CN104079483A - Multistage security routing method for delay tolerant network and based on network codes - Google Patents
Multistage security routing method for delay tolerant network and based on network codes Download PDFInfo
- Publication number
- CN104079483A CN104079483A CN201310107131.5A CN201310107131A CN104079483A CN 104079483 A CN104079483 A CN 104079483A CN 201310107131 A CN201310107131 A CN 201310107131A CN 104079483 A CN104079483 A CN 104079483A
- Authority
- CN
- China
- Prior art keywords
- node
- matrix
- probability
- nodes
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000005540 biological transmission Effects 0.000 claims description 85
- 239000011159 matrix material Substances 0.000 claims description 66
- 238000004422 calculation algorithm Methods 0.000 claims description 23
- 238000012545 processing Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 11
- 230000006870 function Effects 0.000 claims description 10
- 239000013598 vector Substances 0.000 claims description 9
- 238000011144 upstream manufacturing Methods 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 6
- 230000001186 cumulative effect Effects 0.000 claims description 4
- 238000005315 distribution function Methods 0.000 claims description 4
- 230000009466 transformation Effects 0.000 claims description 4
- 125000004122 cyclic group Chemical group 0.000 claims description 2
- 238000013461 design Methods 0.000 abstract description 9
- 238000004088 simulation Methods 0.000 description 23
- 230000008901 benefit Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 235000008694 Humulus lupulus Nutrition 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008030 elimination Effects 0.000 description 2
- 238000003379 elimination reaction Methods 0.000 description 2
- 238000005265 energy consumption Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 239000000243 solution Substances 0.000 description 2
- 206010013643 Drop attacks Diseases 0.000 description 1
- 241001481828 Glyptocephalus cynoglossus Species 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000008261 resistance mechanism Effects 0.000 description 1
- 239000007921 spray Substances 0.000 description 1
- 206010042772 syncope Diseases 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Medicines That Contain Protein Lipid Enzymes And Other Medicines (AREA)
Abstract
本发明提供一种容迟网络中基于网络编码的多阶段安全路由方法,通过优化编码数据包分配,根据节点间最大转发性能的需要,设计了一种基于概率相遇节点受损概率的多阶段路由,降低消息受损概率,提高整体网络吞吐量;在网络编码的设计时,实现了DTN中混合安全网络编码方案,可联合抵制多种攻击,如:窃听攻击、女巫攻击、拜占庭攻击和丢弃攻击等。针对选择性数据丢弃攻击,适时的在源节点动态增加有限的冗余因子来提高链路故障的容错能力;中继节点间的彼此相互验证以抵制女巫和拜占庭攻击,减少了以往方案中与源节点认证的开销;设计双重联合抵制策略,减少节点受到拜占庭攻击的影响。
The present invention provides a multi-stage secure routing method based on network coding in a delay-tolerant network. By optimizing the distribution of coded data packets and according to the requirements of maximum forwarding performance between nodes, a multi-stage routing method based on the probability of node damage in probability encounters is designed. , reduce the probability of message damage, and improve the overall network throughput; in the design of network coding, the hybrid security network coding scheme in DTN is realized, which can jointly resist various attacks, such as: eavesdropping attack, Sybil attack, Byzantine attack and discarding attack wait. For selective data discarding attacks, a limited redundancy factor is dynamically added to the source node in a timely manner to improve the fault tolerance of link failures; mutual authentication between relay nodes is used to resist Sybil and Byzantine attacks, reducing the source node in previous schemes. The overhead of node authentication; design a double boycott strategy to reduce the impact of nodes from Byzantine attacks.
Description
技术领域 technical field
本发明是一种基于网络编码和多重攻击抵制的多阶段安全路由算法,属于容迟网络中安全路由算法领域。 The invention is a multi-stage safe routing algorithm based on network coding and multiple attack resistance, and belongs to the field of safe routing algorithms in delay-tolerant networks.
the
背景技术 Background technique
容迟/容断网络(Delay/Disruption Tolerant Network, DTN)是一种“受限网络(Challenged Network, CN)”,主要聚集在高延迟的太空通信和缺乏连续连接的异构网络协同工作环境中。DTN的通信是基于信息交换的,数据单元可能是信息、分组或束,束是指聚合在一起传输的信息单元。区别于传统网络的层次结构,Burleigh等在DTN网络层基础上提出了称为“捆绑”的端到端覆盖层网络协议。 Delay/Disruption Tolerant Network (DTN) is a "Challenged Network (CN)", which is mainly concentrated in high-latency space communications and heterogeneous network collaboration environments lacking continuous connections. . DTN communication is based on information exchange, and data units may be information, packets or bundles, and bundles refer to information units that are aggregated and transmitted together. Different from the hierarchical structure of the traditional network, Burleigh et al. proposed an end-to-end overlay network protocol called "bundling" on the basis of the DTN network layer.
网络编码(Network Coding, NC)是Ahlswede等人首次针对无中央调度大型分布式系统信息高效传输提出的有效算法。网络编码支持中继节点重新编码数据包,源节点向目的节点发送数据包时,两节点间路径上的其余中继节点全部或部分组合成并以一定的概率转发接收消息的线性编码包(类似于异或运算)给下一结点。在目的节点接收到了足够线性独立的编码束,使用高斯消元法(用于解数千条等式及未知数,百万条等式的极大方程组用迭代法解)将解码矩阵转换成三角矩阵,最终解码出所有原始消息。相比于传统方案,网络编码可计算调度策略以优化利用有限的可用网络资源,提高网络系统吞吐量和拓扑鲁棒性,降低特殊环境无线网络节点的整体能耗,具有潜在的安全优势。 Network Coding (Network Coding, NC) is the first effective algorithm proposed by Ahlswede et al. for the efficient transmission of information in large-scale distributed systems without central scheduling. Network coding supports relay nodes to re-encode data packets. When a source node sends a data packet to a destination node, all or part of the rest of the relay nodes on the path between the two nodes are combined and forwarded with a certain probability to receive a linearly encoded packet of the message (similar to in XOR operation) to the next node. A sufficiently linear and independent encoding beam is received at the destination node, and the decoding matrix is converted into a triangular form using the Gaussian elimination method (used to solve thousands of equations and unknowns, and the extremely large equations of millions of equations are solved by iterative method) matrix, and finally decode all the original messages. Compared with traditional schemes, network coding can calculate scheduling strategies to optimize the use of limited available network resources, improve network system throughput and topology robustness, and reduce the overall energy consumption of wireless network nodes in special environments, which has potential security advantages.
目前大部分有关容迟网络的研究都是基于节点是完全可靠这一理想假设,或是着重于追求良好的性能,而忽视安全性问题,导致系统中出现许多安全漏洞;或是关注于安全性,而忽略了网络性能,使得网络编码的在提高网络性能方面的优势无法充分发挥。 Most of the current research on delay-tolerant networks is based on the ideal assumption that nodes are completely reliable, or they focus on pursuing good performance while ignoring security issues, resulting in many security holes in the system; or focusing on security , while ignoring the network performance, so that the advantages of network coding in improving network performance cannot be fully utilized.
本发明针对上述提出的个问题,即(1)缺乏连续可靠的连接;(2)实际环境节点未必可靠;(3)网络编码的性能与安全性无法兼顾;(4)传统路由方案不适用于受损容迟网络环境。根据容迟网络节点的“存储-携带-转发”的机会路由的特点,提出受损环境的网络编码方案,源节点通过适时地向网络中动态增加冗余因子,以抵制丢弃攻击,提高链路容错能力;节点间相互验证消息以抵制污染攻击和女巫攻击,避免传统方法中对于源节点的过分依赖;设计以概率相遇节点受损概率为度量的多阶段路由,进一步提高网络吞吐量。 The present invention addresses the above-mentioned problems, namely (1) lack of continuous and reliable connection; (2) actual environment nodes are not necessarily reliable; (3) performance and security of network coding cannot be taken into account; (4) traditional routing schemes are not suitable for Compromised latency tolerant network environment. According to the characteristics of "store-carry-forward" opportunistic routing of delay-tolerant network nodes, a network coding scheme for damaged environments is proposed. The source node dynamically adds redundancy factors to the network in a timely manner to resist discarding attacks and improve link efficiency. Fault tolerance; mutual verification of messages between nodes to resist pollution attacks and sybil attacks, avoiding excessive reliance on source nodes in traditional methods; design of multi-stage routing based on the probability of node damage probability to further improve network throughput.
