in network, increase T i1represent that node i enters the total time of attacking tolerance state, T i2represent the time that node i is waken up for the first time, and T i1> W it i2;
(4) node i is closed radio circuit, and according to T i1the time of setting enters park mode, when dormancy time reaches T i2time, radio circuit is waken and opened to node i up, and send random data bag D to network.After packet D is sent completely, W i=W i-1, T i1=T i1-T i2, node i recalculates T i2meet T i1> W it i2, and set T i1and T i2;
(5) repeating step (3), until W i=0, node i is closed radio circuit, and according to T i1the time of setting enters park mode;
(6) when dormancy time reaches T i1time, radio circuit is waken and opened to node i up, reenters normal operating conditions.
Be illustrated in figure 3 normal node and use the working timing figure of malicious node tolerance method of the present invention, as can be seen from the figure, normal node be take T as the cycle is in normal operating conditions with attack between tolerance state and replace, and wherein the time in normal operating conditions is T 1, in attacking the time of tolerance state, be T 2.T 1and T 2according to the situation of the actual application environment of sensor network and attack node, adjust T 2larger, better to the tolerance effect of malicious node, but the real-time of network data communication can decline.
Be illustrated in figure 4 that in the present invention, normal node is in conjunction with the working timing figure of intrusion detection method, as can be seen from the figure, normal node is carried out the intrusion detection of malicious node in normal operation simultaneously, and the time in this state is T 1, when having detected malicious node existence meeting informing base station or a bunch head, normal node all normal node are entered attack tolerance state, so T 1unfixing, if malicious node do not detected in network, normal node is always in normal operation and intrusion detection state so.Node is T in attacking the time of tolerance state 2, T 2for fixed value.Along with the eliminating of malicious node, network recovery is to former operating state.
In specific embodiment, in our assumed wireless sensor network, there are 100 normal node, there is 1 malicious node, malicious node is in the radio frequency coverage of 10% normal node, be that it can carry out data communication with 10 normal node, malicious node is received after the packet of normal node, can carry out twice forwarding.For the effect of the inventive method is described, need to quantize the energy consumption values of node.The CC2530 of take is example as sensor node master chip, suppose that its working clock frequency is 32MHz, the operating current of CPU is 6.5mA, the operating current that radio frequency reception is opened is 24.3mA, the operating current that radio-frequency transmissions is opened is 33.5mA, and the operating current of only opening a timer interruption under resting state is 90uA.
Node carries out work, T according to the normal node working timing figure shown in Fig. 3 1=1s, T 2=4s, and get W=3 respectively and W=30 tests, the observation 100s time, as shown in Figure 5, abscissa is the time to result, the s of unit, and ordinate is power consumption, the mAs of unit.As can be seen from the figure, the power consumption that curve of below is normal node is very little, therefore used method of the present invention to increase hardly the consumption of normal node energy, and two curves of top represent the power consumption of malicious node, its energy consumption is the hundred times of normal node, W is larger, and the energy consumption of malicious node is also faster.Along with the increase of operating time, use the inventive method can make the energy of malicious node consume fast, it cannot be operated, and for the more network of malicious node, the effect of the inventive method is better.
The above is only the preferred embodiment of the present invention; be noted that for those skilled in the art; under the premise without departing from the principles of the invention, can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (7)

1. the malicious node in wireless sensor network is attacked a tolerance method, it is characterized in that: the method comprises the steps:
1) base station sends and attacks tolerance order to the whole network, and this command messages transmits in network in the mode of flooding, and the normal node in each sensor network is prepared to enter from normal operating conditions the tolerance state of attacking after receiving this order;
2) normal node i enters the tolerance state of attacking, i=1, and 2 ... N, N represents the node number in wireless sensor network, node i is set respectively two timer T i1and T i2, and a random wake-up times W i, W wherein iaccording to the attack interstitial content in network, determine, when attack node is uncertain, set W i=3, W ialong with the increase of the attack interstitial content in network, increase T i1represent that node i enters the total time of attacking tolerance state, T i2represent the time that node i is waken up for the first time, and T i1> W it i2;
3) node i is closed radio circuit, and according to T i1the time of setting enters park mode, when dormancy time reaches T i2time, radio circuit is waken and opened to node i up, and send random data bag D to network, after packet D is sent completely, and W i=W i-1, T i1=T i1-T i2, node i recalculates T i2meet T i1> W it i2, and set T i1and T i2;
4) repeating step 3), until W i=0, node i is closed radio circuit, and according to T i1the time of setting enters park mode;
5) when dormancy time reaches T i1time, radio circuit is waken and opened to node i up, reenters normal operating conditions.
2. the malicious node in a kind of wireless sensor network according to claim 1 is attacked tolerance method, it is characterized in that: the method is used under the state of sensor network normal operation, and all nodes of sensor network are periodically at normal operating conditions S nwith attack tolerance state S talternately lower, by sensor network, the requirement of real-time property is determined the higher S of requirement of real-time the cycle time replacing ntime be greater than S ttime, otherwise, S ttime be greater than S ntime.
3. the malicious node in a kind of wireless sensor network according to claim 2 is attacked tolerance method, it is characterized in that: described in normal operating conditions S nwith attack tolerance state S tunder time when netinit, set, or adjust in real time according to the variation that real-time property requires.
4. the malicious node in a kind of wireless sensor network according to claim 1 is attacked tolerance method, it is characterized in that: the method in attacking under tolerance state, is not carried out the mutual of data and routing iinformation at all-network node.
5. the malicious node in a kind of wireless sensor network according to claim 1 is attacked tolerance method, it is characterized in that: the method, in the exigent network to real-time property, adopts the method for sub-clustering to realize; Each bunch be independent operating malicious node tolerance method respectively, node by bunch head to own place bunch sends the method that tolerance order and then each bunch of interior nodes are moved complete attack tolerance of attacking, each bunch of head is still in normal operating conditions, receive and buffer memory from data or the route requests on upper strata, when this bunch enters normal operating conditions and bunch interior nodes carry out data interaction.
6. the malicious node in a kind of wireless sensor network according to claim 5 is attacked tolerance method, it is characterized in that: the method for described sub-clustering realizes in the malicious node tolerance method in wireless sensor network, bunch head in each bunch need to carry out a bunch great wheel according to the energy of self and resource situation and change, and guarantees the balance of node energy and resource.
7. the malicious node in a kind of wireless sensor network according to claim 1 is attacked tolerance method, it is characterized in that the method is in conjunction with the intrusion detection method use of malicious node, when intrusion detection method does not detect malicious node, the state work of remaining stationary of all nodes in sensor network; When intrusion detection method detects malicious node, sensor network enters normal operating conditions and attacks replacing of tolerance state.Along with the eliminating of malicious node, network recovery is to former operating state.
CN201310597049.5A 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network Expired - Fee Related CN103619011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310597049.5A CN103619011B (en) 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310597049.5A CN103619011B (en) 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network

