CN112492583B - Cloud edge end cooperation-based software defined wireless sensor network management method - Google Patents

Cloud edge end cooperation-based software defined wireless sensor network management method Download PDF

Info

Publication number
CN112492583B
CN112492583B CN202011366917.5A CN202011366917A CN112492583B CN 112492583 B CN112492583 B CN 112492583B CN 202011366917 A CN202011366917 A CN 202011366917A CN 112492583 B CN112492583 B CN 112492583B
Authority
CN
China
Prior art keywords
node
network
routing
wireless sensor
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011366917.5A
Other languages
Chinese (zh)
Other versions
CN112492583A (en
Inventor
赖英旭
罗士尧
刘静
王一鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN202011366917.5A priority Critical patent/CN112492583B/en
Publication of CN112492583A publication Critical patent/CN112492583A/en
Application granted granted Critical
Publication of CN112492583B publication Critical patent/CN112492583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a cloud-edge-based collaborative software-defined wireless sensor network management method, which designs a cloud-edge-based collaborative software-defined wireless sensor network architecture aiming at the characteristic of limited wireless sensor network resources and the management problem and the security problem of a large-scale network currently faced by a wireless sensor network, and designs a wireless sensor network management mechanism and a security management mechanism based on the architecture. Yun Bianduan cooperated software defined wireless sensor network architecture can significantly improve the management efficiency of the network. The network management mechanism can adjust the topological structure according to the global information of the wireless sensor network, and can reasonably configure limited resources of the network to prolong the life cycle of the network. The security management mechanism identifies abnormal nodes by carrying out dynamic measurement on the nodes when the wireless sensor network operates and deletes the nodes from the network through network management, so that the security in the data acquisition process of the wireless sensor network is ensured.