模型定义model definition
网络模型network model
假设容迟网络环境下的通信网络模型由有向图G=(V,E)表示,V表示网络中节点的集合,E表示网络中有向链路(或信道)集合。本发明是建立在唯一源节点S和一个或多个目的节点D间的束会话之上。P表示S与D之间的路径集合。从S沿路径 遍历到D的共享路径数为sk,链路可靠概率为,本文将链路e的上游节点风险概率视为,路径受损概率为。表示数据包传输率,为网络吞吐量,代表安全和性能间的折中系数。 Assuming that the communication network model in the delay-tolerant network environment is represented by a directed graph G=(V,E), V represents the set of nodes in the network, and E represents the set of directed links (or channels) in the network. The invention is based on bundle sessions between a unique source node S and one or more destination nodes D. P represents the set of paths between S and D. from S along the path The number of shared paths traversed to D is s k , and the link The reliable probability is , this paper regards the upstream node risk probability of link e as ,path The damage probability is . Indicates the packet transmission rate, is the network throughput, Represents the trade-off factor between security and performance.
节点模型node model
源节点发送包含t个待传输消息组成的消息束到目的节点,消息组成矩阵O,同一束消息具有相同唯一通用标识符。简单起见,假设所有消息等长。中继节点能够生成和传播属于同一个消息的线性组合,编码包是一个元组,其中是消息O的前个元素,是认证信息。 The source node sends t messages to be transmitted The composed message bundles are sent to the destination node, the messages form a matrix O, and the same bundle of messages has the same unique universal identifier . For simplicity, assume all messages are of equal length. Relay nodes are able to generate and propagate data belonging to the same A linear combination of messages, encoded packets are a tuple ,in is the front of the message O elements, is the authentication information.
攻击者模型attacker model
该模型中,假定攻击者是全能的,即它具备窃听DTN中各链路的能力,并了解源节点S和目的节点D间的编解码算法,不同的攻击者会施以1种或1种以上攻击,其最多能够向网络中注入a个受损数据包,假设其组成矩阵A。它能够向网络中任何链路注入受损数据包,通过掩饰或盗用身份假装它们是从S到D数据流的一部分。同时,假定在我们的协议设计中,从S到D间每条所选路径上最多只有一个攻击者。S到D间的路径集可由攻击者通过流量分析和估计而得到。此外,由于已选路径是节点不相交路径,彼此勾结的攻击者在一条路径最多只有一个攻击者攻击。此外,本方案中存在2种网络受损条件。路径受损条件是指当且仅当上的至少一条链路受损时,上的路径k才会受到损坏攻击。全网受损条件是当受损的共享路径数大于等于源节点一束数据中的消息数量时,源节点S沿路径集合P传输到目的节点D的所有消息就会受到损害攻击。 In this model, it is assumed that the attacker is omnipotent, that is, it has the ability to eavesdrop on each link in the DTN, and understands the codec algorithm between the source node S and the destination node D. Different attackers will impose one or one For the above attack, it can inject at most a damaged data packets into the network, assuming that it forms a matrix A. It is capable of injecting compromised packets into any link in the network, pretending that they are part of the data flow from S to D through masking or identity theft. At the same time, it is assumed that in our protocol design, there is at most one attacker on each selected path from S to D. The path set between S and D can be obtained by the attacker through traffic analysis and estimation. In addition, since the selected path is a node-disjoint path, there is at most one attacker attacking on one path among attackers colluding with each other. In addition, there are two kinds of network damage conditions in this scheme. The path damage condition means that if and only if at least one link on when damaged, The path k above will be damaged by the attack. The damage condition of the whole network is when the number of damaged shared paths is greater than or equal to the number of messages in a bunch of data of the source node When , all messages transmitted from the source node S to the destination node D along the path set P will be compromised.
各传输路径编码包优化分配模型Optimal Allocation Model of Coding Packets in Each Transmission Path
本模型中,假设从S到D总共有|L|条节点互不相交的路径l1,l2,...,l|L|。我们研究的核心是如何选择S到D间的安全传输路径,并将源节点消息副本编码后分配在这些所选择不相交的路径上,实现DTN消息传输安全风险最小化,同时获得理想传输率和网络吞吐量。 In this model, it is assumed that there are totally |L| paths l 1 , l 2 ,...,l |L| with nodes disjoint from S to D. The core of our research is how to select a secure transmission path between S and D, and distribute the source node message copies on these disjoint paths after encoding, so as to minimize the security risk of DTN message transmission, and at the same time obtain the ideal transmission rate and network throughput.
本发明中的路由协议为依赖路径的多阶段路由协议,它在多个节点不相交的路径上传输,使得在不同路径上传输的数据可以共同编码并受到安全保护。 The routing protocol in the present invention is a path-dependent multi-stage routing protocol, which is transmitted on disjoint paths of multiple nodes, so that data transmitted on different paths can be coded together and protected safely.
在该路由协议中,如果要想恢复原始消息,目的节点需要对一组编码数据包联合解码。我们将路径集合上的数据包分配形式化,尽量减少了路由的安全风险,同时将传输率限制在理想值之下。攻击者尽力提高安全风险和不可达率,上述描述可建立如下最优化模型,下表示网络可预约部分可靠性概率: In this routing protocol, if the original message is to be recovered, the destination node needs to jointly decode a set of encoded data packets. We formalize the distribution of packets on a set of paths, minimizing the security risk of routing, while reducing the transmission rate limited below the ideal value. Attackers try their best to increase the security risk and unreachability rate. The above description can establish the following optimization model, and the following represents the reliability probability of the reserved part of the network :
因而,可得优化数据包分配优化二元组, 为源节点到目的节点分配在各路径上数据包数量,为路径受损的概率: Therefore, the optimized data packet allocation optimization binary group can be obtained , Assign the number of data packets on each path from the source node to the destination node, for the path Probability of damage:
同时,源节点的经过编码最终生成的数据包数n由下式表示,其中|P*|为选作传输共享的路径数,为属于P*上的路径,为折中因子: At the same time, the number n of data packets finally generated by the source node after encoding is represented by the following formula, where |P * | is the number of paths selected for transmission sharing, be the path belonging to P * , is the compromise factor:
满足推导所得r*前提下,我们提出求解S到D的最优路径集合P*的算法。其入口参数为多路径路由选择算法建立路径集合P,同时存入各节点内存中邻居节点受损概率值,如果路径k∈P,继续判断其是否满足上述不等式约束条件,若满足,在P中预约该路径,返回新的路径P值,同时令P*=P。 Under the premise of satisfying the derived r * , we propose an algorithm to solve the optimal path set P * from S to D. Its entry parameter is a multi-path routing selection algorithm to establish a path set P, and store the damage probability value of the neighbor node in the memory of each node at the same time. If the path k∈P, continue to judge whether it satisfies the above inequality constraints, if so, in P Reserve the path, return the new path P value, and set P * =P.
基于安全网络编码多阶段路由设计方案Multi-stage routing design scheme based on secure network coding
在这部分,我们在数据包设计中添加标识符位和认证信息位,增加了链路防窃听特性;同时,引入DTN混合安全网络编码方案,以联合抵制多种攻击,如:窃听攻击、女巫攻击、拜占庭攻击和丢弃攻击等。 In this part, we add identifier bits and authentication information bits in the data packet design, and increase the anti-eavesdropping feature of the link; at the same time, introduce the DTN hybrid security network coding scheme to jointly resist various attacks, such as: eavesdropping attacks, Sybil attack, Byzantine attack, and drop attack, etc.
所述的安全网络编码方案,是指针对选择性数据丢弃攻击,适时的在源节点动态增加有限的冗余因子来提高链路故障的容错能力;中继节点间的彼此相互验证以抵制女巫和拜占庭攻击,减少了以往方案中与源节点认证的开销;设计双重联合抵制策略,减少节点受到拜占庭攻击的影响。为了简便,本发明中研究一个束处理流程,考虑一个源节点和一个目的节点间的传输,但该方案推广到多播流环境下也适用。 The secure network coding scheme refers to that for selective data discarding attacks, a limited redundancy factor is dynamically added to the source node in a timely manner to improve the fault tolerance of link failures; mutual authentication between relay nodes is used to resist witches and Byzantine attack reduces the overhead of source node authentication in previous schemes; designs a dual boycott strategy to reduce the impact of nodes from Byzantine attacks. For the sake of simplicity, a beam processing flow is studied in the present invention, and the transmission between a source node and a destination node is considered, but this scheme is also applicable to a multicast flow environment.