Publications (2)

Publication Number Publication Date
CN103619011A true CN103619011A (en) 2014-03-05
CN103619011B CN103619011B (en) 2016-08-03

Family

ID=50169715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310597049.5A Expired - Fee Related CN103619011B (en) 2013-11-21 2013-11-21 A kind of malicious node tolerance method in wireless sensor network

Country Status (1)

Country Link
CN (1) CN103619011B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080295170A1 (en) * 2002-04-29 2008-11-27 Microsoft Corporation Peer-to-peer name resolution protocol (pnrp) security infrastructure and method
CN102843672A (en) * 2012-08-08 2012-12-26 中国电力科学研究院 Malicious node detection method for sensing network based on energy fields

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080295170A1 (en) * 2002-04-29 2008-11-27 Microsoft Corporation Peer-to-peer name resolution protocol (pnrp) security infrastructure and method
CN102843672A (en) * 2012-08-08 2012-12-26 中国电力科学研究院 Malicious node detection method for sensing network based on energy fields

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JING DENG: "《Dependable system and networks,2004 international conference ,IEEE》", 1 July 2004 *
王良民: "《容忍入侵的无线传感器网络模糊信任评估模型》", 《通信学报》 *

Also Published As

Publication number Publication date
CN103619011B (en) 2016-08-03

Similar Documents

Publication Publication Date Title
Cao et al. [Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security
CN100471141C (en) Mixed intrusion detection method of wireless sensor network
Wen et al. Application of dynamic variable cipher security certificate in internet of things
Jin et al. Multi-agent trust-based intrusion detection scheme for wireless sensor networks
CN105636053B (en) A kind of detection method attacked towards Sybil in WSN
Zhijie et al. Intrusion detection for wireless sensor network based on traffic prediction model
Vegesna Incorporating Wireless Sensor Networks and the Internet of Things: A Hierarchical and Security-Based Analysis
Sakthidevi et al. Secured fuzzy based routing framework for dynamic wireless sensor networks
CN103560998A (en) Method and system for wireless sensor network to resist DoS attacks
Zhou et al. An anonymous routing scheme for preserving location privacy in wireless sensor networks
Khari Wireless sensor networks: a technical survey
CN103491542A (en) Method for detecting sewage pool attack intrusion of multi-path route in underwater sensor network
Laeeq Security challenges & preventions in wireless communications
Nghiem et al. A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
CN203352621U (en) Wireless Internet of Things data safety intelligent transmission system
CN103619011A (en) Method for tolerating malicious nodes in wireless sensor network
Kaur et al. Securing the wireless sensor network from denial of sleep attack by isolating the nodes
Serianni et al. A MAC Layer Energy Drain Attack Analysis in WSN
Singh et al. Security in communication for intelligent wireless sensor networks: issues and challenges
Pan Zigbee wireless network attack and detection
Kaushik et al. Security Technique against Power Exhausting Attacks in WSN
Sri et al. Advanced system control with traffic handling for secure communication in IoT routing protocol
CN104333534A (en) DoS detection system of 6LoWPAN sensing network
Saidu et al. PREVENTION TECHNIQUE AGAINST DENIAL OF SLEEP ATTACK IN WIRELESS SENSOR NETWORKS
Almana’seh et al. A wake-up receiver sensor node model for WSNs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

Termination date: 20191121