Description

Cloud edge end cooperation-based software defined wireless sensor network management method
Technical Field
The invention relates to a cloud edge end cooperation-based software defined wireless sensor network management method in the technical field of wireless sensor networks.
Background
With the development of sensor technology, wireless communication technology, edge computing technology and the like, the Internet of things is widely applied. The internet of things is widely applied to environmental monitoring, smart cities, smart grids, smart homes and medical care systems. The wireless sensor network is an important basic part of the Internet of things as a wireless ad hoc network, and plays an important role in data acquisition and transmission. In order to meet the application requirements of the upper layer of the internet of things, a large-scale wireless sensor network is often required to be deployed in a specific place, such as an unattended field environment, and management problems and safety problems of the wireless sensor network are also caused. Firstly, the topology structure of the wireless network becomes complex due to the large-scale deployment of wireless sensor network nodes, and the network management difficulty, the cost and the efficiency are high. Secondly, because the sensor nodes are limited by volume and cost, storage, calculation and energy resources are limited, no fixed infrastructure is provided for the nodes, and how to reasonably configure the limited resources of each node is important. In addition, sensor nodes are extremely vulnerable to attack as they are deployed in unattended field environments.
The concept of Software Defined Networking (SDN) may solve many of the problems faced by wireless sensor networks. The software defined networking concept separates the data plane and the control plane of the traditional network, collects the information of the devices in the network through the controller to perform centralized management and control on the network, and dynamically adjusts the network according to the network requirements. The problem that global knowledge information cannot be obtained inherent in the wireless sensor network can be solved by utilizing the thought of SDN, complex topological structures in the wireless sensor network are effectively managed, and states of different nodes are correspondingly configured according to different network requirements, so that node resources are more reasonably configured.
In summary, the current wireless sensor network is deployed on a large scale due to the requirement of upper layer application, which causes the problem of network topology management, and the problems of limited node resources, node security and the like due to the limitation of volume and cost. The idea of the software defined network provides a new solution idea and method for solving the problems faced by the current wireless sensor network. Therefore, the invention provides a cloud side end cooperation-based software defined wireless sensor network management method.
Disclosure of Invention
In order to solve the problems of topology management, reasonable configuration of limited resources and node safety of the wireless sensor network, the invention applies the idea of a software defined network to the wireless sensor network according to the service requirements of the Internet of things and the characteristics of the wireless sensor network to solve the problem that the wireless sensor network cannot acquire global knowledge information, and provides a cloud side end cooperation-based software defined wireless sensor network management method.
In order to achieve the purpose of the invention, the invention designs a software-defined wireless sensor network architecture, which divides the network into three layers of an application layer, a control layer and an infrastructure layer. Based on the structure, a wireless sensor network management mechanism and a security management mechanism are provided. The topology structure of the network is effectively managed through a software management mechanism, and the security of the nodes in running is ensured through a security management method.
Software defined wireless sensor network architecture. Three levels of application layer, control layer, infrastructure layer are included in this architecture:
1. an application layer. The application layer is based on a cloud data server, and the requirements in different application scenes are met by writing corresponding application programs.
2. And a control layer. A controller of the cloud device network is defined in the control layer. The controller is responsible for globally sensing the states of all nodes in the network and making corresponding decisions to control the operation of the network. The controller is realized through cloud resources, and the network management mechanism and the security management mechanism are deployed in the controller.
3. And a base layer. The infrastructure layer includes an edge device gateway node, a terminal device sensor node, and a routing node. The edge equipment is gateway node and is the bridge between the upper cloud end equipment and the lower terminal equipment. The gateway node can communicate with the lower-layer terminal equipment through wireless communication, and meanwhile, data transmission is carried out with the upper-layer cloud equipment in a wired communication mode of a traditional network. In the invention, a gateway node is provided with a trusted platform control module to provide password support for the node and trusted storage. In addition, the trusted platform control module can also provide necessary hardware foundation for the nodes to deploy the network security scheme of the traditional network. And the data transmission is carried out between the terminal equipment sensor node and the routing node in a wireless communication mode. And the sensor nodes carry corresponding types of sensors according to the requirements of upper-layer applications to sense the data in the environment and send the data to the routing nodes. The routing node is responsible for forwarding data in the wireless sensor network, and forwarding the data sent by the sensor node to the next routing node or an upper node.
Network management mechanism. The network management mechanism comprises three parts of network resource configuration, topology structure adjustment and node access network:
1. and (5) resource allocation. The wireless sensor network in the infrastructure layer includes sensor nodes and routing nodes. In the network operation process, the routing node is often responsible for forwarding data of a plurality of sensor nodes, which can cause the energy consumption of the routing node to be too fast. In order to prolong the life cycle of the network, limited resources in the wireless sensor network are reasonably configured, and nodes responsible for routing need to be converted within a certain time, so that the energy consumption of each node is more balanced.
The resource allocation process is completed by the cooperation of the cloud end equipment, the side end equipment and the terminal equipment. The routing information for each node in the software defined wireless sensor network is stored in the gateway node in addition to the controller. Each gateway node will maintain routing information for routing nodes and sensor nodes within its communication range. After the controller node sends out the strategy for replacing the routing node, the gateway node configures routing information for the new routing node according to the data stored by the gateway node. And adjusts the routing information of the corresponding sensor node.
