CN112492583A - Software defined wireless sensor network management method based on cloud edge-side cooperation - Google Patents

Software defined wireless sensor network management method based on cloud edge-side cooperation Download PDF

Info

Publication number
CN112492583A
CN112492583A CN202011366917.5A CN202011366917A CN112492583A CN 112492583 A CN112492583 A CN 112492583A CN 202011366917 A CN202011366917 A CN 202011366917A CN 112492583 A CN112492583 A CN 112492583A
Authority
CN
China
Prior art keywords
node
network
wireless sensor
routing
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011366917.5A
Other languages
Chinese (zh)
Other versions
CN112492583B (en
Inventor
赖英旭
罗士尧
刘静
王一鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN202011366917.5A priority Critical patent/CN112492583B/en
Publication of CN112492583A publication Critical patent/CN112492583A/en
Application granted granted Critical
Publication of CN112492583B publication Critical patent/CN112492583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a software-defined wireless sensor network management method based on cloud edge-side cooperation, which designs a cloud edge-side cooperation software-defined wireless sensor network architecture aiming at the characteristic of limited wireless sensor network resources and the management problem and the safety problem of a large-scale network currently faced by a wireless sensor network, and designs a wireless sensor network management mechanism and a safety management mechanism based on the architecture. The cloud side end cooperative software defined wireless sensor network system structure can obviously improve the management efficiency of the network. The network management mechanism can adjust the topological structure according to the global information of the wireless sensor network and can reasonably configure the limited resources of the network to prolong the life cycle of the network. The safety management mechanism identifies abnormal nodes by dynamically measuring the nodes when the wireless sensor network operates and deletes the nodes from the network through network management, so that the safety of the wireless sensor network in the data acquisition process is ensured.