发明内容 Contents of the invention
基于上述分析,本发明提供了一种容迟网络中基于网络编码的多阶段安全路由方法,其包括如下步骤: Based on the above analysis, the present invention provides a multi-stage secure routing method based on network coding in a delay-tolerant network, which includes the following steps:
第一步:源节点编码和处理; Step 1: source node encoding and processing;
一个数据包包括m个有限域Fq中的符号,添加个冗余标示;用矩阵O表示一束数据,矩阵的第i行表示一束数据中的第i个消息,矩阵O右侧是一个阶的单位矩阵;攻击者向各束数据中注入的z个数据包由矩阵A表示: A packet consists of m symbols in the finite field F q , adding A redundant label; a bundle of data is represented by a matrix O, and the matrix The i-th row of represents the i-th message in a bunch of data, and the right side of the matrix O is a The identity matrix of order; the z data packets injected by the attacker into each bundle of data are represented by the matrix A:
由矩阵可知,一束数据的原始消息长度为,求解矩阵方程可得冗余个列向量; by matrix It can be seen that the original message length of a bunch of data is , solving the matrix equation Redundancy available a column vector;
其中R是阶冗余矩阵,R是从有限域中独立标准随机符号中选出的;是将矩阵的列向量逐个叠加所得; where R is order redundant matrix, R is derived from the finite field selected from independent standard random symbols; will be The column vectors of the matrix are superimposed one by one;
根据上面的矩阵方程,源节点把数据束编码成个待传输编码包,其中表示矩阵的第行,表示原始数据包中消息进行随机线性编码的系数; According to the matrix equation above, the source node puts the data bundle encoded as encoded packets to be transmitted, where representation matrix First OK, Represents the coefficient of random linear encoding of the message in the original data packet;
最后,S将编码后的n个编码包传输到D,分配在源节点到目的节点各路径上数据包的数量可由上述介绍等式和多阶段路由算法确定; Finally, S transmits the encoded n coded packets to D, and allocates the number of data packets on each path from the source node to the destination node can be determined by the above introduced equation and multi-stage routing algorithm;
源节点首先进行签名,签名方案在一个双线性元祖上执行,其中是同一素数阶的循环乘组,这些组中的历算对数问题视为计算不可行的,是具有双线性和非退化特性的高效可计算映射,是一个高效可计算同构; The source node first signs, and the signature scheme is in a bilinear tuple execute on, where are of the same prime order Cyclic multiplication groups of , in which the algebraic logarithm problem is considered computationally infeasible, is an efficient computable map with bilinear and non-degenerate properties, is an efficient computable isomorphism;
源节点有密钥,公钥对,其中,它使用同形哈希函数: The source node has the key , the public key pair ,in , which uses the homomorphic hash function :
其中,是中所有节点都知道的随机元素,是加密哈希函数,为消息长,具有标示的消息的签名为下式: in, yes A random element known to all nodes in , is a cryptographic hash function, is the message length, with the sign news The signature of is as follows:
; ;
第二步:中继节点编码和处理; Step 2: Relay node encoding and processing;
类似于哈希,签名也有同构性,对于签名包,签名为下式: Similar to hashes, signatures also have isomorphism, for signed packages , the signature is the following:
设中继节点在一次路由过程中只接受来自相同源节点的编码包,中继节点通过验证是否满足下式来判定新接收编码包与内存中已有编码包是否来自同一源节点; Assuming that the relay node only accepts encoded packets from the same source node in a routing process, the relay node determines whether the newly received encoded packet and the existing encoded packet in the memory come from the same source node by verifying whether the following formula is satisfied;
联立和上式可推导出节点数据包验证另一形式,如下式所示;中继节点接收到上游节点传输的编码包M1后,如果此时中继节点缓存为空,则直接将该编码包存入内存;否则,首先提取该编码包的33-48比特位的束标识符id哈希数值,与内存中已有编码包M2束标识符id哈希值进行比较,若满足下式,则该签名包认证成功,表明两个编码包来自同一源节点,并非是污染攻击或女巫攻击者注入的受损包,即可将相同束标识符id哈希值的编码包进一步联合编码; Simultaneous And the above formula can deduce another form of node data packet verification, as shown in the following formula; after the relay node receives the encoded packet M 1 transmitted by the upstream node, if the cache of the relay node is empty at this time, it will directly send the encoded packet Store it in memory; otherwise, first extract the bundle identifier id hash value of the 33-48 bits of the encoded packet, and compare it with the existing encoded packet M 2 bundle identifier id hash value in the memory, if the following formula is satisfied, If the signature package is authenticated successfully, it indicates that the two encoded packages come from the same source node, and are not damaged packages injected by pollution attacks or Sybil attackers, and the encoded packages with the same bundle identifier id hash value can be further jointly encoded;
接着,如果s k * ≧2,路径k上各中继节点在线性编码式时将接收到的数据包和与传输数据包数量相关的输出联合起来;否则,中继节点不对收到的数据包进行任何处理; Then, if s k * ≧ 2, each relay node on the path k combines the received data packets with the output related to the number of transmitted data packets in linear coding; otherwise, the relay nodes do not correct the received data packets carry out any processing;
这样,则无需其余附加验证条件和源节点的参与,中继节点在接收到编码包之后,只需通过彼此验证就可判定出是否可将此编码包接收并进一步编码,有限避免了容迟网络中的女巫攻击; In this way, there is no need for other additional verification conditions and the participation of the source node. After the relay node receives the encoded packet, it can determine whether the encoded packet can be received and further encoded only through mutual verification, which limits the delay-tolerant network. Sybil attacks in
第三步:目的节点解码和处理; Step 3: Destination node decoding and processing;
首先,目的节点需要检测链路;当选择性数据丢弃攻击发生时,需要其来衡量一个流的传输率并将所估计传输率发送到发送节点;当发送节点收到其接收端的反馈时,发送节点动态调整冗余系数来减缓由于该攻击而导致的传输率下降;假定接收者观察到的平均传输率为,对应的冗余系数为;发送节点的冗余系数计算式如下,其中表示接收节点发送的目前观察到的传输率,当在一段时间内持续小于时,目的节点通知源节点向网络中注入冗余因子; First, the destination node needs to detect the link; when the selective data discarding attack occurs, it needs to measure the transmission rate of a flow and send the estimated transmission rate to the sending node; when the sending node receives the feedback from its receiving end, it sends The node dynamically adjusts the redundancy factor to slow down the decrease in the transmission rate caused by the attack; assuming that the average transmission rate observed by the receiver is , and the corresponding redundancy coefficient is ;Redundancy factor of the sending node The calculation formula is as follows, where Indicates the currently observed transmission rate sent by the receiving node, when for a period of time less than When , the destination node notifies the source node to inject redundancy factors into the network;
解码过程是基于中的解码方案;将DTN中一束数据按照下述等式方式变换,其中O表示源节点发送的原始数据包,T表示从源节点到目的节点的线性变换,Ta则表示从攻击者到目的节点的线性变换; The decoding process is based on the decoding scheme in DTN; a bundle of data in DTN is transformed according to the following equation, where O represents the original data packet sent by the source node, T represents the linear transformation from the source node to the destination node, and T a represents Linear transformation from attacker to destination node;
目的节点D从矩阵中任意选择k+z个线性无关的列组成矩阵,其中在源节点数据包矩阵O和攻击者向网络中注入数据包矩阵A中选取的相关列向量分别用和表示,故上式进一步改写成如下等式: The destination node D is from the matrix Arbitrarily choose k+z linearly independent columns to form a matrix , where the relevant column vectors selected in the source node data packet matrix O and the attacker’s injected data packet matrix A into the network are respectively denoted by and , so the above formula is further rewritten into the following equation:
如果矩阵存在时,则有下式成立: if matrix When it exists, the following formula holds:
将矩阵E的前m-k列表示为E ’ ,矩阵O写成O=[O1,O2,O3]的形式,其中O1与矩阵O的前z列相关,O3与矩阵O的后k列相关,故上述等式可转换成下式;其中,Ok z表示矩阵Ok的前z列,Ez ’ 表示矩阵E ’ 的前z列,Ei ’ 表示矩阵E ’ 的后i列: Express the first mk columns of matrix E as E ' , and write matrix O as O=[O 1 , O 2 , O 3 ], where O 1 is related to the first z columns of matrix O, and O 3 is related to the last k of matrix O column correlation, so the above equation can be converted into the following formula; where, O k z represents the first z columns of matrix O k , E z ' represents the first z columns of matrix E ' , and E i ' represents the last i columns of matrix E ' :