2. And (5) topology structure adjustment. The information of the next node of the nodes is stored in the routing information of each node. When the controller executes the topology adjustment process, the next hop node information of the nodes is changed by issuing control information to complete the adjustment of the topology structure of the wireless sensor network.
3. The nodes go in and out of the network. The node entering and exiting the network mainly comprises the node applying for joining the network and the node leaving the network. When the node applies for joining the network, the controller designates the next hop node for the node according to the information of the node and the global information of the wireless sensor network and issues control information. The node leaving the wireless sensor network is to delete the node from the network when the security management mechanism determines that the node is abnormal. The controller broadcasts the node number of the abnormal node in the wireless sensor network by issuing a control message, and the normal node receiving the message will not receive the data of the node and will not send the data to the node.
Security management mechanism. The security management is mainly to dynamically measure the sensor nodes and the routing nodes of the terminal equipment when the wireless sensor network is running. The dynamic measurement of the nodes is completed by the controller, and the dynamic measurement of the controller to the nodes is mainly carried out according to different behaviors of the nodes in the running process. There are two types of terminal device sensor nodes and routing nodes in the base set layer. The main behavior of the sensor node is to periodically collect and transmit data in the environment through sensors equipped with the node. The main behavior of the routing node is to forward data in the network. The main content of the security management is to measure the identification information, the security information and the network environment of the node, and measure the state of the node according to the sensing behavior and the data forwarding behavior of the node.
The security management carries out dynamic measurement on the nodes to evaluate the trust degree of the nodes when the wireless sensor network operates, and for the nodes with lower trust degree, the abnormal nodes are deleted from the network by a network management method, so that the security operation of the network is ensured.
The invention provides a cloud edge end cooperation-based software defined wireless sensor network management method. And an edge equipment gateway node is added in a network directly connected with the cloud and the terminal, and the cloud equipment and the terminal equipment are separated by adding the gateway node, so that the terminal equipment is protected from network attack from the Internet. In addition, the invention also provides a network management method and a security management method. The network management method manages the network based on the software defined wireless sensor network structure, and can improve the management efficiency of the wireless sensor network. The safety management method can identify abnormal nodes when the wireless sensor network normally operates, ensure the safe operation of the network, and ensure that the energy consumed by the deployment of the safety method is within an acceptable range.
Drawings
FIG. 1 is a schematic view of the overall structure of the present invention
FIG. 2 is a block diagram of a software defined wireless sensor network based on cloud-edge collaboration
FIG. 3 is a block diagram of various devices in a software defined wireless sensor network
Fig. 4 is a block diagram of a node control message
FIG. 5 is a flow chart of network management
FIG. 6 is a flow chart of security management
FIG. 7 is a graph of experimental results of efficiency of a software defined wireless sensor network based on cloud-edge co-ordination
FIG. 8 is a diagram of the results of a security management experiment
Detailed Description
The present invention will be described in detail below with reference to specific embodiments shown in the drawings.
Fig. 1 is an overall structure diagram of a software defined wireless sensor network management method based on cloud side cooperation, as shown in fig. 1.
Firstly, after each node in the wireless sensor network is electrified, networking is performed according to a network management mechanism. The controller calculates the topology structure of the network according to the global information of the wireless sensor network, and issues control information to configure the topology of the network. And when the network normally operates, the security management mechanism carries out dynamic measurement on the nodes according to the behaviors of all the nodes in the network through the mutual coordination of the controller and the gateway nodes, and evaluates the trust degree of the nodes. If the node is not abnormal, the task of data acquisition and transmission is continuously executed, if the node is judged to be the abnormal node, the node is deleted from the network through a network management mechanism, the topological structure of the rest nodes in the network is adjusted, and the rest nodes continuously execute the task of data acquisition and transmission.
Network management mechanism. The network management mechanism comprises three parts of network resource configuration, topology structure adjustment and node access network:
1. and (5) resource allocation. The wireless sensor network in the infrastructure layer includes sensor nodes and routing nodes. In the network operation process, the routing node is often responsible for forwarding data of a plurality of sensor nodes, which can cause the energy consumption of the routing node to be too fast. In order to prolong the life cycle of the network, limited resources in the wireless sensor network are reasonably configured, and nodes responsible for routing need to be converted within a certain time, so that the energy consumption of each node is more balanced.
The resource allocation process is completed by the cooperation of the cloud end equipment, the side end equipment and the terminal equipment. The routing information for each node in the software defined wireless sensor network is stored in the gateway node in addition to the controller. Each gateway node will maintain routing information for routing nodes and sensor nodes within its communication range. After the controller node sends out the strategy for replacing the routing node, the gateway node configures routing information for the new routing node according to the data stored by the gateway node. And adjusts the routing information of the corresponding sensor node.
2. And (5) topology structure adjustment. The information of the next node of the nodes is stored in the routing information of each node. When the controller executes the topology adjustment process, the next hop node information of the nodes is changed by issuing control information to complete the adjustment of the topology structure of the wireless sensor network.