Description

Software defined wireless sensor network management method based on cloud edge-side cooperation
Technical Field
The invention relates to a software defined wireless sensor network management method based on cloud edge-side cooperation in the technical field of wireless sensor networks.
Background
With the development of sensor technology, wireless communication technology, edge computing and other technologies, the internet of things is widely applied. The internet of things is widely applied to environment monitoring, smart cities, smart power grids, smart homes and medical care systems. The wireless sensor network is an important basic part of the Internet of things as a wireless ad hoc network, and plays an important role in data acquisition and transmission. In order to meet the application requirements of the upper layer of the internet of things, it is often necessary to deploy a large-scale wireless sensor network in a specific place, such as an unattended field environment, and the management problem and the security problem of the wireless sensor network are also accompanied. Firstly, the wireless sensor network nodes deployed in a large scale can complicate the topology structure of the wireless network, and the network management has high difficulty, high cost and low efficiency. Secondly, because the sensor nodes are limited by volume and cost, storage, calculation and energy resources of the sensor nodes are limited, no fixed infrastructure provides guarantee for the nodes, and how to reasonably configure the limited resources of each node is very important. In addition, the sensor nodes are very easy to attack when deployed in an unattended field environment.
The idea of Software-Defined Networking (SDN) can solve the problem that wireless sensor networks face many. The software defined network concept separates the data plane and the control plane of the traditional network, collects the information of the devices in the network through the controller to carry out centralized management and control on the network, and dynamically adjusts the network according to the requirements of the network. The problem that global knowledge information cannot be obtained inherent in the wireless sensor network can be solved by utilizing the idea of the SDN, the complex topological structure in the wireless sensor network is effectively managed, and the states of different nodes are correspondingly configured according to different network requirements, so that the configuration of node resources is more reasonable.
In summary, the existing wireless sensor network has the problems of network topology management caused by large-scale deployment due to the requirement of upper-layer application, limited node resources caused by volume and cost limitation, node safety and the like. The idea of the software defined network provides a new solution for solving the problems faced by the current wireless sensor network. Therefore, the invention provides a software-defined wireless sensor network management method based on cloud edge-side cooperation.
Disclosure of Invention
In order to solve the problems of topology management, reasonable configuration of limited resources and node safety of the wireless sensor network, the invention applies the idea of software defined network to the wireless sensor network according to the service requirement of the Internet of things and the characteristics of the wireless sensor network to solve the problem that the wireless sensor network cannot acquire global knowledge information, and provides a software defined wireless sensor network management method based on cloud edge-end cooperation.
In order to achieve the purpose of the invention, the invention designs a software defined wireless sensor network architecture, and divides the network into three layers of an application layer, a control layer and an infrastructure layer. Based on the structure, a network management mechanism and a security management mechanism of the wireless sensor network are provided. The topological structure of the network is effectively managed through a software management mechanism, and the safety of the nodes in operation is ensured through a safety management method.
The software defines a wireless sensor network architecture. The system structure comprises three layers of an application layer, a control layer and an infrastructure layer:
1. and (5) an application layer. The application layer is based on a data server of the cloud, and the requirements in different application scenes are met by compiling corresponding application programs.
2. And controlling the layer. A controller of the cloud device network is defined in the control layer. The controller is responsible for carrying out global perception on the state of each node in the network and carrying out corresponding decision so as to control the operation of the network. The controller is realized through the resources of the cloud, and a network management mechanism and a safety management mechanism are deployed in the controller.
3. And arranging a layer on the foundation. The infrastructure layer comprises edge device gateway nodes, terminal device sensor nodes and routing nodes. The edge device is a gateway node and is a bridge for communicating the upper cloud end device with the lower terminal device. The gateway node can realize communication with lower-layer terminal equipment through wireless communication, and simultaneously adopts a wired communication mode of a traditional network to perform data transmission with upper-layer cloud equipment. In the invention, a trusted platform control module is equipped for the gateway node to provide password support for the node and trusted storage. In addition, the trusted platform control module can provide necessary hardware basis for a network security scheme of a node deployment traditional network. And data transmission is carried out between the sensor node of the terminal equipment and the routing node in a wireless communication mode. The sensor nodes carry the sensors of corresponding types according to the requirements of upper-layer application to sense data in the environment and send the data to the routing nodes. The routing node is responsible for forwarding data in the wireless sensor network, and forwarding the data sent by the sensor node to the next routing node or an upper node.
A network management mechanism. The network management mechanism comprises three parts of network resource allocation, topology structure adjustment and node access and exit:
1. and (5) resource allocation. A wireless sensor network in an infrastructure layer includes sensor nodes and routing nodes. In the network operation process, the routing node is often responsible for forwarding data of a plurality of sensor nodes, which may result in too fast energy consumption of the routing node. In order to prolong the life cycle of the network and reasonably configure the limited resources in the wireless sensor network, the nodes responsible for routing need to be converted within a certain time, so that the energy consumption of each node is more balanced.
The resource allocation process is completed by the cloud device, the edge device and the terminal device in a cooperation mode. Routing information for each node in the software defined wireless sensor network is stored in the gateway node in addition to the controller. Each gateway node will store the routing information of the routing nodes and sensor nodes within its communication range. And after the controller node sends a strategy of replacing the routing node, the gateway node configures routing information for the new routing node according to the data stored by the gateway node. And adjusting the routing information of the corresponding sensor node.