联立和上式可得下式;其中,表示目的节点接收的编码包组成的矩阵Y最后列,表示目的节点接收的编码包矩阵剩余部分,表示逐列叠加矩阵得到的列向量,表示矩阵的第i行j列的元素,I是k维的单位矩阵,零矩阵的维数是,单位矩阵的维数是; Simultaneous And the above formula can get the following formula; where, Represents the matrix Y composed of encoded packets received by the destination node List, Represents the encoded packet matrix received by the destination node The remaining part, Represents a column-by-column superposition of matrices The resulting column vector, representation matrix The elements of the i-th row and column j, I is a k-dimensional identity matrix, and the dimension of the zero matrix is , the identity matrix The dimension of is ;
这样,如果目的节点接收的编码包与源节点传输和攻击者注入的污染包有关,在目的节点至少接收到一束数据的k+z个数据包时,且矩阵B是列满秩,则等式(22)有且仅有唯一解;因此,即使存在攻击者恶意注入的未被中继节点间彼此验证排除的污染包时,目的节点仍能够成功解码出源节点发出的原始数据包,实现对包污染攻击的双重抵制; In this way, if the encoded packet received by the destination node is related to the pollution packet transmitted by the source node and injected by the attacker, when the destination node receives at least k+z data packets of a bunch of data, and the matrix B is full rank, then etc. Equation (22) has and only has a unique solution; therefore, even if there are malicious packets injected by attackers that have not been verified and excluded by relay nodes, the destination node can still successfully decode the original data packet sent by the source node, realizing Double resistance to packet pollution attacks;
第四步:多阶段路由转发; Step 4: Multi-stage routing and forwarding;
所述的概率相遇节点受损概率进行消息的多阶段路由转发中,假定只有源节点为受信节点,即任何节点可从源节点接收消息;由可知,与链路e相关的两节点中,上游节点风险概率risk为下式; In the multi-stage routing and forwarding of the message with the probability of encountering node damage, it is assumed that only the source node is a trusted node, that is, any node can receive a message from the source node; It can be seen that among the two nodes related to link e, the risk probability risk of the upstream node is the following formula;
当有该风险概率的节点携带消息遇到了攻击者,将消息副本发送给攻击者的概率为risk;网络中节点的受损风险概率可能是基于群组的,这使编码包的传输更有挑战;源节点目标是将消息传输到目的节点,同时防止将其暴露给攻击者; When a node with this risk probability carries a message and encounters an attacker, the probability of sending a copy of the message to the attacker is risk; the risk probability of damage to nodes in the network may be group-based, which makes the transmission of encoded packets more challenging ;The goal of the source node is to transmit the message to the destination node while preventing it from being exposed to the attacker;
本方案中,节点的概率相遇节点受损概率更新策略为各节点与可能相遇节点的初始受损概率为risk,待中继节点ni-1进行一次路由之后,若被选中路径另一端节点ni表此次传输单位数据的实际开销为ci,则在完成一次路由后,ni-1中保存的ni节点受损概率更新为risk-0.001ci; In this scheme, the update strategy of the probability of node encounter node damage probability is that the initial damage probability of each node and the possible encounter node is risk, after the relay node n i-1 performs a route, if the selected node n i represents the actual cost of transmitting unit data this time as c i , then after completing a route, the damage probability of n i nodes saved in n i-1 is updated to risk-0.001c i ;
由于链路e的上游节点可靠概率为re,分析攻击者对于安全传输的影响,在消息过期期限td之前,传输率为dr所需的消息副本数量Lmin为下式所示,其中为节点间相遇次数的指数分布律,为目前网路中攻击者数量: Since the reliability probability of the upstream node of the link e is r e , to analyze the impact of the attacker on the secure transmission, the number of message copies L min required for the transmission rate d r before the message expiration period t d is shown in the following formula, where is the exponential distribution law of the number of encounters between nodes, For the current number of attackers in the network:
设多阶段路由第一阶段中节点的概率相遇节点受损概率在排序后位于后个为可信节点的节点,可携带消息副本,即;第二阶段中节点的概率相遇节点受损概率在排序后位于后个为部分可信节点,可携带消息副本,即,总携带消息副本节点数:;为了获得目标传输率,第二阶段的开始时间,需满足下面的一个常量不等式: Assuming that the probability of nodes in the first stage of multi-stage routing meets the node damage probability after sorting A node is a trusted node, which can carry a copy of the message, that is ; In the second stage, the probability of nodes encountering node damage probability is at the bottom after sorting One is a partially trusted node, which can carry a copy of the message, that is, , the total number of nodes carrying message replicas: ; to get the target transfer rate , the start time of the second phase , need to satisfy the following constant inequality:
其简要证明过程如下:设随机变量表示多阶段路由目标传输率,表示L个节点中任意一个与目的节点相遇的概率密度函数,为L个节点中任意一个与共集结点不相遇概率的累积分布函数;第一阶段中,累积分布函数 随着增长;但是,如果第一阶段未发生传输(概率为),第二阶段开始时,其几率密度函数在传输方面由个节点决定,传输风险由各传输节点的值决定; The brief proof process is as follows: Let the random variable Indicates the multi-stage routing target transmission rate, Represents the probability density function of any one of the L nodes meeting the destination node, is the cumulative distribution function of the probability that any one of the L nodes does not meet the common gathering point; in the first stage, the cumulative distribution function along with grows; however, if no transmission occurs in the first phase (with probability ), at the beginning of the second stage, its probability density function in terms of transmission is given by nodes, the transmission risk is determined by each transmission node value decision;
由于该值需要大于给定传输率,因此可得TTL1满足的不等式;由上述分析可知,对于给定参数集,为了使多阶段路由可获得更高的传输率,第三阶段开始时间应不小于下述常量不等式: Since this value needs to be greater than the given transfer rate , so the inequality satisfied by TTL 1 can be obtained; from the above analysis, for a given parameter set , in order to achieve a higher transmission rate for multi-stage routing, the start time of the third stage Should not be less than the following constant inequality:
在DTN网络环境和传输目标下,为了实现网络性能与安全性的折中,我们结合上述提出基于节点的概率相遇节点受损概率的多阶段路由算法;入口处输入参数为消息待转发节点与其可能相遇节点的受损概率值;接着,对节点内存中受损概率值进行一次快速排序;第一步路由时,节点按FTS模型,仅把编码包副本传输给受损概率值最大的节点,同时开启计时器,设为,如果在时间内未能相遇最受损节点,则进行第二步路由;第二步路由时,节点按TFS模型,仅把编码包副本传输给次受损节点(受损概率值位于排序组前三位的节点),同时开启计时器,设,若在时限内未能相遇最受损节点,则进行第三步路由;之后的路由采用AS模型,即节点把编码包传输给开启AS路由模型后首个遇到的节点;为了最优化网络性能,和均取其限定范围内最小值。 In the DTN network environment and transmission objectives, in order to achieve a compromise between network performance and security, we combined the above to propose a multi-stage routing algorithm based on the probability of nodes encountering node damage probability; the input parameter at the entrance is the node to be forwarded The damage probability value of the node with which it may meet; then, for the node Perform a quick sort on the damaged probability value in the memory; in the first step of routing, the node According to the FTS model, only the copy of the encoded packet is transmitted to the node with the highest damage probability value, and the timer is started at the same time, set to , if in If the time fails to meet the most damaged node, the second step of routing is performed; during the second step of routing, the node According to the TFS model, only a copy of the encoded packet is transmitted to the second damaged node (the node whose damage probability value is in the top three ranks of the sorting group), and the timer is started at the same time. , if in If the most damaged node is not encountered within the time limit, the third step of routing is performed; the subsequent routing adopts the AS model, that is, the node transmits the encoded packet to the first encountered node after the AS routing model is enabled; in order to optimize network performance, and Take the minimum value within its limited range.
所述的多阶段路由是指综合考虑网络完全性和性能折衷基础上,在不同阶段之间设定合理的转发时间等待间隔以及在不同的转发阶段设定合理的路由转发模式,实现网络编码机制与传统容迟网络路由方案的结合,提升了路由效率和安全性能。 The multi-stage routing refers to setting a reasonable forwarding time waiting interval between different stages and setting a reasonable routing and forwarding mode in different forwarding stages on the basis of comprehensive consideration of network integrity and performance compromise, so as to realize the network coding mechanism Combining with the traditional delay-tolerant network routing scheme, the routing efficiency and security performance are improved.