3. The nodes go in and out of the network. The node entering and exiting the network mainly comprises the node applying for joining the network and the node leaving the network. When the node applies for joining the network, the controller designates the next hop node for the node according to the information of the node and the global information of the wireless sensor network and issues control information. The node leaving the wireless sensor network is to delete the node from the network when the security management mechanism determines that the node is abnormal. The controller broadcasts the node number of the abnormal node in the wireless sensor network by issuing a control message, and the normal node receiving the message will not receive the data of the node and will not send the data to the node.
Security management mechanism. To describe the security management mechanism, the nodes are first formally described. Formalized description of the nodes is as follows:
the Node identification information may be defined as node= (node_id, node_r, node_l), where node_id is a Node number of the Node, node_l is location information of the Node, and node_r is role information of the Node.
The node network environment information may be defined as ne= (Protocol, next_id), where portcol is a type of wireless communication Protocol used for inter-node communication. Next_id is the node number of the Next hop node.
The Node security information may be defined as se= (UID, node_hash), where UID is a unique serial number of the Node when shipped, and node_hash is a Hash value of the boot code and the function code of the Node.
A node may be described by node identification information, node network environment, node security information. So in a wireless Sensor network, a Sensor Node may be described by a triplet sensor_node= (Node, NE, SE), and a routing Node may be described by a triplet route_node= (Node, NE, SE).
The security management mechanism mainly carries out dynamic measurement on the nodes when the wireless sensor network is running. The dynamic measurement of the nodes is completed by the controller, so that the controller can globally sense the nodes in the wireless sensor network and make corresponding decisions according to the security policy. The dynamic measurement of the nodes by the controller is mainly carried out according to different behaviors of the nodes in the running process, and the main behavior of the sensor nodes is that data in the environment are periodically collected and transmitted through sensors equipped by the nodes. The routing node mainly forwards data in the network.
The dynamic measurement of the node should be performed within a certain time interval, and the time interval is set as delta T, and is set as [ T-delta T, T]And measuring the node n times in the time interval. Thus, the metric function of the controller node to the lower node can be defined, and T (n) α ,n i T) is the controller node n α To node n i Where t is the current time, the metric function of the controller node to the lower node is as follows:
1. node information metric function
The information measurement function of the controller node to the subordinate node is t 1 (n α ,n i )。
t 1 (n α ,n i )=(id∧id')∧(r∧r')∧(s∧s')
Wherein: id is the node number of the node itself, id 'is the expected value of the node number stored by the upper node, r is the node role, r' is the expected value of the node role stored by the upper node, s is the expected value of the node state stored by the upper node, and s is the node state.
2. Node network environment metric function
The controller node measures the network environment of the subordinate node as t 2 (n α ,n i )。
t 2 =(n α ,n i )=(p∧p')∧(nid∧nid')
Wherein p is the communication protocol between the nodes, p' is the expected value of the communication protocol between the nodes stored by the upper node, nid is the expected value of the node next hop node number stored by the upper node. The controller adjusts the network topology in real time according to the reliability metric value of each node in the network to change the next hop node of the node.
3. Node forwarding behavior metric function
The forwarding behavior metric function of the controller node to the subordinate node is t 3 (n α ,n i )。
The data is forwarded in a multi-hop mode after being perceived in the wireless sensor network, the data forwarding serving as an important action in the wireless sensor network can directly influence the security of the network, and the reliability degree of the node can be reflected by measuring the forwarding action of the node. For the time interval delta t, the total amount of data packets forwarded by the node is set as d z The number of abnormal packets among these packets is d e
The proportion of the abnormal data packet forwarded by the node can reflect the credibility of the node, and the larger the proportion of the abnormal data packet in the data packet forwarded by the node in a certain time interval is, the lower the credibility of the node is, and the smaller the measurement value of the corresponding measurement component of the node is.
4. Node-aware behavior metric function
For a wireless sensor network, the other important behavior except data transmission is the data sensing behavior of the sensor nodes, the data sensing period of the nodes directly affects the behavior period of all nodes of the wireless sensor network, and if malicious nodes continuously and frequently send data to the network, the time interval is far smaller than the sensing period, and the energy of each node in the network can be rapidly consumed. Furthermore, if the sensing period of a node is greater than the normal sensing period, the data of the node may be tampered, and the node may malfunction to affect the security of the wireless sensor network. Therefore, the malicious node can be found by dynamically measuring the sensing period of the sensor node so as to ensure the safe operation of the wireless sensor network.
The gateway node perceives the behavior metric function of the sensor node as t 4 (n α ,n i )。
In the above formula, a and a' are coefficients which can be set according to the network conditions, q is the data acquisition period of the sensor, r is the normal sensing delay in the network, and x is the sensing period of the node.
The node can be dynamically measured during the running of the wireless sensor network through the four node behavior measurement subfunctions, n times of measurement can be carried out on the forwarding behavior and the sensing delay behavior of the node in the [ T-delta T, T ] time interval, the reliability of the behavior measurement of the node is changed along with the time change, and in order to adjust the weights of different time credibility in the time interval, the time decay function is defined as follows according to the time change rule:
thus, the controller node calculates the node trust according to the measurement result in the time interval [ T-delta T, T ], and the trust calculation formula of the routing node is as follows:
T(n α ,n i ,Δt)=t 1 ×t 2 ×T' 3 (equation 1)
Wherein the method comprises the steps of
Wherein T (n) α ,n i Δt) controller node n α For routing node n i Confidence level, t, calculated from n metrics over a period of Δt 1 T is the result of node information measurement 2 As a result of the node network environment metrics,is the x-th time controller node n in the delta t time period α For routing node n i Is a result of the forwarding behavior metric of (a).
The calculation formula of the trust degree of the sensor node in the time interval [ T-delta T, T ] is as follows:
T(n α ,n j ,Δt)=t 1 ×t 2 ×T' 4 (equation 2)
Wherein the method comprises the steps ofWherein T (n) α ,n j Δt) controller node n α For sensor node n j Confidence level, t, calculated from n metrics over a period of Δt 1 T is the result of node information measurement 2 For the result of the node network environment metric, +.>Is the x-th time controller node n in the delta t time period α For sensor node n j Results of the sensed behavior metrics of (a).
The trust degree of the routing node and the sensor node can be calculated through the formulas 1 and 2, and the controller judges whether the node is an abnormal node or not according to the trust degree of the receiving node and the trust degree threshold value set by the network manager. If the abnormal node exists in the network, the node information is transmitted to a network management mechanism, and the abnormal node is deleted from the network.
Fig. 2 is a diagram of a software defined wireless sensor network based on cloud end collaboration, as shown in fig. 2.
Software defined wireless sensor network architecture. Three levels of application layer, control layer, infrastructure layer are included in this architecture:
1. an application layer. The application layer is based on a cloud data server, and the requirements in different application scenes are met by writing corresponding application programs.
2. And a control layer. A controller of the cloud device network is defined in the control layer. The controller is responsible for globally sensing the states of all nodes in the network and making corresponding decisions to control the operation of the network. The controller is realized through cloud resources, and the network management mechanism and the security management mechanism are deployed in the controller.
3. And a base layer. The infrastructure layer includes an edge device gateway node, a terminal device sensor node, and a routing node. The edge equipment is gateway node and is the bridge between the upper cloud end equipment and the lower terminal equipment. The gateway node can communicate with the lower-layer terminal equipment through wireless communication, and meanwhile, data transmission is carried out with the upper-layer cloud equipment in a wired communication mode of a traditional network. The gateway node does not have data acquisition capability, so that no sensor needs to be carried. The gateway node separates the conventional internet from the wireless sensor network and is subject to attacks from the internet. In the invention, a gateway node is provided with a trusted platform control module to provide password support for the node and trusted storage. In addition, the trusted platform control module can also provide necessary hardware foundation for the nodes to deploy the network security scheme of the traditional network.
And the data transmission is carried out between the terminal equipment sensor node and the routing node in a wireless communication mode. And the sensor nodes carry corresponding types of sensors according to the requirements of upper-layer applications to sense the data in the environment and send the data to the routing nodes. The routing node is responsible for forwarding data in the wireless sensor network, and forwarding the data sent by the sensor node to the next routing node or an upper node.
Fig. 3 is a block diagram of various devices in the software defined wireless sensor network, as shown in fig. 3.
Fig. 3 (a) is a controller structure. The structure in the figure is a logic structure inside the controller, and the controller is implemented in the cloud device. The control function of the controller mainly comprises two network management mechanisms of the wireless sensor network and a safety management mechanism of the wireless sensor network.
Fig. 3 (b) is an edge device architecture. The edge device gateway node serves as a bridge for communicating the control layer with the infrastructure layer, and the communication device comprises a wireless communication module for communicating with the lower routing node and a wired network module for communicating with the upper controller node and the data server. The communication between the gateway node and the upper controller node is realized through a wired network card integrated inside the gateway node, and the communication between the gateway node and the lower terminal device is realized through an IEEE 802.15.4 protocol. The gateway node does not have the capability of data acquisition, so that no sensor needs to be carried. In addition to the requisite processor and memory, the gateway node is also equipped with a trusted cryptographic module or trusted platform module to provide cryptographic support for the node. The gateway device is implemented by adopting an SOC chip-based device, such as raspberry pie, which has GB-level memory and storage space and is powered by a stable direct current power supply.
Fig. 3 (c) is a terminal device structure. The sensor node and the routing node of the terminal equipment in the basic structure layer adopt general hardware structures, and the sensor node and the routing node can be mutually converted between two roles of the routing node and the sensor node according to the control information of the controller. The structure of the node comprises a processor, a memory and a wireless communication module. In addition, each node can be provided with N different sensors according to the requirements of application scenes, and data acquired by the sensors are forwarded to the gateway node through the routing nodes and transmitted to the server for storage so as to support the use of an application layer.
Fig. 4 is a node control message structure diagram, as shown in fig. 4.
Send node number (Send-ID): node number of the data transmission node, which is the controller node or gateway node transmitting the control message in this architecture.
Packet Length (Length): the total length of the data packet.
Communication mode (Model): communication modes of control messages include Broadcast (Broadcast), unicast (Multicast) and Multicast (Unicast).
Receiving node number (Rec-ID): the node number of the message node is received.
Node Role (Node-Role): the node roles of the receiving nodes include sensor nodes, routing nodes, gateway nodes.
Message Type (Type): the control message type is used for indicating whether the control message is a message for node resource allocation, topology adjustment or control node access to the network.
Management actions (actions): this field is used to control the specific behavior of the node. This field is divided into four types according to the function of network management, and the Action field of each control message can contain only one Action of one type. Role transformation behavior may transform the roles of nodes, including the transformation of routing nodes into sensor nodes (R to S) and the transformation of sensor nodes into routing nodes (S to R). The modified Next hop node (Change Next ID) may modify the Next hop node of the node to adjust the wireless sensor network topology. Setting a Next-hop node (Set Next ID) may Set the Next-hop node for the node. The node number Not received (Not Receive ID) may set the node receiving the control message Not to Receive any message of the node, and the node number Not transmitted (Not Send ID) may set the node receiving the control message Not to transmit any message to the node.
Fig. 5 is a flow chart of network management, as shown in fig. 5, including:
and step 51, the node joins the wireless sensor network.
And step 52, controlling the node to generate a routing strategy of the node according to the global information of the current network, and issuing the routing strategy to the node to configure the routing information for the node.
Step 53, the sensor node in the wireless sensor network performs data collection and transmission, the routing node forwards the data collected by the sensor node, the routing node forwards the data to the next routing node or gateway node, and the gateway node sends the data to the data server, so that the data collection and transmission are completed.
And step 54, the controller judges whether the wireless sensor network needs to adjust the routing node according to the current running condition of the network and the use condition of node resources. If yes, step 59 is performed, and if not, step 55 is performed.
In step 55, the controller obtains the abnormal node information given by the security management mechanism.
In step 56, the security mechanism gives related information of the abnormal node according to the security requirement of the network, and determines whether the abnormal node exists in the network according to the result of the security mechanism. If yes, step 57 is performed, and if not, step 513 is performed.
In step 57, the controller broadcasts the abnormal node information into the network.
And 58, receiving the message of broadcasting the abnormal node by the node in the wireless sensor network, reading the related information of the abnormal node, and disconnecting the communication with the abnormal node.
Step 59, the controller issues a control message to replace the routing node.
Step 510, the gateway node searches the locally stored routing information for the routing information of the corresponding node according to the control message.
In step 511, the gateway node transmits the routing information to the new routing node, and configures the routing information for the new routing node.
Step 512, after replacing the routing node, the gateway node sends a control message to the sensor node needing to adjust the routing information according to the locally stored routing information, and changes the next hop node of the sensor node.
Step 513, it is determined whether the data acquisition task is complete. If yes, step 514 is performed, and if not, step 53 is performed.
Step 514 ends the data collection operation.
FIG. 6 is a flow diagram of security management, as shown in FIG. 6, including:
step 61, a safety management mechanism deployed in a controller in the running process of a wireless sensor network passes through t 1 And measuring the identity information of the node.
Step 62, the security management mechanism passes t 2 The network environment of the node is measured.
Step 63, for the routing node, according to its forwarding behavior, by t 3 And measuring the forwarding behavior of the network.
Step 64, for the sensing behavior of the sensor node, by t 4 The sensing behavior of the sensor is measured.
In step 65, n times of measurement are performed on the node in the [ T- Δt, T ] time interval, the weight occupied by the measurement result which is closer to the current time is larger, and n times of measurement results in a period of time are calculated according to the time decay function and formula 1.
Step 66, calculating the trust degree T (n) of the routing node according to the measurement result α ,n i Δt) and the trust level T (n) of the sensor node α ,n i ,Δt)。
And 67, evaluating the trust degree of the routing node and the sensor node through a trust degree threshold value set by the network, and judging whether an abnormal node exists in the network. If step 68 is performed, if not step 69 is performed.
Step 68, transmitting the node information of the abnormal node existing in the network to the network management mechanism to delete the abnormal node from the network.
The measurement ends, step 69.
Fig. 7 is a diagram of experimental results of efficiency of a software defined wireless sensor network based on cloud end collaboration.
In the experimental process, experiments are respectively carried out on four scale wireless sensor networks, and the total number of sensor nodes and routing nodes is 5,10,15 and 20. Each scale network starts to operate 120s from networking, and Packet Sniffer equipment is used for grabbing data packets in the network in the operation process. When the node scale exceeds a certain number, compared with the software-defined wireless sensor network, the efficiency of the software-defined wireless sensor network is higher than that of the traditional wireless sensor network on the premise of transmitting the same amount of sensing data.
Fig. 8 is a diagram of the result of the security management experiment.
Fig. 8 (a) shows that the security management mechanism proposed by the present invention has a significantly improved normal rate compared with the conventional network node when the network is faced with the node hijacking attack, so as to ensure the security operation of the network. In the case of Sybil attack, the normal node ratio in the network is obviously improved compared with the traditional network, and the software defined wireless sensor network security management mechanism can effectively ensure the security operation of the network.
As shown in fig. 8 (c), when the nodes in the software defined wireless sensor network face an energy exhaustion attack, the ratio of the normal nodes in the network is obviously improved compared with the conventional network through the security management mechanism and the topology management mechanism. The main purpose of the energy exhaustion attack is to occupy node resources to exhaust the energy of the nodes, and in the software-defined wireless sensor network, a controller can rapidly identify abnormal nodes and delete the nodes from the network by dynamically measuring the sensing behavior and forwarding behavior of the nodes. As shown in fig. 8 (d), the energy resources of the node can be effectively protected from being consumed by an attacker when the node faces an energy exhaustion attack through a dynamic measurement mechanism so as to ensure the safe operation of the network.
It should be understood that although the present disclosure describes embodiments in terms of embodiments, not every embodiment is provided with a single embodiment, and that this description is made only for clarity, and that the embodiments may be practiced in any suitable combination as understood by those skilled in the art.
The above list of detailed descriptions is only specific to practical embodiments of the present invention, and they are not intended to limit the scope of the present invention, and all equivalent embodiments or modifications that do not depart from the spirit of the present invention should be included in the scope of the present invention.

Claims (2)

1. A cloud edge end cooperation-based software defined wireless sensor network management method is characterized by comprising the following steps of: dividing the network into three layers, namely an application layer, a control layer and an infrastructure layer; based on the structure, a wireless sensor network management mechanism and a security management mechanism are provided; the topology structure of the network is effectively managed through a network management mechanism, and the security of the nodes in running is ensured through a security management mechanism;
the control layer in the cloud edge end cooperation-based software defined wireless sensor network is responsible for controlling the operation of the wireless sensor network, and the controller is realized in a cloud computing environment; the controller is responsible for globally sensing the states of all nodes in the network and making corresponding decisions so as to control the operation of the network;
the infrastructure layer in the cloud edge end cooperation-based software defined wireless sensor network comprises an edge equipment gateway node, a terminal equipment sensor node and a routing node; the edge equipment gateway node is realized by adopting equipment based on an SOC chip and supports a wired communication mode and a wireless communication mode of a network; the gateway node should be equipped with a trusted cryptography module or a trusted platform control module to provide secure storage for the node; the sensor node and the routing node of the terminal equipment are realized by adopting equipment based on MUC chips, and a wireless communication module is equipped to complete wireless communication with the gateway node; the sensor nodes carry corresponding types of sensors according to the requirements of upper-layer applications to sense the data in the environment and send the data to the routing nodes; the routing node is responsible for forwarding data in the wireless sensor network, and forwarding the data sent by the sensor node to the next routing node or gateway node;
defining the format of control message in network and the execution flow of network management mechanism;
the described network control message formats include:
Send-ID: node numbers of the data sending nodes, and sending control messages to the controller nodes or gateway nodes; length: the total length of the data packet; model: modes of control messages, including Broadcast Multicast, unicast Multicast and Multicast Unicast; rec-ID: receiving a node number of the message node; node-Role: the Node roles of the receiving nodes comprise sensor nodes, routing nodes and Gateway nodes; type: the control message type indicates whether the control message is a message for node resource configuration, topology adjustment or control node access to the network; action: this field is used to control the specific behavior of the node; according to the function of network management, the field is divided into four types, and the Action field of each control message can only contain one Action of one type; r to S and S to R represent nodes to perform role conversion, change Next ID represents a next hop node of a changed node, setNext ID represents a node setting next hop node, and Not Receive ID and Not Send ID represent messages Not to Receive the node and Not Send messages to the node;
the described execution flow of the network management mechanism comprises:
step 51, the node joins the wireless sensor network;
step 52, the controller generates the routing strategy of the node according to the global information of the current network, and issues the routing strategy to the node to configure the routing information for the node;
step 53, the sensor node in the wireless sensor network performs data acquisition and transmission, the routing node forwards the data acquired by the sensor node, the routing node forwards the data to the next routing node or gateway node, and the gateway node sends the data to the data server so as to complete data acquisition and transmission;
step 54, the controller judges whether the wireless sensor network needs to adjust the routing node according to the current running condition of the network and the node resource use condition; if yes, go to step 59, if not go to step 55;
step 55, the controller acquires abnormal node information given by the security management mechanism;
step 56, the security management mechanism gives out the related information of the abnormal node according to the security requirement of the network, and judges whether the abnormal node exists in the network according to the result of the security management mechanism; if yes, step 57 is performed, and if not, step 513 is performed.
Step 57, the controller broadcasts abnormal node information to the network;
step 58, the node in the wireless sensor network receives the message of the broadcast abnormal node, reads the related information of the abnormal node, and disconnects the communication with the abnormal node;
step 59, the controller issues a control message for replacing the routing node;
step 510, the gateway node searches the route information of the corresponding node in the locally stored route information according to the control message;
step 511, the gateway node transmits the routing information to the new routing node, and configures the routing information for the new routing node;
step 512, after replacing the routing node, the gateway node sends a control message to the sensor node needing to adjust the routing information according to the locally stored routing information, and changes the next hop node of the sensor node;
step 513, judging whether the data acquisition work is completed; if yes, go to step 514, if not, go to step 53;
step 514 ends the data collection operation.
2. The cloud-edge-based collaborative software defined wireless sensor network management method according to claim 1, wherein the method is characterized in that: the execution flow of the security management mechanism comprises:
step 61, a security management mechanism deployed in the controller during operation of the wireless sensor network passes through t 1 Measuring the identity information of the node; t is t 1 A function of the node information metric;
step 62, the security management mechanism passes t 2 Measuring the network environment of the node; t is t 2 As a function of the node network environment metrics;
step 63, for the routing node, according to its forwarding behavior, by t 3 Measuring the forwarding behavior of the forwarding information; t is t 3 A function that measures forwarding behavior;
step 64, for the sensing behavior of the sensor node, by t 4 Measuring the sensing behavior of the sensor; t is t 4 A function that measures the sensed behavior;
step 65, performing n times of measurement on the node in a time interval, wherein the weight occupied by the measurement result which is closer to the current time is larger, and calculating n times of measurement results in a time according to a time decay function;
step 66, calculating the trust degree of the routing node and the trust degree of the sensor node according to the measurement result;
step 67, evaluating the trust degree of the routing node and the sensor node through a trust degree threshold value set by the network, and judging whether an abnormal node exists in the network; if step 68 is performed, if step 69 is not performed;
step 68, transmitting the node information of the abnormal nodes existing in the network to a network management mechanism to delete the abnormal nodes from the network;
the measurement ends, step 69.
CN202011366917.5A 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method Active CN112492583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011366917.5A CN112492583B (en) 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011366917.5A CN112492583B (en) 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method

Publications (2)

Publication Number Publication Date
CN112492583A CN112492583A (en) 2021-03-12
CN112492583B true CN112492583B (en) 2024-04-12

Family

ID=74936913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011366917.5A Active CN112492583B (en) 2020-11-27 2020-11-27 Cloud edge end cooperation-based software defined wireless sensor network management method

Country Status (1)

Country Link
CN (1) CN112492583B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411766B (en) * 2021-06-17 2022-05-24 天津大学 Intelligent Internet of things comprehensive sensing system and method
CN113609048B (en) * 2021-07-20 2023-05-23 国网天津市电力公司 Cloud edge service collaborative interaction method for electric power Internet of things
CN113747468B (en) * 2021-08-04 2024-01-05 武汉慧联无限科技有限公司 Control method of electronic equipment, loRa gateway, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation
CN108540310A (en) * 2018-03-15 2018-09-14 南京邮电大学 A kind of behavior prediction method based on wireless network collaborative perception
CN109982287A (en) * 2019-03-13 2019-07-05 北京工业大学 Forestry multisensor fire alarm warning system based on zigbee wireless sensor network
CN111491303A (en) * 2020-04-10 2020-08-04 许瑜超 Building communication system based on L oRa-Mesh and building communication ad hoc network method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802158A (en) * 2012-08-07 2012-11-28 湖南大学 Method for detecting network anomaly of wireless sensor based on trust evaluation
CN108540310A (en) * 2018-03-15 2018-09-14 南京邮电大学 A kind of behavior prediction method based on wireless network collaborative perception
CN109982287A (en) * 2019-03-13 2019-07-05 北京工业大学 Forestry multisensor fire alarm warning system based on zigbee wireless sensor network
CN111491303A (en) * 2020-04-10 2020-08-04 许瑜超 Building communication system based on L oRa-Mesh and building communication ad hoc network method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
无线传感器网络安全问题分析与研究;赵军云;王欢;朱国春;;电脑知识与技术;20110325(第09期);全文 *

Also Published As

Publication number Publication date
CN112492583A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
Rahman et al. Smartblock-sdn: An optimized blockchain-sdn framework for resource management in iot
CN112492583B (en) Cloud edge end cooperation-based software defined wireless sensor network management method
Brar et al. Energy efficient direction-based PDORP routing protocol for WSN
Bhushan et al. ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment
Wang et al. Mobile edge-enabled trust evaluation for the Internet of Things
Conti et al. Cooperation issues in mobile ad hoc networks
KR20100002936A (en) Method of trust management in wireless sensor networks
Kore et al. IC-MADS: IoT enabled cross layer man-in-middle attack detection system for smart healthcare application
Zhang et al. A dynamic trust establishment and management framework for wireless sensor networks
Wen et al. Energy-efficient and delay-aware distributed routing with cooperative transmission for Internet of Things
Carbajo et al. Routing in wireless sensor networks for wind turbine monitoring
Bala et al. An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
Sen A distributed trust and reputation framework for mobile ad hoc networks
Tumula et al. An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks
Srikanth et al. Energy Efficient Trust Node Based Routing Protocol (EETRP) to Maximize the Lifetime of Wireless Sensor Networks in Plateaus.
Senthil Kumar et al. An efficient QoS based data packet transmission in wireless sensor networks using OREA
Khari Wireless sensor networks: a technical survey
Gupta et al. Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks
Alabady et al. Enhance energy conservation based on residual energy and distance for WSNs
Nandhini et al. A novel security and energy efficient data aggregation for medical Internet of Things using trust
Maheswari et al. Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network
Niewiadomska-Szynkiewicz Energy aware communication protocols for wireless sensor networks
Bhat et al. Survey on routing protocols for Internet of Things
Liu et al. Collision-constrained minimum energy node-disjoint multipath routing in ad hoc networks
Hsieh et al. Dynamic scheduling with energy-efficient transmissions in hierarchical wireless sensor networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant