CN105611536A - Method for defending black hole attack based on active detection in wireless sensor network - Google Patents

Method for defending black hole attack based on active detection in wireless sensor network Download PDF

Info

Publication number
CN105611536A
CN105611536A CN201610121977.8A CN201610121977A CN105611536A CN 105611536 A CN105611536 A CN 105611536A CN 201610121977 A CN201610121977 A CN 201610121977A CN 105611536 A CN105611536 A CN 105611536A
Authority
CN
China
Prior art keywords
route
node
network
black hole
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610121977.8A
Other languages
Chinese (zh)
Other versions
CN105611536B (en
Inventor
刘安丰
刘语欣
江良珊
刘潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201610121977.8A priority Critical patent/CN105611536B/en
Publication of CN105611536A publication Critical patent/CN105611536A/en
Application granted granted Critical
Publication of CN105611536B publication Critical patent/CN105611536B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for defending a black hole attack based on active detection in a wireless sensor network. A plurality of detection routes are established in a region in which network energy is abundant and the wireless sensor network is far away from a base station, and an attacker being unaware that the established routes are the detection routes also launches an attack to the detection routes, so that the attacker is exposed, and behavior and position information of the attacker and credibility information of a node can be obtained. After the information is obtained, the region which is under the black hole attack can be avoided when real data routing is performed, so that information of a black hole can be obtained under the condition that sensitive data of a system are unavailable or few data are lost, and data routing security of the wireless sensor network is ensured. Residual energy of a network is fully utilized, and the network service life is not shortened under the condition of enhancing the network security.

Description

The method of resisting black hole attack based on active probe in wireless sensor network
Technical field
The invention belongs to wireless sensor network security field, particularly in a kind of wireless sensor network based on initiativelyThe method of resisting black hole attack of surveying.
Background technology
Wireless sensor network be by a large amount of each other by multi-hop wireless link and the sensor node of communicating by letter withThe wireless network that the mode of self-organizing and multi-hop forms, can apply to industry monitoring widely, and agricultural is civilian, environmental monitoring,Battlefield, ocean, in the various particular surroundings such as fire and application, is considered to the Key technology of the important internet of things in futureOne of. The safety problem of wireless sensor network is the important research topic of a class. Wherein to avoid problem be wireless sensing in black holeA kind of important mechanisms that ensures safety in device network, its research has great importance.
Black hole attack is the wherein the most typical attack of one, and black hole attack is so a kind of attack: attackFirst person breaks through some nodes, or catches some nodes, and these nodes just become the black hole node that assailant controls. Black hole jointPoint abandons the packet of all these nodes of process, thereby causes abandoning of sensitive data, or causes base station can not receive numberAccording to. Because wireless sensor network makes a policy according to the information in node perceived environment, if assailant stop important orPerson's sensitive data is sent to base station, will cause network entirely ineffective, or more seriously does the decision-making making mistake. According to grindingStudy carefully discovery, in sensor network, much attacks are all relevant to black hole attack, and black hole attack can destroy existing route planSlightly, make base station can not correctly receive data, cause network function and performance to suffer damage. Therefore how to detect with avoiding black hole and attackHit for wireless sensor network security and have great importance.
But detect with avoiding black hole attack research and there is very high challenge. Have and considerablely attacked about black holeThe research of hitting. These researchs mainly concentrate on following strategy: (a) avoidance strategy in black hole. For black hole attack, conventional sideMethod is to avoid or get around the region at place, black hole. But the prerequisite that this strategy is implemented is to know the position in black hole, butIt is very difficult obtaining position, black hole, in existing research, whether arrives base station often according to data route in the pastJudge and in route, whether have black hole. The common deficiency of this class strategy is: be with data route data to the acquisition of black hole informationThe loss of bag is that cost obtains, and therefore, is a kind of means to save the situation afterwards occurring after accident, ability after system is caused damageCan obtain assailant's information. Another do not need to know in advance position, black hole avoid with the strategy that gets around black hole be: willPacket is divided into M part, then, is divided into different paths and sends (multichannel route), only needs T part (T≤M) to be received by base stationJust can recover information. In this method, even if do not know the position in black hole, also can improve the probability that successfully transmits data, depositDeficiency be to send M piece of data, base station may receive more than essential T piece of data simultaneously, thereby causes the energy of networkAmount consumes excessive.
Another kind is avoided attacking preferably, and the method that improves route success rate is credible route. Propose very nowMany nodes according to selection trusted node (high degree of belief) carry out the research of route. The principal character of these researchs is: buildingWhen vertical route, select the node that degree of belief is high at every turn, high because the high node of degree of belief completes successfully the possibility of route, because ofAnd, the route of setting up by planting this mode, it successfully transmits data to, and to reach the probability of base station also higher. Thereby this methodObtain research comparatively widely.
But also there are some challenging problems in the method for routing based on trusting at present: the core that (1) trusts route existsIn the acquisition of node confidence, but in most research, be all that hypothesis node confidence can obtain, for example: mostlyNumber research is thought, obtains, but how to obtain in wireless sensor network between node by trusting flooding mechanism, how to passBroadcast and unclear. (2) validity problem that energy consumes, the energy of wireless sensor network is extremely limited. Therefore, how abundantUtilize the limited energy of wireless sensor network, and can improve as far as possible network life and become an important problem. ButBe, in current major part research, only the acquisition of degree of belief just need to consume a large amount of energy with diffusion, thereby to network lifeCause larger impact; (3) security aspect. Because the calculating of trust value in the past has uncertainty, thereby cause calculatingThe result of coming is indefinite to the guidance of route, thereby is difficult to the position of clear and definite definite node, is more difficult to isolate malicious node. WithUpper explanation research in the past also exists is worth the further place of research.
Summary of the invention
The invention provides a kind of method of resisting black hole attack based on active probe in wireless sensor network, its orderBe, initiate to survey route by active, node confidence computation model is proposed, overcome wireless network in prior art and supportingWhen imperial black hole attack, network life is short, and node confidence indefinite cause resist the problem that black hole attack dynamics is not high.
A method of resisting black hole attack based on active probe in wireless sensor network, according to sensor networkThe abundant situation of energy and produce the detection route of unequal number amount;
More detection route is initiated in the region that dump energy is many, and it is few that quantity is initiated in the few region of dump energySurvey route, and nearly base station area could not initiated to survey route in remaining region;
In detection routing procedure, whether nodes records has been subject to black hole attack, if be subject to black hole attack, reducesIts degree of belief, improves its degree of belief to the node of successful route;
In the time of data route, when finding down hop, node select the node of high degree of belief to carry out route as down hop.
Data route is network demand, and surveying route is that the method for the invention is newly-increased, surveys route and does not transmit numberAccording to bag;
Can obtain the degree of belief situation of node owing to surveying route, thus can identification and reduce the trust of black hole nodeDegree, thus in the time of data route, avoid the region of black hole attack, thereby improved data route and successfully arrive the probability of base station, carryHigh network security.
For the node that is l apart from base station distance, the detection route number that it sends is following formula:
Wherein, dlFor the data volume that the node that is l apart from base station distance is born, dl=((z+1)+(z(1+z)r)/2l)λ,R is network radius, and r is the transmission radius of node, and λ is event occurrence rate; κ1For data packet length and detection packetThe ratio of length, κ2For the ratio of data packet length and packet header length;Be the length of surveying route, unit is jumping figure, and ω isWhether successfully the every process of detection route ω jumps backward initiation and surveys the detection packet that the node of route returns; dmaxApart from base stationThe data volume of bearing of nearest node.
The degree of belief C of described node calculates as follows:
C = f s u c c e s s f t o t a l
Wherein, fsuccessRepresent that node successfully forwards the number of times of routing iinformation, ftotalRepresent total forwarding routing times.
When described node is found down hop, select the node of high degree of belief to carry out route as down hop, refer to selection relayingThe node that in node set, degree of belief is the highest carries out route. The total power consumption that reduces network might not make the network longevityLife is improved, and only has the energy consumption ability that reduces hot spot region effectively to improve network life, and reduces with increase non-thermalThe energy consumption in some region can not impact network life.
Beneficial effect
The invention provides a kind of method of resisting black hole attack based on active probe in wireless sensor network, foundationThe abundant situation of energy of sensor network and produce the detection route of unequal number amount; Set up multiple in the abundant region of network energySurvey route, be to survey route because assailant does not know this, thereby also can initiate these to survey the attack of route, thereby makeObtain assailant and exposed to the open air, so just can obtain assailant's behavior and positional information, and the degree of belief information of node, therebyInstruct and in the time really carrying out data route, avoid region, black hole, so just can not have or seldom damage at the sensitive data of systemIn situation about losing, obtain the information in black hole, thereby native system has good security performance.
Method of the present invention is (to improve network life), fully profit in the situation that reducing hot spot region energy consumption as far as possibleUse the route of initiating many detections away from the dump energy of base station area, the route of these detections can not reduce the life-span of network,But but can detect the credibility of node, thereby can improve the security of network route. By this mechanism, fully profitWith the energy efficiency of network. Pass through theory analysis and experiment showed, that the method for the invention is not less than at network lifeHave in the situation of research, energy efficiency raising reaches more than 4 times.
The energy that makes full use of residue of network organization goes the credibility of probe node, if malicious node, will be to surveying roadBy impacting, thereby cause route break, obtain in advance the relevant information of node.
Because multiple nodes have mutual detection, finally form the detection route of the complicated whole network of covering, make usCan Discern and judge go out the position of malicious node, there is the advantage that strategy does not have in the past. Identifying the confidence level of nodeAfter, in the selection of route, by selecting degree of belief high node, avoid occurring the region attacked, and along successfullySurvey route and carry out route, thereby improve the security performance of network.
Brief description of the drawings
Fig. 1 is the overall construction drawing of the inventive method;
Fig. 2 is the k in different values1,k2Under, application when the method for the invention apart from the node at different distance place, base stationDump energy support carry out the maximum hop count of " active probe road route ";
Fig. 3 is the data route success rate contrast schematic diagram of application the method for the invention and shortest route method;
Fig. 4 is the operation along with network, the success rate of data route contrast schematic diagram under each method;
Fig. 5 is along with the operation of network, the situation of change of data route success rate under the method for the invention;
Fig. 6 is under the method for the invention, and along with the operation of network, in network, malicious node and normal node is averageDegree of belief changes schematic diagram, wherein, (a) is malicious node, is (b) normal node.
Detailed description of the invention
Below in conjunction with example and accompanying drawing, the present invention is described further.
A method of resisting black hole attack based on active probe in wireless sensor network, as shown in Figure 1, according to passingThe abundant situation of energy of sensor network and produce the detection route of unequal number amount;
More detection route is initiated in the region that dump energy is many, and it is few that quantity is initiated in the few region of dump energySurvey route, and nearly base station area could not initiated to survey route in remaining region;
In detection routing procedure, whether nodes records has been subject to black hole attack, if be subject to black hole attack, reducesIts degree of belief, improves its degree of belief to the node of successful route;
In the time of data route, when finding down hop, node select the node of high degree of belief to carry out route as down hop.
In Fig. 1, the expression of dashed line hollow arrow is the detection route that node is initiatively initiated, and the packets of information of route is not negativeCarry, surveying route for every has certain length, just automatically ends route in the time of length that route reaches. Carry out in detection routeTime, do not know whether to be to survey route, thereby may launch a offensive owing to attacking node, thereby exposed black hole attack behavior to the open air,Thereby can determine the position in black hole. The node of launching a offensive is reduced to its degree of belief, and normal node improves its degree of belief.Like this, bring out the degree of belief that just can reduce black hole node while launching a offensive in black hole, improve the degree of belief of normal node. SurveyingRoute obtains on the basis of node confidence, just can instruct normal data route, (black arrow in figure when data routeShown route), each node select node that degree of belief is high as down hop to base station route, attack thereby can avoid black holeHit region (as the A node of avoiding black hole attack region and B node in Fig. 1), improve the security of network. Fig. 2 has provided distanceCan support to survey the jumping figure of route from the dump energy of sink different distance place node. As can be seen from Figure 2: network is non-Also there is a large amount of dump energies in region, hot-zone, again because the length of probe data packet is less, thereby at network radius R=500In the network of rice, the dump energy in non-thermal region region is enough surveyed route exploration length and is reached the long route of hundreds of jumpings. This illustrates netNetwork has enough energy to carry out quantity performed does not affect network life compared with large detection route.
Fig. 3 has provided the method for the invention and has not considered that the shortest route strategy under security mechanism carries out once whole netThe route success rate of network Data Collection. as can be seen from Figure 3: the route success rate of the whole network under strategy is also far away hereinHigher than shortest route strategy.
The experiment setting of Fig. 4 is: in the network of R=400 rice, dispose 1000 nodes, wherein node number in black hole is400, each takes turns Data Collection, and each node is only once surveyed route. As can be seen from Figure 4, the method for the inventionAlong with the operation of network, only to carry out after 7 secondary data collections, the success rate of data route has just approached 100%. And for the shortestRoute, its route success rate only 15% less than, even and adopt multichannel route, its route success rate is carried out 4 routes at the same timeSituation under, also 60% left and right only of its route success rate, and even more serious, in the mechanism of avoiding in this black hole, no matterThe time of the network operation, how long the success rate of data route can not rise, thereby, there is very large deficiency.
Fig. 5 has provided the situation of change of the method for the invention along with the service data route success rate of network, can from Fig. 5To find out, even the in the situation that of only carrying out surveying route 1 time, only pass through several Data Collections within 1 secondary data collection cycleAll after dates, the success rate of data route just almost approaches 100%.
Experiment scene in Fig. 6 signal is in network, altogether to dispose 1000 nodes, wherein 400 black hole nodes,In each Data Collection cycle, each node initiates once to survey route. Can find out from Fig. 6 (a) with (b), in institute of the present inventionState the decline gradually of the average trust value of malicious node in method lower network, and the trust value of normal node rises gradually. This saysBright method of the present invention can reduce the degree of belief of malicious node, and promotes the degree of belief of normal node, thereby can be good atInstruct route, improve internet security.
In sum, the method for the invention is by newly-increased route and the real-time adjustment node degree of belief surveyed, very bigLifting network resist the performance of attack, improved internet security.

Claims (4)

1. the method for resisting black hole attack based on active probe in wireless sensor network, is characterized in that: according to passingThe abundant situation of energy of sensor network and produce the detection route of unequal number amount;
More detection route is initiated in the region that dump energy is many, and the few detection of quantity is initiated in the few region of dump energyRoute, and nearly base station area could not initiated to survey route in remaining region;
In detection routing procedure, whether nodes records has been subject to black hole attack, if be subject to black hole attack, reduces its letterRen Du, improves its degree of belief to the node of successful route;
In the time of data route, when finding down hop, node select the node of high degree of belief to carry out route as down hop.
2. method according to claim 1, is characterized in that, for the node that is l apart from base station distance, and the spy that it sendsSurveying route number is following formula:
Wherein, dlFor the data volume that the node that is l apart from base station distance is born, dl=((z+1)+(z(1+z)r)/2l)λ,R is network radius, and r is the transmission radius of node, and λ is event occurrence rate; κ1For data packet length and detection packetThe ratio of length, κ2For the ratio of data packet length and packet header length;Be the length of surveying route, unit is jumping figure, and ω visitsWhether successfully the every process of survey route ω jumps backward initiation and surveys the detection packet that the node of route returns; dmaxApart from base stationThe data volume of bearing of near node.
3. method according to claim 1 and 2, is characterized in that, the degree of belief C of described node calculates as follows:
C = f s u c c e s s f t o t a l
Wherein, fsuccessRepresent that node successfully forwards the number of times of routing iinformation, ftotalRepresent total forwarding routing times.
4. method according to claim 3, is characterized in that, selects the joint of high degree of belief when described node is found down hopPoint carries out route as down hop, refers to and selects the highest node of degree of belief in via node set to carry out route.
CN201610121977.8A 2016-03-03 2016-03-03 The method for resisting black hole attack in wireless sensor network based on active probe Expired - Fee Related CN105611536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610121977.8A CN105611536B (en) 2016-03-03 2016-03-03 The method for resisting black hole attack in wireless sensor network based on active probe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610121977.8A CN105611536B (en) 2016-03-03 2016-03-03 The method for resisting black hole attack in wireless sensor network based on active probe

Publications (2)

Publication Number Publication Date
CN105611536A true CN105611536A (en) 2016-05-25
CN105611536B CN105611536B (en) 2019-06-11

Family

ID=55991006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610121977.8A Expired - Fee Related CN105611536B (en) 2016-03-03 2016-03-03 The method for resisting black hole attack in wireless sensor network based on active probe

Country Status (1)

Country Link
CN (1) CN105611536B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110505657A (en) * 2018-05-16 2019-11-26 中南大学 Method of data capture based on matrix fill-in technology in a kind of wireless sensor network
CN111510983A (en) * 2020-03-19 2020-08-07 东北电力大学 Wireless sensor network cluster head election method combining trust
CN112911584A (en) * 2020-12-16 2021-06-04 中南大学 Method for avoiding black hole node attack based on detection route to obtain node trust value in energy collection wireless sensor network
CN115297470A (en) * 2022-08-03 2022-11-04 中南大学 Black hole node detection method based on combination of active detection and backtracking in self-organizing sensor network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006284A (en) * 2010-11-02 2011-04-06 南京邮电大学 Credibility based QoS (Quality of Service) route selection method
KR101262992B1 (en) * 2011-08-19 2013-05-10 경희대학교 산학협력단 Intrusion detection apparatus and method for securing wireless sensor networks
CN103973423A (en) * 2014-05-27 2014-08-06 中南大学 Automatic single-data multi-confirmation send-and-wait repeat-request method of wireless sensor network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006284A (en) * 2010-11-02 2011-04-06 南京邮电大学 Credibility based QoS (Quality of Service) route selection method
KR101262992B1 (en) * 2011-08-19 2013-05-10 경희대학교 산학협력단 Intrusion detection apparatus and method for securing wireless sensor networks
CN103973423A (en) * 2014-05-27 2014-08-06 中南大学 Automatic single-data multi-confirmation send-and-wait repeat-request method of wireless sensor network

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110505657A (en) * 2018-05-16 2019-11-26 中南大学 Method of data capture based on matrix fill-in technology in a kind of wireless sensor network
CN111510983A (en) * 2020-03-19 2020-08-07 东北电力大学 Wireless sensor network cluster head election method combining trust
CN112911584A (en) * 2020-12-16 2021-06-04 中南大学 Method for avoiding black hole node attack based on detection route to obtain node trust value in energy collection wireless sensor network
CN115297470A (en) * 2022-08-03 2022-11-04 中南大学 Black hole node detection method based on combination of active detection and backtracking in self-organizing sensor network
CN115297470B (en) * 2022-08-03 2024-04-19 中南大学 Black hole node detection method based on combination of active detection and backtracking in self-organizing sensor network

Also Published As

Publication number Publication date
CN105611536B (en) 2019-06-11

Similar Documents

Publication Publication Date Title
Liu et al. Design and analysis of probing route to defense sink-hole attacks for Internet of Things security
Muraleedharan et al. Jamming attack detection and countermeasures in wireless sensor network using ant system
CN105611536A (en) Method for defending black hole attack based on active detection in wireless sensor network
CN100493088C (en) Method for applying cooperative enhancement mechanism to adhoc network
CN103095589B (en) The sensor nodes in wireless sensor network trust value management method of tree topology based on IPv6
Iuchi et al. Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network
CN107404718A (en) A kind of wireless sensor network malicious node detection method
CN111541494B (en) Location privacy protection method based on clustering structure in underwater acoustic sensor network
Saurabh et al. Cluster-based technique for detection and prevention of black-hole attack in MANETs
CN108040325B (en) Sybil node detection method based on RSSI value and credit degree
CN109756515B (en) Black hole attack detection and tracking method based on suspicion degree accumulation
CN103297973B (en) Witch's intrusion detection method in underwater sensor network
Dempsey et al. Intelligent sensing and classification in ad hoc networks: a case study
CN104185237A (en) Robustness optimization algorithm based on ant colony algorithm
CN103297955A (en) Wireless sensor network safety positioning method
CN104125572B (en) The Sybil attack detection methods cooperated based on node
CN113301571A (en) Strong defense method for malicious node attack in wireless sensor network
Abu-Elkheir et al. Position verification for vehicular networks via analyzing two-hop neighbors information
CN107040464A (en) Met the black hole nodal test method with forwarding information based on node in opportunistic network
Nadeem et al. A generalized intrusion detection & prevention mechanism for securing MANETs
CN103781075B (en) Method for detecting and positioning wormhole attack through mobile beacon node in wireless sensor network
Salve et al. AODV based secure routing algorithm against Sinkhole attack in wirelesses Sensor Networks
Sarigiannidis et al. Analysing indirect Sybil attacks in randomly deployed wireless sensor networks
CN105491561A (en) Multiple-data packet and multiple-ACK (acknowledgement) selective forwarding attack detection method
Labraoui et al. Secure range-free localization scheme in wireless sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190611

Termination date: 20200303

CF01 Termination of patent right due to non-payment of annual fee