本发明是一种容迟网络中基于安全网络编码的多阶段路由方法,其发明目的在于针对容迟网络中由于间断连接性和长时延导致路由效率降低以及容迟网络中可能产生的安全性问题,并且节点利用网络编码和其它节点的编码后数据包相互验证来确定是否允许对接收到的数据包进行编码,并根据多阶段路由规则选择合适的概率相遇节点转发消息。之后,对概率相遇节点的受损概率进行修改,该节点在下一次路由选择过程中根据其概率相遇节点的受损概率重新建立路由路径;基于大部分容迟网络路由算法的效率不高、易受安全威胁和网络吞吐量小的问题,建立各路径优化编码包分配机制,提出受损容迟网络环境下的网络编码方案,依据概率相遇节点受损概率进行消息束的多阶段路由转发,利用各节点在受到攻击威胁时的抵制机制和多阶段路由转发后的概率相遇节点受损概率更新机制,在容迟网络环境下建立了安全高效的节点路由转发方案。 The present invention is a multi-stage routing method based on secure network coding in a delay-tolerant network. The purpose of the invention is to reduce the routing efficiency due to intermittent connectivity and long delay in the delay-tolerant network and the security that may occur in the delay-tolerant network problem, and nodes use network coding and other nodes' encoded data packets to verify each other to determine whether to allow encoding of received data packets, and select appropriate probabilistic encounter nodes to forward messages according to multi-stage routing rules. After that, modify the damage probability of the probabilistic meeting node, and the node will re-establish the routing path according to the damage probability of the probabilistic meeting node in the next routing selection process; the routing algorithm based on most delay-tolerant networks is not efficient and vulnerable In order to solve the problems of security threats and small network throughput, an optimal coding packet distribution mechanism for each path is established, and a network coding scheme in a damaged delay-tolerant network environment is proposed, and the multi-stage routing and forwarding of message bundles is carried out according to the probability of node damage in probability encounters. The node's resistance mechanism when it is threatened by an attack and the probability encounter node damage probability update mechanism after multi-stage routing and forwarding establish a safe and efficient node routing and forwarding scheme in a delay-tolerant network environment.
the
有益效果:本发明针对容迟网络节点的“存储-携带-转发”的机会路由,提出受损环境的网络编码方案,源节点通过适时动态增加冗余因子,抵制丢弃攻击,提高链路容错能力;节点间相互验证消息以抵制污染攻击和女巫攻击,避免对源节点的过分依赖;设计以概率相遇节点受损概率为度量的多阶段路由,进一步提高网络整体的路由性能。安全性分析和仿真结果表明,通过合理选择权衡系数,能够有效抵制联合攻击并最优化网络性能。同时,在路由开销、传输延时、传输风险、有效传输率和网络吞吐量等路由性能参数上本发明的算法相较于已有方案都有较明显的改进。 Beneficial effects: the present invention aims at opportunistic routing of "storage-carry-forward" of delay-tolerant network nodes, and proposes a network coding scheme for damaged environments. The source node resists discarding attacks by dynamically increasing redundancy factors in a timely manner, and improves link fault tolerance ; Mutual verification of messages between nodes to resist pollution attacks and sybil attacks, avoiding excessive dependence on source nodes; design a multi-stage routing based on the probability of node damage probability to further improve the overall routing performance of the network. The security analysis and simulation results show that by choosing a reasonable trade-off coefficient, the joint attack can be effectively resisted and the network performance can be optimized. At the same time, compared with existing solutions, the algorithm of the present invention has obvious improvements in routing performance parameters such as routing overhead, transmission delay, transmission risk, effective transmission rate and network throughput.
the
附图说明 Description of drawings
图1是网络节点编码图。 Figure 1 is a network node coding diagram.
图2是最优路径集求解算法流程图。 Figure 2 is a flow chart of the algorithm for solving the optimal path set.
图3是编码包格式。 Figure 3 is the encoding packet format.
图4是中继节点编码处理流程图。 Fig. 4 is a flow chart of relay node encoding processing.
图5是多阶段路由算法流程图。 Fig. 5 is a flowchart of a multi-stage routing algorithm.
图6是路由开销随仿真时间变化图。 Fig. 6 is a diagram showing the variation of routing overhead with simulation time.
图7是吞吐量随仿真时间变化图。 Figure 7 is a graph of throughput versus simulation time.
图8是有效传输率随攻击者数量变化图。 Figure 8 is a graph showing the variation of effective transmission rate with the number of attackers.
图9是传输时延随攻击者数量变化图。 Figure 9 is a graph showing the variation of transmission delay with the number of attackers.
图10是单传输风险随攻击者数量变化图。 Figure 10 is a graph showing the variation of single transmission risk with the number of attackers.
图11是联合传输风险随攻击者数量变化图。 Figure 11 is a graph of joint transmission risk as a function of the number of attackers.
图12是权衡系数与网络性能和风险关系图。 Figure 12 is a graph showing the relationship between trade-off coefficients and network performance and risk.
具体实施方式 Detailed ways
以下结合说明书附图对本发明创造作进一步的详细说明。 The invention will be described in further detail below in conjunction with the accompanying drawings.
实施例一Embodiment one
网络编码实施方案Network Coding Implementation
网络编码支持中继节点重新编码数据包,源节点向目的节点发送数据包时,两节点间路径上的其余中继节点全部或部分组合成并以一定的概率转发接收消息的线性编码包(类似于异或运算)给下一结点,如图1所示。在目的节点接收到了足够线性独立的编码束,使用高斯消元法(用于解数千条等式及未知数,百万条等式的极大方程组用迭代法解)将解码矩阵转换成三角矩阵,最终解码出所有原始消息。相比于传统方案,网络编码可计算调度策略以优化利用有限的可用网络资源,提高网络系统吞吐量和拓扑鲁棒性,降低特殊环境无线网络节点的整体能耗,具有潜在的安全优势。 Network coding supports relay nodes to re-encode data packets. When a source node sends a data packet to a destination node, all or part of the rest of the relay nodes on the path between the two nodes are combined and forwarded with a certain probability to receive a linearly encoded packet of the message (similar to in XOR operation) to the next node, as shown in Figure 1. A sufficiently linear and independent encoding beam is received at the destination node, and the decoding matrix is converted into a triangular form using the Gaussian elimination method (used to solve thousands of equations and unknowns, and the extremely large equations of millions of equations are solved by iterative method) matrix, and finally decode all the original messages. Compared with traditional schemes, network coding can calculate scheduling strategies to optimize the use of limited available network resources, improve network system throughput and topology robustness, and reduce the overall energy consumption of wireless network nodes in special environments, which has potential security advantages.
传输路径编码包优化分配模型Optimal Allocation Model of Transmission Path Coding Packets
在满足下列公式的前提下 Under the premise of satisfying the following formula
我们提出求解S到D的最优路径集合的算法1流程如图2所示。其入口参数为多路径路由选择算法建立路径集合,同时存入各节点内存中邻居节点受损概率值,如果路径,继续判断其是否满足不等式约束条件(4), We propose to solve the set of optimal paths from S to D The process of Algorithm 1 is shown in Figure 2. Its entry parameter establishes a path set for the multipath routing algorithm , and store the damage probability value of the neighbor node in the memory of each node at the same time, if the path , continue to judge whether it satisfies the inequality constraint (4),
若满足,在中预约该路径,返回新的路径值,同时令。 If satisfied, in Reserving the path in , return the new path value, at the same time .
路由算法数据包格式设计Routing Algorithm Packet Format Design
包格式定义如图3所示,该数据包总共字长l=96个子节:编码向量指节点对原始消息重新编码使用的各组线性编码系数,占8比特,不足位前面用0填充(下同);认证信息是消息间进行彼此验证的参数,占8比特;处理控制符字段是一个占16比特,存放多种控制符,如是否支持托管传递,是否需要确认等;束标识符id字段占16个比特,存放该束对应的哈希值,便于节点间的相互认证;概率相遇节点受损概率是16比特,存放节点的概率相遇节点的受损概率;数据段存放消息的内容,是一个32比特可变长字段。 The packet format definition is shown in Figure 3. The data packet has a total word length of l=96 subsections: the encoding vector refers to each group of linear encoding coefficients used by the node to re-encode the original message, occupying 8 bits, and filling the insufficient bits with 0 (below The same); the authentication information is a parameter for mutual authentication between messages, which occupies 8 bits; the processing control character field is a 16-bit field, which stores various control characters, such as whether to support managed delivery, whether confirmation is required, etc.; bundle identifier id field Occupying 16 bits, it stores the hash value corresponding to the bundle, which is convenient for mutual authentication between nodes; the probability of node damage is 16 bits, which stores the probability of node damage; the data segment stores the content of the message, which is A 32-bit variable-length field.
中继节点网络编码处理流程Relay node network coding process flow
中继节点处理流程如图4所示。中继节点接收到上游节点传输的编码包M1后,如果此时中继节点缓存为空,则直接将该编码包存入内存;否则,首先提取该编码包的33-48比特位的束标识符id哈希数值,与内存中已有编码包M2束标识符id哈希值进行比较,若满足下式,则该签名包认证成功,表明两个编码包来自同一源节点,并非是污染攻击或女巫攻击者注入的受损包,即可将相同束标识符id哈希值的编码包进一步联合编码。 The processing flow of the relay node is shown in Figure 4. After the relay node receives the encoded packet M 1 transmitted by the upstream node, if the cache of the relay node is empty at this time, it will directly store the encoded packet into the memory; otherwise, first extract the bundle of 33-48 bits of the encoded packet The hash value of the identifier id is compared with the hash value of the identifier id of the existing coded package M2 bundle in the memory. If the following formula is satisfied, the signature package authentication is successful, indicating that the two coded packages come from the same source node, not Pollution attacks or damaged packets injected by Sybil attackers can further jointly encode encoded packets with the same bundle identifier id hash value.