2. And (5) adjusting the topological structure. Information of a node next to the node is stored in the routing information of each node. When the controller executes the topology adjustment process, the controller changes the next hop node information of the nodes by sending the control message to complete the adjustment of the topology structure of the wireless sensor network.
3. And the nodes enter and exit the network. The node access network mainly comprises a node applying for joining the network and a node leaving the network. When the node applies to join the network, the controller appoints the next hop node for the node according to the information of the node and the global information of the wireless sensor network and issues control information. The node leaves the wireless sensor network, and the node is deleted from the network when the security management mechanism judges that the node is abnormal. The controller broadcasts the node number of the abnormal node in the wireless sensor network by sending the control message, and the normal node receiving the message does not receive the data of the node any more and does not send the data to the node.
A security management mechanism. The security management is mainly to perform dynamic measurement on the sensor nodes and the routing nodes of the terminal equipment when the wireless sensor network operates. The dynamic measurement of the nodes is completed by the controller, and the dynamic measurement of the nodes by the controller is mainly carried out according to different behaviors of the nodes in the operation process. The basic setting layer has two types of terminal equipment sensor nodes and routing nodes. The main behavior of the sensor node is to periodically collect and transmit data in the environment through a sensor equipped in the node. The main behavior of a routing node is to forward data in the network. The main content of security management is to measure the identification information, security information and node network environment of the node, and measure the state of the node according to the sensing behavior and data forwarding behavior of the node.
The security management carries out dynamic measurement on the nodes to evaluate the trust degree of the nodes when the wireless sensor network operates, and for the nodes with lower trust degree, abnormal nodes are deleted from the network through a network management method, so that the security operation of the network is ensured.
The invention provides a software defined wireless sensor network management method based on cloud edge-side cooperation. The edge device gateway node is added to the network in which the cloud and the terminal are directly connected, and the cloud device and the terminal device are separated by the addition of the gateway node, so that the terminal device is prevented from being attacked by the network from the Internet. In addition, the invention also provides a network management method and a safety management method. The network management method manages the network based on the software defined wireless sensor network structure, and can improve the management efficiency of the wireless sensor network. The safety management method can identify abnormal nodes when the wireless sensor network operates normally, the safe operation of the network is guaranteed, and the energy consumed by the deployment of the safety method is within an acceptable range.
Drawings
FIG. 1 is a schematic diagram of the general structure of the present invention
FIG. 2 is a diagram of a software defined wireless sensor network architecture based on cloud edge-side collaboration
FIG. 3 is a block diagram of various devices in a software defined wireless sensor network
FIG. 4 is a diagram of a node control message structure
FIG. 5 is a flow diagram of network management
FIG. 6 is a flow diagram of security management
FIG. 7 is a graph of experimental results of efficiency of a software defined wireless sensor network based on cloud edge-side cooperation
FIG. 8 is a graph showing the results of safety management experiments
Detailed Description
The present invention will be described in detail below with reference to specific embodiments shown in the drawings.
Fig. 1 is a general structural diagram of a software-defined wireless sensor network management method based on cloud edge cooperation according to the present invention, as shown in fig. 1.
Firstly, after each node in the wireless sensor network is electrified, networking is carried out according to a network management mechanism. The controller calculates the topological structure of the network according to the global information of the wireless sensor network and issues a control message to configure the topology of the network. When the network normally operates, the security management mechanism dynamically measures the nodes according to the behavior of each node in the network through the mutual coordination of the controller and the gateway node, and evaluates the trust degree of the nodes. And if the node is judged to be an abnormal node, deleting the node from the network through a network management mechanism, adjusting the topological structure of the rest nodes in the network, and continuing to execute the data acquisition and transmission tasks by the rest nodes.
A network management mechanism. The network management mechanism comprises three parts of network resource allocation, topology structure adjustment and node access and exit:
1. and (5) resource allocation. A wireless sensor network in an infrastructure layer includes sensor nodes and routing nodes. In the network operation process, the routing node is often responsible for forwarding data of a plurality of sensor nodes, which may result in too fast energy consumption of the routing node. In order to prolong the life cycle of the network and reasonably configure the limited resources in the wireless sensor network, the nodes responsible for routing need to be converted within a certain time, so that the energy consumption of each node is more balanced.
The resource allocation process is completed by the cloud device, the edge device and the terminal device in a cooperation mode. Routing information for each node in the software defined wireless sensor network is stored in the gateway node in addition to the controller. Each gateway node will store the routing information of the routing nodes and sensor nodes within its communication range. And after the controller node sends a strategy of replacing the routing node, the gateway node configures routing information for the new routing node according to the data stored by the gateway node. And adjusting the routing information of the corresponding sensor node.
2. And (5) adjusting the topological structure. Information of a node next to the node is stored in the routing information of each node. When the controller executes the topology adjustment process, the controller changes the next hop node information of the nodes by sending the control message to complete the adjustment of the topology structure of the wireless sensor network.