接着,如果sk *≧2,路径k上各中继节点在线性编码式时将接收到的数据包和与传输数据包数量相关的输出联合起来;否则,中继节点不对收到的数据包进行任何处理。 Then, if s k * ≧ 2, each relay node on the path k combines the received data packets with the output related to the number of transmitted data packets in linear coding; otherwise, the relay nodes do not correct the received data packets Do any processing.
多阶段高效安全路由算法流程Multi-stage efficient security routing algorithm process
如图5所示为基于节点的概率相遇节点受损概率的多阶段路由算法流程图。入口处输入参数为消息待转发节点a与其可能相遇节点的受损概率值。接着,对节点a内存中受损概率值进行一次快速排序。第一步路由时,节点a按FTS模型,仅把编码包副本传输给受损概率值最大的节点,同时开启计时器,设为TTL1,如果在TTL1时间内未能相遇最受损节点,则进行第二步路由。第二步路由时,节点a按TFS模型,仅把编码包副本传输给次受损节点(受损概率值位于排序组前三位的节点),同时开启计时器,设TTL2,若在TTL2时限内未能相遇最受损节点,则进行第三步路由。之后的路由采用AS模型,即节点把编码包传输给开启AS路由模型后首个遇到的节点。为了最优化网络性能,TTL1和TTL2均取其限定范围内最小值。 Figure 5 shows the flow chart of the multi-stage routing algorithm based on the probability of nodes encountering node damage probability. The input parameter at the entrance is the damage probability value of the message to be forwarded node a and the node it may meet. Next, perform a quick sort on the damaged probability values in the memory of node a. In the first step of routing, node a only transmits a copy of the coded packet to the node with the highest damage probability value according to the FTS model, and at the same time starts the timer and sets it to TTL 1. If it fails to meet the most damaged node within TTL 1 , the second step of routing is performed. In the second step of routing, node a only transmits a copy of the encoded packet to the second damaged node (the node whose damage probability value is in the top three of the sorting group) according to the TFS model, and starts the timer at the same time, set TTL 2 , if the TTL 2 If the most damaged node is not encountered within the time limit, the third step of routing is performed. The subsequent routing adopts the AS model, that is, the node transmits the encoded packet to the first encountered node after the AS routing model is enabled. To optimize network performance, both TTL 1 and TTL 2 take the minimum value within their limits.
实验环境参数设置Experimental environment parameter setting
本实验借助Opnet仿真平台实现,在3000m*3000m范围内部署150个普通移动节点,各节点射频功率范围为20m(注:这些参数构成节点稀疏的DTN,在实际环境中很常见),信道容量为2Mbps,假定各节点完全相同。MAC层协议使用IEEE802.11无线局域网标准协议,网络拓扑结构是随机生成的,仿真运行时间设定为2h,种子数设定为13,表1为仿真关键参数设置。 This experiment is implemented with the help of the Opnet simulation platform. 150 common mobile nodes are deployed within the range of 3000m*3000m, and the radio frequency power range of each node is 20m (Note: These parameters constitute a DTN with sparse nodes, which is very common in the actual environment), and the channel capacity is 2Mbps, assuming all nodes are identical. The MAC layer protocol uses the IEEE802.11 wireless LAN standard protocol. The network topology is randomly generated. The simulation running time is set to 2h, and the number of seeds is set to 13. Table 1 shows the key parameters of the simulation.
表1 仿真关键参数配置 Table 1 Simulation key parameter configuration
我们通过路由开销、传输延时、传输风险、有效传输率、吞吐量和权衡系数等6个参数评估了我们提出的方案与基于网络编码的喷射路由算法(SRNC)、基于网络编码的智能路由算法(IRNC)的网络性能和安全性。在配置时,我们通过正态分布生成DTN中链路e∈E可靠性数值。我们的仿真假设传输建立在最坏情况下,即所有攻击者都知道路径集并且各路径上最多只有一个攻击者。通过观察发现,试验中最优路径集P * 中最大路径数量为13。 We evaluated our proposed scheme with the Jet Routing Algorithm (SRNC) based on Network Coding, Intelligent Routing Algorithm (IRNC) Network Performance and Security. At configuration time, we pass the normal distribution Generate the link e∈E reliability value in DTN. Our simulations assume that the transmission is set up in the worst case where the set of paths is known to all attackers and there is at most one attacker on each path. It is found through observation that the maximum number of paths in the optimal path set P * in the experiment is 13.
路由开销和吞吐量Routing Cost and Throughput
路由开销是指在多路径路由中从源节点到目的节点的总跳数与单路径路由中最小跳数之商,基于节点的概率相遇节点受损概率的多阶段路由算法的路由开销c计算式如下: Routing overhead refers to the quotient of the total number of hops from the source node to the destination node in multi-path routing and the minimum number of hops in single-path routing, and the routing overhead c calculation formula of the multi-stage routing algorithm based on the probability of nodes encountering node damage probability as follows:
图6显示了随着仿真时间增加的路由开销,随着仿真时间推移,路由开销总体都呈上升趋势。SRNC方案中,随着仿真时间的推移,网络中开始有攻击者,使得丢弃的数据包越来越多,即源节点的编码包需要更多开销才能到达目的节点,甚至部分编码包丢弃严重时,路由开销为无穷大,即根本无法到达目的节点。而IRNC方案随着仿真时间推移,表现出的路由开销也是逐渐增大,但由于源节点有冗余包注入,在仿真时间较长时会表现出相对较好的路由开销,但在仿真一开始时,由于存在冗余包,路由开销会较大。在我们的方案MRNC中,由于目的节点仅在检测到网络中出现选择性数据丢弃攻击时,才会通知源节点产生冗余因子提高链路容断性,并且基于相邻节点受损概率的多阶段路由优化了路径选择合理性,因此路由开销随仿真时间增加影响不大。 Figure 6 shows the routing overhead that increases with the simulation time, and the overall routing overhead tends to rise as the simulation time goes by. In the SRNC scheme, as the simulation time goes by, there are attackers in the network, which makes more and more data packets discarded, that is, the coded packets of the source node need more overhead to reach the destination node, and even some coded packets are seriously discarded. , the routing cost is infinite, that is, the destination node cannot be reached at all. As the simulation time goes by, the IRNC scheme shows a gradual increase in routing overhead, but because the source node has redundant packet injection, it will show a relatively good routing overhead when the simulation time is long, but at the beginning of the simulation When , due to the existence of redundant packets, the routing overhead will be large. In our scheme MRNC, since the destination node only detects the selective data discarding attack in the network, it will notify the source node to generate a redundancy factor to improve the link tolerance, and based on the multiplicity of adjacent node damage probability Stage routing optimizes the rationality of path selection, so the routing overhead has little effect with the increase of simulation time.
仿真中的吞吐量是指在单位时间内通过DTN网络的编码包量,由等式 The throughput in the simulation refers to the amount of coded packets passing through the DTN network in unit time, which is expressed by the equation
我们可以进一步进行如下推导: We can proceed further as follows:
当时,可得第一阶段路由网络吞吐量为V1计算式;第二阶段路由的网络吞吐量V2推到类似。由于第三阶段路由采用AS模型,其吞吐量可近似看成常量,故网络总吞吐量V为V1、V2与之和。 when , the network throughput of the first-stage routing can be calculated as V 1 ; the network throughput of the second-stage routing can be pushed to be similar to V 2 . Since the third-stage routing adopts the AS model, its throughput can be approximately regarded as a constant , so the total network throughput V is V 1 , V 2 and Sum.
由图7可以看出,SRNC方案由于其完全忽略安全性能,通过喷射路由尽可能实现包的交付,因此其网络吞吐量在仿真初始阶段较大,但随着仿真时间推移,网络中出现了攻击者,其网络吞吐量呈现负增长趋势。IRNC方案中,由于每次只选择完全受损节点,因此网络吞吐量较小,且变化不大。而我们的方案一开始由于需要计算各节点相邻节点受损概率等参数,起始网络吞吐量并不大,随着仿真时间的推移,由于采用多阶段安全路由,我们的方案在仿真后期网络吞吐量方面显示出较大的优势。 It can be seen from Figure 7 that the SRNC scheme completely ignores the security performance and realizes the delivery of packets as much as possible through spray routing, so its network throughput is relatively large in the initial stage of the simulation, but as the simulation time goes by, attacks appear in the network Or, its network throughput presents a negative growth trend. In the IRNC scheme, because only completely damaged nodes are selected each time, the network throughput is small and does not change much. At the beginning, our scheme needs to calculate parameters such as the damage probability of adjacent nodes of each node, and the initial network throughput is not large. In terms of throughput, it shows a big advantage.
有效传输率与传输时延Effective transmission rate and transmission delay
为了更清晰观察有效传输率和传输延时随攻击者数量变化关系,在本次仿真中将攻击者数量分别设置为0,2,4,6,8,10,12个。同时,节点的有效传输率是指到达目的节点的数据包与源节点产生的所有数据包之商,其计算式如下: In order to more clearly observe the relationship between the effective transmission rate and transmission delay with the number of attackers, the number of attackers is set to 0, 2, 4, 6, 8, 10, and 12 in this simulation. At the same time, the effective transmission rate of a node refers to the quotient of the data packets arriving at the destination node and all the data packets generated by the source node, and its calculation formula is as follows:
为了能够清楚比较三个方案的有效传输率,进行两种配置:在攻击者数量不大于4个时,在网络中引入1个摆渡节点;当攻击者数量大于4个时,引入3个摆渡节点。所谓摆渡节点,就是使用仿真工具中可控移动设备在不同的地理区域间按预设的路径移动,采集节点信息并在遇到目的节点时进行转发,此时除了摆渡节点外,不要求其它普通节点执行路由功能,从而简化DTN路由协议,能够更清晰得出有效传输率的变化。从图8中可看出,随着仿真时间的增加,相比于其它两个方案,我们方案有效传输率并未有很明显下降。 In order to be able to clearly compare the effective transmission rates of the three schemes, two configurations are performed: when the number of attackers is not greater than 4, one ferry node is introduced in the network; when the number of attackers is greater than 4, three ferry nodes are introduced . The so-called ferry node is to use the controllable mobile device in the simulation tool to move according to the preset path between different geographical areas, collect node information and forward it when it encounters the destination node. At this time, except for the ferry node, no other common Nodes perform routing functions, thereby simplifying the DTN routing protocol and obtaining changes in the effective transmission rate more clearly. It can be seen from Figure 8 that as the simulation time increases, compared with the other two schemes, the effective transmission rate of our scheme does not decrease significantly.
由于容迟网络间断性连接的特性,其传输延时通常较大。传输延时tdelay是指消息从源节点传输到目的节点的时间,计算式如下,其中ts为消息从源节点发送的时间,tr是目的节点所接收的时间消息时间,t为待传输的消息数量。 Due to the intermittent connection characteristics of the delay-tolerant network, its transmission delay is usually large. The transmission delay t delay refers to the time for the message to be transmitted from the source node to the destination node. The calculation formula is as follows, where t s is the time when the message is sent from the source node, t r is the time of the message received by the destination node, and t is the time to be transmitted number of messages.
从图9可以看出,SRNC方案中,通常情况下节点在与任何相遇节点都会路由消息副本,使得网络中各节点均以近似相同概率参与路由,传输延时大部分耗费在消息等待和在节点间传输过程两方面。但在受损DTN环境下,由于攻击者的存在,其传输延时会受到极大影响。IRNC方案中,节点是按照一定的策略转发数据包,传输延时主要耗费在策略执行、消息等待和在节点间传输过程三方面,故在攻击者较少时其延时大于SRNC方案,但随着网络中攻击者数量增大,策略在一定程度上削弱了攻击行为对传输延时的影响,因此其后期表现出由于SRNC方案的传输延时。而我们提出的MRNC方案,尽管在源节点对id进行hash和节点间彼此认证中会耗费部分时间,但在考虑多种攻击抵制时有良好的传输延时性能,结合多阶段路由,提升了数据包传输的目的节点的概率,使得网络延时进一步降低。 It can be seen from Figure 9 that in the SRNC scheme, nodes usually route message copies with any nodes they meet, so that each node in the network participates in routing with approximately the same probability, and most of the transmission delay is spent on message waiting and at nodes. There are two aspects of the transfer process. However, in a compromised DTN environment, due to the existence of attackers, its transmission delay will be greatly affected. In the IRNC scheme, the nodes forward data packets according to a certain policy, and the transmission delay is mainly consumed in three aspects: policy execution, message waiting, and the transmission process between nodes. As the number of attackers in the network increases, the strategy weakens the impact of the attack behavior on the transmission delay to a certain extent, so the transmission delay due to the SRNC scheme appears in the later period. The MRNC scheme we proposed, although it will take some time for the source node to hash the id and authenticate each other between nodes, it has good transmission delay performance when considering multiple attack resistance, combined with multi-stage routing, it improves data The probability of the destination node of the packet transmission further reduces the network delay.
传输风险transmission risk
为了更清晰观察传输风险和有效传输率随攻击者数量变化关系,在本次仿真中将攻击者数量分别设置为0,2,4,6,8,10,12个,将风险类型分为单风险和联合风险。单传输风险是指在受到某一种攻击威胁下,传输过程中消息受损的概率。单传输风险risks计算式与一条传输路径各链路的端的节点risk风险值有关。图10显示了在不同攻击者数量(各攻击者攻击类型相同)下的单传输风险。图中表明,随着攻击者数量增加,单传输风险显著上升。显然,我们所提方案的风险值远小于SRNC和IRNC方案,并且这个数值并非我们算法最优值。仿真结果证实,我们的方案进一步增强了在最坏环境下DTN的安全性。 In order to more clearly observe the relationship between the transmission risk and the effective transmission rate as the number of attackers changes, the number of attackers is set to 0, 2, 4, 6, 8, 10, and 12 in this simulation, and the risk types are divided into single risk and joint risk. Single transmission risk refers to the probability of message damage during transmission under the threat of a certain attack. The single transmission risk risk s calculation formula is related to the node risk value at each link end of a transmission path. Figure 10 shows the single-transmission risk under different numbers of attackers (all attackers have the same attack type). The figure shows that as the number of attackers increases, the risk of single transfer increases significantly. Obviously, the risk value of our proposed scheme is much smaller than that of SRNC and IRNC schemes, and this value is not the optimal value of our algorithm. The simulation results confirm that our scheme further enhances the security of DTN in the worst environment.
(34) (34)
(35) (35)
联合传输风险是指是指在受到1种以上种攻击威胁下,传输过程中消息受损的概率。联合传输风险riskj与网络中各条路径抵御上述提到的威胁能力相关。图11显示了在不同攻击者数量(含1种以上攻击类型)下的联合传输风险相比较于SRNC和IRNC方案,我们的方案在抵制联合风险方面的性能十分突出,在多种威胁同时存在时,传输风险的变化也非十分明显。但是,如果攻击者数量t≧|P*|时,几乎所有的编码包都会被损坏。 Joint transmission risk refers to the probability of message damage during transmission under the threat of more than one attack. The joint transmission risk risk j is related to the ability of each path in the network to resist the above-mentioned threats. Figure 11 shows the joint transmission risk under different numbers of attackers (including more than one attack type). Compared with the SRNC and IRNC schemes, our scheme has outstanding performance in resisting joint risks. , the change in transmission risk is not very obvious. However, if the number of attackers t≧|P * |, almost all encoded packets will be corrupted.
权衡系数trade-off factor
仿真中利用权衡因子来衡量网络性能与传输风险之间的折中关系。根据各路径优化编码包分配模型中源节点的经过编码最终生成的数据包数公式进一步推导可知: trade-off factor To measure the trade-off relationship between network performance and transmission risk. The formula for the number of data packets finally generated by the source node in the coded packet distribution model is optimized according to each path Further derivation shows that:
在仿真时,界定。随着权衡系数从0.65变化到0.75,可以看出传输风险值在下降,而网络性能也在降低,即上述的吞吐量、传输延时和有效传输率等参数值减少。通过调整,我们可以得到更优的安全风险值,正如关于等式源节点的经过编码最终生成的数据包数n分析的一样,随着的增加,安全风险和传输率会下降。从图12的三维关系可以看出,在我们的MRNC方案中,随着权衡系数的变化,整体网络性能和传输风险都呈同向变化趋势。因此,证明了我们的方案实现了网络性能和传输风险的最优折中。 When simulating, define . With the trade-off coefficient From 0.65 to 0.75, it can be seen that the transmission risk value is decreasing, and the network performance is also decreasing, that is, the above-mentioned parameters such as throughput, transmission delay and effective transmission rate decrease. by adjusting , we can get a better security risk value, just as the analysis of the number n of encoded data packets finally generated by the source node of the equation, as increases, security risks and transmission rates will decrease. From the three-dimensional relationship in Figure 12, it can be seen that in our MRNC scheme, with the change of the trade-off coefficient, the overall network performance and transmission risk both change in the same direction. Therefore, it is proved that our scheme achieves an optimal trade-off between network performance and transmission risk.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310107131.5A CN104079483B (en) | 2013-03-29 | 2013-03-29 | Multistage safety routing method based on network code in a kind of Delay Tolerant Network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310107131.5A CN104079483B (en) | 2013-03-29 | 2013-03-29 | Multistage safety routing method based on network code in a kind of Delay Tolerant Network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104079483A true CN104079483A (en) | 2014-10-01 |
CN104079483B CN104079483B (en) | 2017-12-29 |
Family
ID=51600535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310107131.5A Expired - Fee Related CN104079483B (en) | 2013-03-29 | 2013-03-29 | Multistage safety routing method based on network code in a kind of Delay Tolerant Network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104079483B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105933224A (en) * | 2016-04-15 | 2016-09-07 | 国网河北省电力公司 | An Opportunistic Routing Method for Improving Communication Network Reliability |
WO2019047558A1 (en) * | 2017-09-05 | 2019-03-14 | 东北大学 | Wmn anonymous communication method based on network coding |
CN110138432A (en) * | 2019-05-16 | 2019-08-16 | 哈尔滨工业大学(深圳) | DTN data transmission method based on network code and relaying caching auxiliary |
CN112055012A (en) * | 2018-07-24 | 2020-12-08 | 中国计量大学 | Distributed system |
CN112564712A (en) * | 2020-11-26 | 2021-03-26 | 中国科学院计算技术研究所 | Intelligent network coding method and equipment based on deep reinforcement learning |
CN113179256A (en) * | 2021-04-12 | 2021-07-27 | 中国电子科技集团公司第三十研究所 | Time information safety fusion method and system for time synchronization system |
CN113286302A (en) * | 2021-05-01 | 2021-08-20 | 贵州大学 | Node identity authentication scheme based on block chain for worm detection of wireless sensor network |
CN114205370A (en) * | 2020-08-28 | 2022-03-18 | 希捷科技有限公司 | Distributed Secure Edge Heterogeneous Storage Network With Byzantine Attack Resilience |
CN114374613A (en) * | 2022-01-11 | 2022-04-19 | 江西理工大学 | Vehicle-mounted delay tolerant network coding maximum stream setting method based on soft interval support vector machine |
CN115242702A (en) * | 2022-09-22 | 2022-10-25 | 广州优刻谷科技有限公司 | Internet of things node optimal path planning method and system |
CN119316335A (en) * | 2024-12-12 | 2025-01-14 | 北京航天联智科技有限公司 | A data redundancy coding method and system based on deterministic network collaborative transmission |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667885A (en) * | 2009-09-29 | 2010-03-10 | 天津大学 | Method for reducing redundancy message by using network coding technique on DTN or ICN network |
JP2010068191A (en) * | 2008-09-10 | 2010-03-25 | Kddi Corp | Dtn data transfer method using network coding, fixed station performing the method, and system including fixed station and mobile terminal |
-
2013
- 2013-03-29 CN CN201310107131.5A patent/CN104079483B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010068191A (en) * | 2008-09-10 | 2010-03-25 | Kddi Corp | Dtn data transfer method using network coding, fixed station performing the method, and system including fixed station and mobile terminal |
CN101667885A (en) * | 2009-09-29 | 2010-03-10 | 天津大学 | Method for reducing redundancy message by using network coding technique on DTN or ICN network |
Non-Patent Citations (1)
Title |
---|
周瑞涛等: "《基于社区的容迟网络路由方法》", 《北京理工大学学报》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105933224A (en) * | 2016-04-15 | 2016-09-07 | 国网河北省电力公司 | An Opportunistic Routing Method for Improving Communication Network Reliability |
CN105933224B (en) * | 2016-04-15 | 2020-04-17 | 国网河北省电力公司 | Opportunistic routing method for improving reliability of communication network |
WO2019047558A1 (en) * | 2017-09-05 | 2019-03-14 | 东北大学 | Wmn anonymous communication method based on network coding |
CN112055012B (en) * | 2018-07-24 | 2022-11-25 | 中国计量大学 | Distributed Systems |
CN112055012A (en) * | 2018-07-24 | 2020-12-08 | 中国计量大学 | Distributed system |
CN110138432B (en) * | 2019-05-16 | 2021-06-29 | 哈尔滨工业大学(深圳) | DTN data transmission method based on network coding and relay buffer assistance |
CN110138432A (en) * | 2019-05-16 | 2019-08-16 | 哈尔滨工业大学(深圳) | DTN data transmission method based on network code and relaying caching auxiliary |
CN114205370A (en) * | 2020-08-28 | 2022-03-18 | 希捷科技有限公司 | Distributed Secure Edge Heterogeneous Storage Network With Byzantine Attack Resilience |
CN114205370B (en) * | 2020-08-28 | 2024-12-13 | 希捷科技有限公司 | Distributed secure edge heterogeneous storage network with Byzantine attack resilience |
CN112564712A (en) * | 2020-11-26 | 2021-03-26 | 中国科学院计算技术研究所 | Intelligent network coding method and equipment based on deep reinforcement learning |
CN112564712B (en) * | 2020-11-26 | 2023-10-10 | 中国科学院计算技术研究所 | An intelligent network coding method and device based on deep reinforcement learning |
CN113179256A (en) * | 2021-04-12 | 2021-07-27 | 中国电子科技集团公司第三十研究所 | Time information safety fusion method and system for time synchronization system |
CN113179256B (en) * | 2021-04-12 | 2022-02-08 | 中国电子科技集团公司第三十研究所 | Time information safety fusion method and system for time synchronization system |
CN113286302A (en) * | 2021-05-01 | 2021-08-20 | 贵州大学 | Node identity authentication scheme based on block chain for worm detection of wireless sensor network |
CN114374613B (en) * | 2022-01-11 | 2023-09-15 | 江西理工大学 | Vehicle-mounted delay tolerant network coding maximum stream setting method based on soft interval support vector machine |
CN114374613A (en) * | 2022-01-11 | 2022-04-19 | 江西理工大学 | Vehicle-mounted delay tolerant network coding maximum stream setting method based on soft interval support vector machine |
CN115242702A (en) * | 2022-09-22 | 2022-10-25 | 广州优刻谷科技有限公司 | Internet of things node optimal path planning method and system |
CN119316335A (en) * | 2024-12-12 | 2025-01-14 | 北京航天联智科技有限公司 | A data redundancy coding method and system based on deterministic network collaborative transmission |
CN119316335B (en) * | 2024-12-12 | 2025-02-18 | 北京航天联智科技有限公司 | Data redundancy coding method and system based on deterministic network cooperative transmission |
Also Published As
Publication number | Publication date |
---|---|
CN104079483B (en) | 2017-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104079483B (en) | Multistage safety routing method based on network code in a kind of Delay Tolerant Network | |
CN102158864A (en) | Mobile AD Hoc network self-adapting secure routing method based on reliability | |
Baburaj | Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks | |
Zhu et al. | An opportunistic batch bundle authentication scheme for energy constrained DTNs | |
CN103166965B (en) | A kind of coding of the multi-source network based on subspace attribute pollutes defence method | |
Sekar et al. | Lightweight reliable and secure multicasting routing protocol based on cross‐layer for MANET | |
Li et al. | Epidemic attacks in network-coding-enabled wireless mesh networks: Detection, identification, and evaluation | |
CN101170498A (en) | A Secure Multipath Routing Method Applied to Ad hoc Networks | |
Lima et al. | Network coding security: Attacks and countermeasures | |
CN107295505B (en) | Multi-path secure transmission method for wireless sensor network | |
Jain et al. | Secure AODV routing protocol based on homomorphic digital signature | |
Zhang et al. | Selective forwarding attacks against data and ack flows in network coding and countermeasures | |
Mehta et al. | Survey on multimedia transmission using network coding over wireless networks | |
US10855578B1 (en) | Anonymous communications network utilizing bridging connections between broadcast domains | |
Mohammadizadeh et al. | SEAODV: Secure efficient AODV routing protocol for MANETs networks | |
Ashouri et al. | FOMA: Flexible overlay multi-path data aggregation in wireless sensor networks | |
Alwan et al. | A Secure mechanism for QOS routing in wireless sensor networks | |
Bao et al. | Secure efficient routing based on network coding in the delay tolerant networks | |
Ye et al. | Intelligent on-demand routing protocol for ad hoc network | |
Nie et al. | Analysis of interference performance of tactical radio network | |
Zhang et al. | Flooding attacks against network coding and countermeasures | |
Hamamreh et al. | RAD: reinforcement authentication DYMO protocol for MANET | |
Al Agha | Network Coding | |
CN114143004B (en) | Deployment method, device, equipment and storage medium of random forwarding network | |
Ahmad et al. | Security on MANETs using block coding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171229 |