3. And the nodes enter and exit the network. The node access network mainly comprises a node applying for joining the network and a node leaving the network. When the node applies to join the network, the controller appoints the next hop node for the node according to the information of the node and the global information of the wireless sensor network and issues control information. The node leaves the wireless sensor network, and the node is deleted from the network when the security management mechanism judges that the node is abnormal. The controller broadcasts the node number of the abnormal node in the wireless sensor network by sending the control message, and the normal node receiving the message does not receive the data of the node any more and does not send the data to the node.
A security management mechanism. The nodes are first formalized for the security management mechanism. The formalization of the nodes is described as follows:
the Node identification information may be defined as Node _ ID (Node _ R, Node _ L), where Node _ ID is a Node number of a Node, Node _ L is location information of a Node, and Node _ R is role information of a Node.
The node network environment information may be defined as NE (Next _ ID), where port is a type of wireless communication Protocol used for inter-node communication. Next _ ID is the node number of the Next hop node.
The Node security information may be defined as SE ═ UID (UID, Node _ Hash), where UID is the unique serial number of the Node when it leaves the factory, and Node _ Hash is the Hash value of the boot code and the function code of the Node.
A node may be described by node identification information, node network environment, node security information. Therefore, in a wireless Sensor network, a Sensor Node may be described by a triplet Sensor _ Node (Node, NE, SE), and a routing Node may be described by a triplet Route _ Node (Node, NE, SE).
The security management mechanism is mainly used for dynamically measuring the nodes when the wireless sensor network operates. The dynamic measurement of the nodes is completed by the controller, so that the controller can sense the nodes in the wireless sensor network globally and make corresponding decisions according to the security policy. The dynamic measurement of the node by the controller is mainly carried out according to different behaviors of the node in the operation process, and the main behavior of the sensor node is to periodically acquire data in the environment and transmit the data through a sensor equipped in the node. Routing nodes mainly forward data in the network.
The dynamic measurement of the node should be within a certain time intervalIs carried out at a time interval of delta T, at [ T-delta T, T]And measuring the nodes for n times in the time interval. Thus, a metric function of the controller node to the subordinate nodes can be defined, and T (n) is setα,niT) is a controller node nαTo node niWhere t is the current time, so the controller node's metric function for the subordinate nodes is as follows:
1. node information metric function
The controller node measures the function t to the information of the subordinate nodes1(nα,ni)。
t1(nα,ni)=(id∧id')∧(r∧r')∧(s∧s')
Wherein: id is a node number of the node itself, id ' is an expected value of a node number stored in an upper node, r is a node role, r ' is an expected value of a node role stored in the upper node, and s is a node state s ' is an expected value of a node state stored in the upper node.
2. Node network environment metric function
The network environment measurement function of the controller node to the subordinate nodes is t2(nα,ni)。
t2=(nα,ni)=(p∧p')∧(nid∧nid')
Wherein p is an inter-node communication protocol, p 'is an expected value of the inter-node communication protocol stored in an upper node, nid is a next hop node number of the node, and nid' is an expected value of the next hop node number of the node stored in the upper node. And the controller adjusts the network topology in real time according to the credibility measurement value of each node in the network to change the next hop node of the node.
3. Node forwarding behavior metric function
The controller node has a function t for measuring the forwarding behavior of the subordinate nodes3(nα,ni)。
After data sensing in the wireless sensor network, multi-hop forwarding is carried out, the data forwarding is an important behavior in the wireless sensor network and can directly influence the security of the network, and the nodes are paired through the forwarding behavior of the nodesThe point-wise metric may reflect the trustworthiness of the node. For the time interval delta t, the total amount of data packets forwarded by the nodes is set as dzThe number of abnormal packets in these packets is de
Figure BDA0002803118840000101
The proportion of the abnormal data packets forwarded by the nodes can reflect the credibility of the nodes, and the larger the proportion of the abnormal data packets in the data packets forwarded by the nodes in a certain time interval is, the lower the credibility of the nodes is, and the smaller the measurement value of the corresponding measurement component of the nodes is.
4. Node-aware behavior metric function
For the wireless sensor network, another important behavior besides data transmission is the data sensing behavior of the sensor nodes, the data sensing period of the nodes directly affects the behavior periods of all the nodes of the wireless sensor network, and if malicious nodes continuously and frequently send data to the network, the time interval is far less than the sensing period, and the energy of each node in the network can be rapidly consumed. In addition, if the sensing period of a node is longer than the normal sensing period, the data of the node can be tampered, and the safety of the wireless sensor network can be affected by the possible fault of the node. Therefore, malicious nodes can be discovered by dynamically measuring the sensing period of the sensor nodes so as to ensure the safe operation of the wireless sensor network.
The perception behavior measurement function of the gateway node to the sensor node is t4(nα,ni)。
Figure BDA0002803118840000102
In the formula, a and a' are coefficients which can be set according to network conditions, q is a data acquisition period of a sensor, r is normal sensing delay in a network, and x is a sensing period of a node.
The dynamic measurement can be carried out on the nodes by the four node behavior measurement subfunctions when the wireless sensor network operates, n times of measurement can be carried out on the forwarding behavior and the sensing delay behavior of the nodes in the time interval of [ T-delta T, T ], the credibility of the behavior measurement of the nodes is changed along with the time change, and in order to adjust the weights of the credibility of different times in the time interval, the time decay function is defined as follows according to the time change rule:
Figure BDA0002803118840000111
therefore, the controller node calculates the node trust according to the measurement result in the time interval [ T-delta T, T ], and the trust calculation formula of the routing node is as follows:
T(nα,ni,Δt)=t1×t2×T'3(formula 1)
Wherein
Figure BDA0002803118840000112
Wherein T (n)α,niΔ t) controller node nαFor routing node niConfidence, t, calculated from n measurement results over a time period of Δ t1As a result of node information measurement, t2As a result of the network environment metrics of the nodes,
Figure BDA0002803118840000113
for the xth controller node n in the time period of delta tαFor routing node niThe result of the forwarding behavior metric of (1).
The calculation formula of the sensor node trust degree in the time interval [ T-delta T, T ] is as follows:
T(nα,nj,Δt)=t1×t2×T'4(formula 2)
Wherein
Figure BDA0002803118840000114
Wherein T (n)α,njΔ t) controller node nαFor sensor node njConfidence, t, calculated from n measurement results over a time period of Δ t1As a result of node information measurement, t2As a result of the network environment metrics of the nodes,
Figure BDA0002803118840000115
for the xth controller node n in the time period of delta tαFor sensor node njIs measured.
The trust degrees of the routing node and the sensor node can be calculated through formulas 1 and 2, and the controller judges whether the node is an abnormal node according to the trust degree of the receiving node and a trust degree threshold value set by a network manager. If the abnormal node exists in the network, the node information is transmitted to a network management mechanism to delete the abnormal node from the network.
Fig. 2 is a diagram of a software-defined wireless sensor network structure based on cloud edge cooperation, as shown in fig. 2.
The software defines a wireless sensor network architecture. The system structure comprises three layers of an application layer, a control layer and an infrastructure layer:
1. and (5) an application layer. The application layer is based on a data server of the cloud, and the requirements in different application scenes are met by compiling corresponding application programs.
2. And controlling the layer. A controller of the cloud device network is defined in the control layer. The controller is responsible for carrying out global perception on the state of each node in the network and carrying out corresponding decision so as to control the operation of the network. The controller is realized through the resources of the cloud, and a network management mechanism and a safety management mechanism are deployed in the controller.
3. And arranging a layer on the foundation. The infrastructure layer comprises edge device gateway nodes, terminal device sensor nodes and routing nodes. The edge device is a gateway node and is a bridge for communicating the upper cloud end device with the lower terminal device. The gateway node can realize communication with lower-layer terminal equipment through wireless communication, and simultaneously adopts a wired communication mode of a traditional network to perform data transmission with upper-layer cloud equipment. The gateway node does not have data acquisition capability, so that no sensor is required to be carried. The gateway node separates the traditional internet from the wireless sensor network, and the gateway node faces attacks from the internet. In the invention, a trusted platform control module is equipped for the gateway node to provide password support for the node and trusted storage. In addition, the trusted platform control module can provide necessary hardware basis for a network security scheme of a node deployment traditional network.
And data transmission is carried out between the sensor node of the terminal equipment and the routing node in a wireless communication mode. The sensor nodes carry the sensors of corresponding types according to the requirements of upper-layer application to sense data in the environment and send the data to the routing nodes. The routing node is responsible for forwarding data in the wireless sensor network, and forwarding the data sent by the sensor node to the next routing node or an upper node.
Fig. 3 is a block diagram of various devices in a software defined wireless sensor network, as shown in fig. 3.
Fig. 3 (a) shows a controller structure. The structure in the figure is a logic structure inside the controller, and the controller is implemented in the cloud device. The control functions of the controller mainly include two mechanisms, namely a network management mechanism of the wireless sensor network and a security management mechanism of the wireless sensor network.
Fig. 3 (b) shows an edge device structure. The edge device gateway node is used as a bridge for communicating the control layer and the infrastructure layer, and the communication device comprises a wireless communication module for communicating with the lower layer routing node and a wired network module for communicating with the upper layer controller node and the data server. The communication between the gateway node and the upper layer controller node is realized through a wired network card integrated in the gateway node, and the communication between the gateway node and the lower layer terminal equipment is realized through an IEEE 802.15.4 protocol. The gateway node does not have the capability of data acquisition, so that any sensor does not need to be carried. Besides the necessary processor and memory, the gateway node is also provided with a trusted cryptographic module or a trusted platform module to provide cryptographic support for the node. The gateway device is implemented by adopting a device based on an SOC chip, such as a raspberry group, which has GB-level memory and storage space and is powered by a stable DC power supply.
Fig. 3 (c) is a terminal device configuration. The sensor node and the routing node of the terminal equipment in the infrastructure layer adopt a universal hardware structure, and the sensor node and the routing node can mutually convert between two roles of the routing node and the sensor node according to the control information of the controller. The structure of the node comprises a processor, a memory and a wireless communication module. In addition, each node can be provided with N different sensors according to the requirements of an application scene, and data collected by the sensors are forwarded to the gateway node through the routing node and are transmitted to the server for storage so as to support the application layer.
Fig. 4 is a structure diagram of a node control message, as shown in fig. 4.
Transmitting node number (Send-ID): the node number of the data sending node, and the node sending the control message in the architecture is a controller node or a gateway node.
Packet Length (Length): the total length of the data packet.
Communication mode (Model): the communication modes of the control message include Broadcast (Broadcast), Unicast (Multicast) and Multicast (Unicast).
Receiving node number (Rec-ID): and receiving the node number of the message node.
Node Role (Node-Role): the node roles of the receiving node include a sensor node (SensorNode), a routing node (routing node), and a Gateway node (Gateway).
Message Type (Type): and the control message type is used for indicating whether the control message is a message for controlling the node resource allocation, topology adjustment or the node entering and exiting the network.
Management Action (Action): this field is used to control the specific behavior of the node. This field is divided into four types according to the function of network management, and the Action field of each control message can only contain one Action of one type. Role transition behavior may transition the roles of the nodes, including routing node to sensor node (R to S) and sensor node to routing node (S to R). Modifying Next hop nodes (Change Next IDs) the Next hop nodes of the nodes may be modified to adjust the wireless sensor network topology. Setting a Next hop node (Set Next ID) may Set a Next hop node for a node. The node number (Not Receive ID) that is Not received may set the node that receives the control message Not to Receive any message of the node, and the node number (Not Send ID) that is Not sent may set the node that receives the control message Not to Send any message to the node.
Fig. 5 is a flow chart of network management, as shown in fig. 5, including:
and step 51, the node joins the wireless sensor network.
And step 52, controlling the node to generate a routing strategy of the node according to the global information of the current network, and issuing the routing strategy to the node to configure routing information for the node.
And 53, acquiring and transmitting data by the sensor nodes in the wireless sensor network, forwarding the data acquired by the sensor nodes by the routing nodes, forwarding the data to the next routing node or gateway node by the routing nodes, and sending the data to the data server by the gateway node so as to finish the acquisition and transmission of the data.
And step 54, the controller judges whether the wireless sensor network needs to adjust the routing node according to the current running state of the network and the node resource use condition. If so, step 59 is performed, and if not, step 55 is performed.
And step 55, the controller acquires abnormal node information given by the security management mechanism.
And step 56, the security mechanism gives the relevant information of the abnormal node according to the security requirement of the network, and judges whether the abnormal node exists in the network according to the result of the security mechanism. If so, step 57 is performed, and if not, step 513 is performed.
Step 57, the controller broadcasts the abnormal node information to the network.
And step 58, the nodes in the wireless sensor network receive the message of the broadcast abnormal node, read the related information of the abnormal node and disconnect the communication with the abnormal node.
And step 59, the controller issues a control message for replacing the routing node.
Step 510, the gateway node searches the routing information of the corresponding node in the locally stored routing information according to the control message.
Step 511, the gateway node transmits the routing information to the new routing node, and configures the routing information for the new routing node.
And step 512, after the routing node is replaced, the gateway node sends a control message to the sensor node needing to adjust the routing information according to the routing information stored in the local, and changes the next hop node of the sensor node.
Step 513, determine whether the data collection is completed. If so, step 514 is performed, and if not, step 53 is performed.
Step 514 ends the data collection job.
Fig. 6 is a schematic flow chart of security management, as shown in fig. 6, including:
step 61, a safety management mechanism deployed in the controller in the operation process of the wireless sensor network passes through t1Identity information of the node is measured.
Step 62, the security management mechanism passes t2A network environment of the node is measured.
Step 63, passing t for the routing node according to the forwarding behavior thereof3Its forwarding behavior is measured.
Step 64, for the sensing action of the sensor node, passing t4Its sensing behavior is measured.
And step 65, measuring the node for n times in the time interval of [ T-delta T, T ], wherein the measurement result which is closer to the current time occupies larger weight, and calculating the measurement result for n times in a period of time according to a time decay function and a formula 1.
Step 66, calculating the trust T (n) of the routing node according to the measurement resultα,niΔ T) and the degree of trust of the sensor node T (n)α,ni,Δt)。
And 67, evaluating the trust degrees of the routing node and the sensor node through a trust degree threshold value set by the network, and judging whether an abnormal node exists in the network. If so, step 68 is performed, and if not step 69 is performed.
And step 68, transmitting the node information of the abnormal nodes existing in the network to a network management mechanism to delete the abnormal nodes from the network.
Step 69, the measurement ends.
Fig. 7 is a graph of experimental results of efficiency of a software-defined wireless sensor network based on cloud edge-side cooperation.
In the experimental process, the wireless sensor networks of four scales are respectively tested, and the total number of the sensor nodes and the routing nodes is respectively 5,10,15 and 20. The network of each scale starts to operate for 120s from networking, and Packet Sniffer equipment is used for capturing data packets in the network in the operation process. When the node scale exceeds a certain number of traditional wireless sensor networks, compared with the software-defined wireless sensor network, on the premise of transmitting the same amount of sensing data, the efficiency of the software-defined wireless sensor network is higher than that of the traditional wireless sensor network.
Fig. 8 is a graph showing the results of the safety management experiment.
Fig. 8 (a) shows that when the network faces node hijacking attack, the security management mechanism proposed in the present invention is significantly improved compared with the normal rate of the traditional network node, and can ensure the secure operation of the network. In the case of Sybil attack, the normal node ratio in the network is significantly improved compared to the conventional network, and the security management mechanism of the software-defined wireless sensor network can effectively ensure the secure operation of the network.
As shown in (c) of fig. 8, when a node in the software-defined wireless sensor network faces an energy exhaustion attack, the ratio of normal nodes in the network is significantly improved compared with the conventional network by the security management mechanism and the topology management mechanism. The main purpose of the energy exhaustion attack is to occupy node resources to exhaust the energy of the nodes, and in the software-defined wireless sensor network, the controller can quickly identify abnormal nodes and delete the nodes from the network by dynamically measuring the sensing behaviors and the forwarding behaviors of the nodes. As shown in (d) of fig. 8, the energy resources of the nodes can be effectively protected from being consumed by the attacker when facing the energy exhaustion attack through the dynamic measurement mechanism, so as to ensure the safe operation of the network.
It should be understood that although the description is made in terms of embodiments, not every embodiment includes only a single embodiment, and such description is for clarity only, and those skilled in the art will recognize that the embodiments described herein may be combined as appropriate, and implemented as would be understood by those skilled in the art.
The above-listed series of detailed descriptions are merely specific illustrations of possible embodiments of the present invention, and they are not intended to limit the scope of the present invention, and all equivalent embodiments or modifications that do not depart from the technical spirit of the present invention should be included within the scope of the present invention.

Claims (4)

1. The software defined wireless sensor network management method based on cloud edge-side cooperation is characterized by comprising the following steps: dividing a network into an application layer, a control layer and an infrastructure layer; based on the structure, a network management mechanism and a safety management mechanism of the wireless sensor network are provided; the topological structure of the network is effectively managed through a software management mechanism, and the safety of the nodes in operation is ensured through a safety management method;
the control layer in the software defined wireless sensor network based on cloud edge-end cooperation is responsible for controlling the operation of the wireless sensor network, and the controller is implemented in a cloud computing environment; the controller is responsible for carrying out global perception on the state of each node in the network and carrying out corresponding decision so as to control the operation of the network;
the infrastructure layer in the software defined wireless sensor network based on cloud edge-side cooperation comprises an edge device gateway node, a terminal device sensor node and a routing node; the edge device gateway node is realized by adopting a device based on an SOC chip and supports a wired communication mode and a wireless communication mode of a network; the gateway node is provided with a trusted password module or a trusted platform control module to provide safe storage for the node; the sensor node and the routing node of the terminal equipment are realized by adopting equipment based on an MUC chip, and a wireless communication module is arranged to complete wireless communication with the gateway node; the sensor node carries a sensor of a corresponding type according to the requirement of upper application to sense the data in the environment and sends the data to the routing node; the routing node is responsible for forwarding data in the wireless sensor network, and forwarding the data sent by the sensor node to the next routing node or gateway node.
2. The software-defined wireless sensor network management method based on cloud edge-side collaboration as claimed in claim 1, wherein: defining the format of control message in network and the execution flow of network management mechanism;
the described network control message format includes:
Send-ID: the node number of the data sending node, and the node sending the control message in the system structure is a controller node or a gateway node; length: the total length of the data packet; model: the mode of the control message comprises Broadcast, Unicast and Multicast; Rec-ID: receiving the node number of the message node; Node-Role: receiving Node roles of nodes, wherein the Node roles comprise a Sensor Node, a Routing Node and a Gateway Node Gateway; type: the control message type indicates whether the control message is a message for controlling node resource allocation, topology adjustment or controlling the node to enter and exit the network; and (4) Action: this field is used to control the specific behavior of the node; according to the function of network management, the field is divided into four types, and the Action field of each control message only contains one behavior of one type; r to S and S to R represent that the nodes carry out role conversion, Change Next ID represents the Next hop node of the changed node, Set Next ID represents that the Next hop node is Set for the node, and Not Receive ID and Not Send ID represent that the node does Not Receive the message and does Not Send the message to the node.
3. The software-defined wireless sensor network management method based on cloud edge-side collaboration as claimed in claim 2, wherein: the execution flow of the described network management mechanism comprises:
step 51, adding the node into a wireless sensor network;
step 52, controlling the node to generate a routing strategy of the node according to the global information of the current network, and issuing the routing strategy to the node to configure routing information for the node;
step 53, data acquisition and transmission are carried out on sensor nodes in the wireless sensor network, the routing nodes forward the data acquired by the sensor nodes, the routing nodes forward the data to the next routing node or gateway node, and the gateway node sends the data to a data server so as to complete the data acquisition and transmission;
step 54, the controller judges whether the wireless sensor network needs to adjust the routing node according to the current running state of the network and the use condition of the node resource; if yes, go to step 59, if not, go to step 55;
step 55, the controller acquires abnormal node information given by a safety management mechanism;
step 56, the security mechanism gives the relevant information of the abnormal node according to the security requirement of the network, and judges whether the abnormal node exists in the network according to the result of the security mechanism; if so, step 57 is performed, and if not, step 513 is performed.
Step 57, the controller broadcasts abnormal node information to the network;
step 58, the nodes in the wireless sensor network receive the message of the broadcast abnormal node, read the related information of the abnormal node, and disconnect the communication with the abnormal node;
step 59, the controller issues a control message for replacing the routing node;
step 510, the gateway node searches the routing information of the corresponding node in the locally stored routing information according to the control message;
step 511, the gateway node transmits the routing information to the new routing node, and configures the routing information for the new routing node;
step 512, after the routing node is replaced, the gateway node sends a control message to the sensor node needing to adjust the routing information according to the routing information stored in the local, and changes the next hop node of the sensor node;
step 513, judging whether the data acquisition work is finished; if yes, go to step 514, if not, go to step 53;
step 514 ends the data collection job.
4. The software-defined wireless sensor network management method based on cloud edge-side collaboration as claimed in claim 1, wherein: the execution flow of the safety management mechanism comprises the following steps:
step 61, a safety management mechanism deployed in the controller in the operation process of the wireless sensor network passes through t1Measuring the identity information of the node;
step 62, the security management mechanism passes t2Measuring the network environment of the node;
step 63, passing t for the routing node according to the forwarding behavior thereof3Measuring the forwarding behavior of the network;
step 64, for the sensing action of the sensor node, passing t4Measuring the sensing behavior of the sensor;
step 65, measuring the node for n times in a period of time interval, wherein the weight occupied by the measurement result which is closer to the current time is larger, and calculating the measurement result for n times in a period of time according to a time decay function;
step 66, calculating the trust of the routing node and the trust of the sensor node according to the measurement result;
step 67, evaluating the trust of the routing node and the sensor node through a trust threshold set by the network, and judging whether an abnormal node exists in the network; if so, go to step 68, if not, go to step 69;
step 68, transmitting the node information of the abnormal node existing in the network to a network management mechanism to delete the abnormal node from the network;
step 69, the measurement ends.
CN202011366917.5A 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method Active CN112492583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011366917.5A CN112492583B (en) 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011366917.5A CN112492583B (en) 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method

Publications (2)

Publication Number Publication Date
CN112492583A true CN112492583A (en) 2021-03-12
CN112492583B CN112492583B (en) 2024-04-12

Family

ID=74936913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011366917.5A Active CN112492583B (en) 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method

Country Status (1)

Country Link
CN (1) CN112492583B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411766A (en) * 2021-06-17 2021-09-17 天津大学 Intelligent Internet of things comprehensive sensing system and method
CN113609048A (en) * 2021-07-20 2021-11-05 国网天津市电力公司 Cloud-side business collaborative interaction method for power Internet of things
CN113747468A (en) * 2021-08-04 2021-12-03 武汉慧联无限科技有限公司 Control method of electronic device, LoRa gateway, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation
CN108540310A (en) * 2018-03-15 2018-09-14 南京邮电大学 A kind of behavior prediction method based on wireless network collaborative perception
CN109982287A (en) * 2019-03-13 2019-07-05 北京工业大学 Forestry multisensor fire alarm warning system based on zigbee wireless sensor network
CN111491303A (en) * 2020-04-10 2020-08-04 许瑜超 Building communication system based on L oRa-Mesh and building communication ad hoc network method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation
CN108540310A (en) * 2018-03-15 2018-09-14 南京邮电大学 A kind of behavior prediction method based on wireless network collaborative perception
CN109982287A (en) * 2019-03-13 2019-07-05 北京工业大学 Forestry multisensor fire alarm warning system based on zigbee wireless sensor network
CN111491303A (en) * 2020-04-10 2020-08-04 许瑜超 Building communication system based on L oRa-Mesh and building communication ad hoc network method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵军云;王欢;朱国春;: "无线传感器网络安全问题分析与研究", 电脑知识与技术, no. 09, 25 March 2011 (2011-03-25) *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411766A (en) * 2021-06-17 2021-09-17 天津大学 Intelligent Internet of things comprehensive sensing system and method
CN113411766B (en) * 2021-06-17 2022-05-24 天津大学 Intelligent Internet of things comprehensive sensing system and method
CN113609048A (en) * 2021-07-20 2021-11-05 国网天津市电力公司 Cloud-side business collaborative interaction method for power Internet of things
CN113747468A (en) * 2021-08-04 2021-12-03 武汉慧联无限科技有限公司 Control method of electronic device, LoRa gateway, electronic device and storage medium
CN113747468B (en) * 2021-08-04 2024-01-05 武汉慧联无限科技有限公司 Control method of electronic equipment, loRa gateway, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112492583B (en) 2024-04-12

Similar Documents

Publication Publication Date Title
Rahman et al. Smartblock-sdn: An optimized blockchain-sdn framework for resource management in iot
Balaji et al. Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks
CN112492583B (en) Cloud edge end cooperation-based software defined wireless sensor network management method
Huang et al. A novel deployment scheme for green internet of things
He et al. Multiperiod scheduling for wireless sensor networks: A distributed consensus approach
Zhang et al. A dynamic trust establishment and management framework for wireless sensor networks
Deepakraj et al. Markov-chain based optimization algorithm for efficient routing in wireless sensor networks
Liu et al. Security cooperation model based on topology control and time synchronization for wireless sensor networks
Luo et al. Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network
WO2012051777A1 (en) Access control method and device for wireless sensor network (wsn) to access telecommunication network via multiple gateways
Srikanth et al. Energy Efficient Trust Node Based Routing Protocol (EETRP) to Maximize the Lifetime of Wireless Sensor Networks in Plateaus.
Yuxing et al. Weak node protection to maximize the lifetime of wireless sensor networks
Lin et al. Security function virtualization based moving target defense of SDN-enabled smart grid
Gupta et al. Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks
Li et al. Mobile agents-based intrusion detection system for mobile ad hoc networks
Vijay et al. Intertwine Connection-Based Routing Path Selection for Data Transmission in Mobile Cellular Networks and Wireless Sensor Networks
Ali Realization of a robust fog-based green VANET infrastructure
Maheswari et al. Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network
Nandhini et al. A novel security and energy efficient data aggregation for medical Internet of Things using trust
Niewiadomska-Szynkiewicz Energy aware communication protocols for wireless sensor networks
Bhat et al. Survey on routing protocols for Internet of Things
Liu et al. Collision-constrained minimum energy node-disjoint multipath routing in ad hoc networks
Nobahary et al. ISOT: distributed selfish node detection in internet of things
Wang et al. A variable weight based fuzzy data fusion algorithm for WSN
Guruprasath et al. Performance Analysis of Clustering Technique using LEACH in Wireless Sensor Networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant