CN113497808B - Distributed power monitoring system network clustering routing wormhole attack identification method - Google Patents

Distributed power monitoring system network clustering routing wormhole attack identification method Download PDF

Info

Publication number
CN113497808B
CN113497808B CN202111029581.8A CN202111029581A CN113497808B CN 113497808 B CN113497808 B CN 113497808B CN 202111029581 A CN202111029581 A CN 202111029581A CN 113497808 B CN113497808 B CN 113497808B
Authority
CN
China
Prior art keywords
cluster
nodes
node
cluster head
wormhole
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111029581.8A
Other languages
Chinese (zh)
Other versions
CN113497808A (en
Inventor
徐征
王文婷
马强
林琳
黄华
聂其贵
刘鑫
李世慈
姚硕望
李建坡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
State Grid Shandong Electric Power Co Ltd
Northeast Electric Power University
Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd
Original Assignee
Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
State Grid Shandong Electric Power Co Ltd
Northeast Dianli University
Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd, State Grid Shandong Electric Power Co Ltd, Northeast Dianli University, Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd filed Critical Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
Priority to CN202111029581.8A priority Critical patent/CN113497808B/en
Publication of CN113497808A publication Critical patent/CN113497808A/en
Application granted granted Critical
Publication of CN113497808B publication Critical patent/CN113497808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a distributed power monitoring system network clustering routing wormhole attack identification method, which comprises a cluster head node and cluster head node wormhole attack identification method, an intra-cluster node and intra-cluster node wormhole attack identification method, and a cluster head node and intra-cluster node wormhole attack identification method. The method can ensure the network safety and reliability of the distributed power monitoring system and is based on the node density.

Description

一种分布式电力监控系统网络分簇路由虫洞攻击识别方法A Distributed Power Monitoring System Network Cluster Routing Wormhole Attack Identification Method

技术领域technical field

本发明涉及网络信息安全技术领域,具体涉及一种基于节点密度的分布式电力监控系统网络分簇路由虫洞攻击识别方法。The invention relates to the technical field of network information security, in particular to a node density-based distributed power monitoring system network cluster routing wormhole attack identification method.

背景技术Background technique

目前,虫洞攻击是分布式电力监控系统网络常见路由攻击之一,可降低网络中各数据的可信度,改变网络的拓扑结构。在分布式电力监控系统网络分簇路由协议中,簇内节点负责收集数据并发送给簇头节点,簇头节点负责管理控制簇内成员节点,进行数据融合以及簇间转发等工作。如果网络存在虫洞攻击节点,将导致受攻击簇内信息混乱,致使网络发生错误。采用虫洞攻击识别方法判别是否存在虫洞攻击节点是保障网络信息安全传输的关键因素之一。At present, wormhole attack is one of the common routing attacks in distributed power monitoring system network, which can reduce the credibility of each data in the network and change the topology of the network. In the distributed power monitoring system network clustering routing protocol, the nodes in the cluster are responsible for collecting data and sending it to the cluster head node, and the cluster head node is responsible for managing and controlling the member nodes in the cluster, performing data fusion and inter-cluster forwarding. If there are wormhole attack nodes in the network, the information in the attacked cluster will be confused, resulting in network errors. Using the wormhole attack identification method to determine whether there is a wormhole attack node is one of the key factors to ensure the safe transmission of network information.

传统的虫洞攻击识别方法为了对各节点进行准确判别,有效识别攻击节点,均采用布置锚节点,获取两通信节点间跳数,计算平均每跳距离并与节点最大通信半径进行比较,将超出最大通信半径的节点判别为虫洞攻击节点。The traditional wormhole attack identification method, in order to accurately distinguish each node and effectively identify the attack node, adopts the arrangement of anchor nodes, obtains the number of hops between two communication nodes, calculates the average distance per hop and compares it with the maximum communication radius of the node, which will exceed The node with the largest communication radius is identified as a wormhole attack node.

目前虫洞攻击识别存在以下主要问题:At present, there are the following main problems in the identification of wormhole attacks:

在虫洞攻击识别过程中,需要布置大量锚节点,这会带来过多的设备开销,影响整个网络的成本。In the process of wormhole attack identification, a large number of anchor nodes need to be deployed, which will bring too much equipment overhead and affect the cost of the entire network.

在虫洞攻击识别过程中,需要设置严格的时钟同步,这会增加节点信息传输的能量消耗,影响网络的存活时间。In the process of wormhole attack identification, strict clock synchronization needs to be set, which will increase the energy consumption of node information transmission and affect the survival time of the network.

在虫洞攻击识别过程中,没有考虑到簇内节点及簇头节点的作用各不相同,是否适应分簇路由协议的结构特征。In the process of identifying wormhole attacks, the role of the nodes in the cluster and the cluster head nodes are different, and whether they are suitable for the structural characteristics of the clustering routing protocol is not considered.

发明内容Contents of the invention

本发明的主要目的在于提供一种分布式电力监控系统网络分簇路由虫洞攻击识别方法,针对虫洞攻击识别方法的考虑要素不完整问题、能量消耗与经济成本不合理问题,提出科学合理,能够保证分布式电力监控系统网络安全可靠的基于节点密度的分布式电力监控系统网络分簇路由虫洞攻击识别方法。The main purpose of the present invention is to provide a distributed power monitoring system network clustering routing wormhole attack identification method, aiming at the problem of incomplete consideration factors, unreasonable energy consumption and economic cost of the wormhole attack identification method, it is scientific and reasonable, A node density-based distributed power monitoring system network cluster routing wormhole attack identification method that can ensure the security and reliability of the distributed power monitoring system network.

本发明采用的技术方案是:一种分布式电力监控系统网络分簇路由虫洞攻击识别方法,包括簇头节点与簇头节点虫洞攻击识别方法、 簇内节点与簇内节点虫洞攻击识别方法及簇头节点与簇内节点虫洞攻击识别方法;假设网络中节点大致为均匀分布,

Figure 923371DEST_PATH_IMAGE001
个节点部署在以边长为
Figure 61091DEST_PATH_IMAGE002
的正方形区域内,网络单位面积节点密度
Figure 913509DEST_PATH_IMAGE003
表示为:The technical solution adopted in the present invention is: a distributed power monitoring system network cluster routing wormhole attack identification method, including cluster head node and cluster head node wormhole attack identification method, cluster node and cluster node wormhole attack identification method and cluster head node and cluster node wormhole attack identification method; assuming that the nodes in the network are roughly evenly distributed,
Figure 923371DEST_PATH_IMAGE001
Nodes are deployed on the edge length
Figure 61091DEST_PATH_IMAGE002
In the square area of , the node density per unit area of the network
Figure 913509DEST_PATH_IMAGE003
Expressed as:

Figure 402260DEST_PATH_IMAGE004
(1)。
Figure 402260DEST_PATH_IMAGE004
(1).

进一步地,所述簇头节点与簇头节点虫洞攻击识别方法包括:当两簇头节点均为虫洞攻击节点时,理想状态下单位面积节点密度至少为

Figure 873692DEST_PATH_IMAGE005
,但是在实际的节点布置过程中,考虑到节点分布的不均匀性以及虫洞攻击节点可能分布在地理位置边缘等情况,引入一个虫洞节点判定系数
Figure 131498DEST_PATH_IMAGE006
,当节点判定实际单位面积节点密度大于阈值
Figure 918932DEST_PATH_IMAGE007
时,便会将自身判定为虫洞攻击节点,阈值
Figure 629399DEST_PATH_IMAGE007
的计算公式为:Further, the cluster head node and the cluster head node wormhole attack identification method include: when the two cluster head nodes are both wormhole attack nodes, the density of nodes per unit area in an ideal state is at least
Figure 873692DEST_PATH_IMAGE005
, but in the actual node layout process, considering the unevenness of node distribution and the fact that wormhole attack nodes may be distributed on the edge of geographical location, etc., a wormhole node determination coefficient is introduced
Figure 131498DEST_PATH_IMAGE006
, when the node determines that the actual unit area node density is greater than the threshold
Figure 918932DEST_PATH_IMAGE007
, it will determine itself as a wormhole attack node, and the threshold
Figure 629399DEST_PATH_IMAGE007
The calculation formula is:

Figure 904523DEST_PATH_IMAGE008
(2)
Figure 904523DEST_PATH_IMAGE008
(2)

定义网络中各簇为

Figure 282415DEST_PATH_IMAGE009
,各簇头节点为
Figure 476636DEST_PATH_IMAGE010
,各簇内节点为
Figure 939978DEST_PATH_IMAGE011
,若网络中簇头节点
Figure 753213DEST_PATH_IMAGE012
和簇头节点
Figure 985611DEST_PATH_IMAGE013
为虫洞攻击节点时,各簇内节点
Figure 350734DEST_PATH_IMAGE014
向簇头节点
Figure 301372DEST_PATH_IMAGE015
传输信息时会通过簇头节点
Figure 918298DEST_PATH_IMAGE015
与簇头节点
Figure 5203DEST_PATH_IMAGE016
形成的虫洞链路向簇头节点
Figure 806806DEST_PATH_IMAGE016
传输信息;同理,各簇内节点
Figure 979161DEST_PATH_IMAGE017
向簇头节点
Figure 134199DEST_PATH_IMAGE018
传输信息时会通过该虫洞链路向簇头节点
Figure 701709DEST_PATH_IMAGE015
传输信息,这样会导致簇头节点
Figure 284000DEST_PATH_IMAGE019
与簇头节点
Figure 943651DEST_PATH_IMAGE020
均能接收来自两个簇的信息;对簇头节点
Figure 167959DEST_PATH_IMAGE021
与簇头节点
Figure 229456DEST_PATH_IMAGE022
分别进行单位面积节点密度计算,与阈值
Figure 107282DEST_PATH_IMAGE023
进行比较,若
Figure 254230DEST_PATH_IMAGE024
,则可以判断出网络受到了虫洞攻击,且簇头节点
Figure 751070DEST_PATH_IMAGE025
与簇头节点
Figure 791707DEST_PATH_IMAGE026
均为虫洞攻击节点。Each cluster in the network is defined as
Figure 282415DEST_PATH_IMAGE009
, each cluster head node is
Figure 476636DEST_PATH_IMAGE010
, the nodes in each cluster are
Figure 939978DEST_PATH_IMAGE011
, if the cluster head node in the network
Figure 753213DEST_PATH_IMAGE012
and cluster head node
Figure 985611DEST_PATH_IMAGE013
When a node is attacked by a wormhole, the nodes in each cluster
Figure 350734DEST_PATH_IMAGE014
cluster head node
Figure 301372DEST_PATH_IMAGE015
When transmitting information, it will pass through the cluster head node
Figure 918298DEST_PATH_IMAGE015
with the cluster head node
Figure 5203DEST_PATH_IMAGE016
The formed wormhole link leads to the cluster head node
Figure 806806DEST_PATH_IMAGE016
Transmission information; similarly, nodes in each cluster
Figure 979161DEST_PATH_IMAGE017
cluster head node
Figure 134199DEST_PATH_IMAGE018
When transmitting information, it will pass the wormhole link to the cluster head node
Figure 701709DEST_PATH_IMAGE015
transfer information, which will lead to the cluster head node
Figure 284000DEST_PATH_IMAGE019
with the cluster head node
Figure 943651DEST_PATH_IMAGE020
Both can receive information from two clusters; for the cluster head node
Figure 167959DEST_PATH_IMAGE021
with the cluster head node
Figure 229456DEST_PATH_IMAGE022
Calculate the node density per unit area separately, and the threshold
Figure 107282DEST_PATH_IMAGE023
To compare, if
Figure 254230DEST_PATH_IMAGE024
, it can be judged that the network has been attacked by a wormhole, and the cluster head node
Figure 751070DEST_PATH_IMAGE025
with the cluster head node
Figure 791707DEST_PATH_IMAGE026
Both are wormhole attack nodes.

更进一步地,所述簇内节点与簇内节点虫洞攻击识别方法包括:若网络中簇内节点

Figure DEST_PATH_IMAGE027
与簇内节点
Figure 715801DEST_PATH_IMAGE028
为虫洞攻击节点时,簇内节点
Figure DEST_PATH_IMAGE029
向簇头节点
Figure 209099DEST_PATH_IMAGE030
传输信息时会通过簇内节点
Figure 509631DEST_PATH_IMAGE031
与簇内节点
Figure 280141DEST_PATH_IMAGE032
形成的虫洞链路向簇内节点
Figure 640715DEST_PATH_IMAGE032
传输信息;同理,簇内节点
Figure 385423DEST_PATH_IMAGE032
向簇头节点
Figure 224066DEST_PATH_IMAGE033
传输信息时会通过该虫洞链路向簇内节点
Figure 114662DEST_PATH_IMAGE031
传输信息,导致簇头节点
Figure 646138DEST_PATH_IMAGE030
接收来自簇内节点
Figure 114028DEST_PATH_IMAGE032
信息,簇头节点
Figure 21941DEST_PATH_IMAGE033
接收来自簇内节点
Figure 767043DEST_PATH_IMAGE031
信息;为了解决此类攻击影响,簇头节点需将接收信息的节点识别号
Figure 469420DEST_PATH_IMAGE034
与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点的
Figure 424607DEST_PATH_IMAGE034
,若簇头节点
Figure 605052DEST_PATH_IMAGE035
通过对接收信息的节点
Figure 470240DEST_PATH_IMAGE034
Figure 343518DEST_PATH_IMAGE036
簇成员节点列表进行比较,找到不属于本簇内节点
Figure 786001DEST_PATH_IMAGE034
Figure 770137DEST_PATH_IMAGE037
,同时簇头节点
Figure 489832DEST_PATH_IMAGE038
通过对接收信息的节点
Figure 534011DEST_PATH_IMAGE034
Figure 965255DEST_PATH_IMAGE039
簇成员节点列表进行比较,找到不属于本簇内节点
Figure 753082DEST_PATH_IMAGE034
Figure 327283DEST_PATH_IMAGE040
,则可以判断出网络受到了虫洞攻击,且簇内节点
Figure 542364DEST_PATH_IMAGE040
与簇内节点
Figure 693859DEST_PATH_IMAGE041
均为虫洞攻击节点。Furthermore, the intra-cluster node and the intra-cluster node wormhole attack identification method include: if the intra-cluster node in the network
Figure DEST_PATH_IMAGE027
with cluster nodes
Figure 715801DEST_PATH_IMAGE028
When a node is attacked by a wormhole, the nodes in the cluster
Figure DEST_PATH_IMAGE029
cluster head node
Figure 209099DEST_PATH_IMAGE030
When transmitting information, it will pass through the nodes in the cluster
Figure 509631DEST_PATH_IMAGE031
with cluster nodes
Figure 280141DEST_PATH_IMAGE032
The formed wormhole links to the nodes in the cluster
Figure 640715DEST_PATH_IMAGE032
Transmission information; similarly, nodes in the cluster
Figure 385423DEST_PATH_IMAGE032
cluster head node
Figure 224066DEST_PATH_IMAGE033
When transmitting information, it will pass the wormhole link to the nodes in the cluster
Figure 114662DEST_PATH_IMAGE031
transmit information, resulting in the cluster head node
Figure 646138DEST_PATH_IMAGE030
received from nodes in the cluster
Figure 114028DEST_PATH_IMAGE032
information, cluster head node
Figure 21941DEST_PATH_IMAGE033
received from nodes in the cluster
Figure 767043DEST_PATH_IMAGE031
information; in order to solve the impact of this kind of attack, the cluster head node needs to receive the node identification number of the information
Figure 469420DEST_PATH_IMAGE034
Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster
Figure 424607DEST_PATH_IMAGE034
, if the cluster head node
Figure 605052DEST_PATH_IMAGE035
Nodes that receive information through
Figure 470240DEST_PATH_IMAGE034
and
Figure 343518DEST_PATH_IMAGE036
Compare the list of cluster member nodes to find nodes that do not belong to the cluster
Figure 786001DEST_PATH_IMAGE034
of
Figure 770137DEST_PATH_IMAGE037
, while the cluster head node
Figure 489832DEST_PATH_IMAGE038
Nodes that receive information through
Figure 534011DEST_PATH_IMAGE034
and
Figure 965255DEST_PATH_IMAGE039
Compare the list of cluster member nodes to find nodes that do not belong to the cluster
Figure 753082DEST_PATH_IMAGE034
of
Figure 327283DEST_PATH_IMAGE040
, it can be judged that the network has been attacked by wormholes, and the nodes in the cluster
Figure 542364DEST_PATH_IMAGE040
with cluster nodes
Figure 693859DEST_PATH_IMAGE041
Both are wormhole attack nodes.

更进一步地,所述簇头节点与簇内节点虫洞攻击识别方法包括:若网络

Figure 285378DEST_PATH_IMAGE042
簇中簇头节点
Figure 714085DEST_PATH_IMAGE043
Figure 100067DEST_PATH_IMAGE044
簇中簇内节点
Figure 4438DEST_PATH_IMAGE045
为虫洞攻击节点时,簇内节点
Figure 134068DEST_PATH_IMAGE046
向簇头节点
Figure 417282DEST_PATH_IMAGE047
传输信息时会通过簇头节点
Figure 239744DEST_PATH_IMAGE047
与簇内节点
Figure 365832DEST_PATH_IMAGE048
形成的虫洞链路向簇内节点
Figure 33574DEST_PATH_IMAGE048
传输信息,导致簇内节点
Figure 436873DEST_PATH_IMAGE048
接收来自簇头节点
Figure 430237DEST_PATH_IMAGE047
信息,进而导致簇头节点
Figure 276577DEST_PATH_IMAGE049
接收来自两个簇内信息;同时,簇内节点
Figure 13589DEST_PATH_IMAGE050
向簇头节点
Figure 271395DEST_PATH_IMAGE051
传输信息时会通过该虫洞链路向簇头节点
Figure 170081DEST_PATH_IMAGE052
传输信息,导致簇头节点
Figure 270761DEST_PATH_IMAGE053
接收来自簇内节点
Figure 545884DEST_PATH_IMAGE054
信息;为了解决此类攻击影响,簇头节点需要进行单位面积节点密度计算,判断自身单位面积节点密度是否满足阈值条件,同时簇头节点需要将接收信息的节点
Figure 658197DEST_PATH_IMAGE055
与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点
Figure 993363DEST_PATH_IMAGE055
,簇头节点
Figure 315760DEST_PATH_IMAGE056
与簇头节点
Figure 394574DEST_PATH_IMAGE057
分别进行单位面积节点密度计算,与阈值
Figure 626973DEST_PATH_IMAGE058
进行比较,若
Figure 867461DEST_PATH_IMAGE059
,同时簇头节点
Figure 942733DEST_PATH_IMAGE060
与簇头节点
Figure 559659DEST_PATH_IMAGE061
通过对接收信息的节点
Figure 646564DEST_PATH_IMAGE055
与自身簇成员节点列表进行比较,发现簇头节点
Figure 57954DEST_PATH_IMAGE062
找到不属于本簇内节点
Figure 856408DEST_PATH_IMAGE055
Figure 277025DEST_PATH_IMAGE063
,则可以判断出网络受到了虫洞攻击,且簇头节点
Figure 218436DEST_PATH_IMAGE064
与簇内节点
Figure 66306DEST_PATH_IMAGE065
均为虫洞攻击节点。Further, the method for identifying wormhole attacks between the cluster head node and the nodes in the cluster includes: if the network
Figure 285378DEST_PATH_IMAGE042
cluster head node
Figure 714085DEST_PATH_IMAGE043
and
Figure 100067DEST_PATH_IMAGE044
Intra-cluster node in cluster
Figure 4438DEST_PATH_IMAGE045
When a node is attacked by a wormhole, the nodes in the cluster
Figure 134068DEST_PATH_IMAGE046
cluster head node
Figure 417282DEST_PATH_IMAGE047
When transmitting information, it will pass through the cluster head node
Figure 239744DEST_PATH_IMAGE047
with cluster nodes
Figure 365832DEST_PATH_IMAGE048
The formed wormhole links to the nodes in the cluster
Figure 33574DEST_PATH_IMAGE048
Transmitting information, resulting in nodes in the cluster
Figure 436873DEST_PATH_IMAGE048
received from the cluster head node
Figure 430237DEST_PATH_IMAGE047
information, which leads to the cluster head node
Figure 276577DEST_PATH_IMAGE049
Receive information from two clusters; at the same time, nodes in the cluster
Figure 13589DEST_PATH_IMAGE050
cluster head node
Figure 271395DEST_PATH_IMAGE051
When transmitting information, it will pass the wormhole link to the cluster head node
Figure 170081DEST_PATH_IMAGE052
transmit information, resulting in the cluster head node
Figure 270761DEST_PATH_IMAGE053
received from nodes in the cluster
Figure 545884DEST_PATH_IMAGE054
information; in order to solve the impact of such attacks, the cluster head node needs to calculate the node density per unit area to judge whether its own node density per unit area meets the threshold condition, and the cluster head node needs to
Figure 658197DEST_PATH_IMAGE055
Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster
Figure 993363DEST_PATH_IMAGE055
, the cluster head node
Figure 315760DEST_PATH_IMAGE056
with the cluster head node
Figure 394574DEST_PATH_IMAGE057
Calculate the node density per unit area separately, and the threshold
Figure 626973DEST_PATH_IMAGE058
To compare, if
Figure 867461DEST_PATH_IMAGE059
, while the cluster head node
Figure 942733DEST_PATH_IMAGE060
with the cluster head node
Figure 559659DEST_PATH_IMAGE061
Nodes that receive information through
Figure 646564DEST_PATH_IMAGE055
Compare with the list of its own cluster member nodes to find the cluster head node
Figure 57954DEST_PATH_IMAGE062
Find nodes that do not belong to this cluster
Figure 856408DEST_PATH_IMAGE055
Figure 277025DEST_PATH_IMAGE063
, it can be judged that the network has been attacked by a wormhole, and the cluster head node
Figure 218436DEST_PATH_IMAGE064
with cluster nodes
Figure 66306DEST_PATH_IMAGE065
Both are wormhole attack nodes.

本发明的优点:本发明的方法能够保证分布式电力监控系统网络安全可靠的基于节点密度的分布式电力监控系统网络分簇路由虫洞攻击识别方法。Advantages of the present invention: the method of the present invention can ensure the safety and reliability of the network of the distributed power monitoring system, and it is a node density-based distributed power monitoring system network cluster routing wormhole attack identification method.

除了上面所描述的目的、特征和优点之外,本发明还有其它的目的、特征和优点。下面将参照图,对本发明作进一步详细的说明。In addition to the objects, features and advantages described above, the present invention has other objects, features and advantages. Hereinafter, the present invention will be described in further detail with reference to the drawings.

附图说明Description of drawings

构成本申请的一部分的附图用来提供对本发明的进一步理解,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。The accompanying drawings constituting a part of this application are used to provide further understanding of the present invention, and the schematic embodiments and descriptions of the present invention are used to explain the present invention, and do not constitute an improper limitation of the present invention.

图1是本发明的分布式电力监控系统网络分簇路由虫洞攻击识别方法流程图。FIG. 1 is a flow chart of a method for identifying a wormhole attack by network clustering routing in a distributed power monitoring system according to the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

参考图1,一种分布式电力监控系统网络分簇路由虫洞攻击识别方法,包括簇头节点与簇头节点虫洞攻击识别方法、 簇内节点与簇内节点虫洞攻击识别方法及簇头节点与簇内节点虫洞攻击识别方法;假设网络中节点大致为均匀分布,

Figure 850592DEST_PATH_IMAGE066
个节点部署在以边长为
Figure 543741DEST_PATH_IMAGE067
的正方形区域内,网络单位面积节点密度
Figure 605238DEST_PATH_IMAGE068
表示为:Referring to Figure 1, a distributed power monitoring system network cluster routing wormhole attack identification method, including cluster head node and cluster head node wormhole attack identification method, intra-cluster node and intra-cluster node wormhole attack identification method and cluster head The identification method of wormhole attacks on nodes and nodes in the cluster; assuming that the nodes in the network are roughly evenly distributed,
Figure 850592DEST_PATH_IMAGE066
Nodes are deployed on the edge length
Figure 543741DEST_PATH_IMAGE067
In the square area of , the node density per unit area of the network
Figure 605238DEST_PATH_IMAGE068
Expressed as:

Figure DEST_PATH_IMAGE069
(1)。
Figure DEST_PATH_IMAGE069
(1).

所述簇头节点与簇头节点虫洞攻击识别方法包括:当两簇头节点均为虫洞攻击节点时,理想状态下单位面积节点密度至少为

Figure 483064DEST_PATH_IMAGE070
,但是在实际的节点布置过程中,考虑到节点分布的不均匀性以及虫洞攻击节点可能分布在地理位置边缘等情况,为了减少虫洞节点的误判比例,引入一个虫洞节点判定系数
Figure 364433DEST_PATH_IMAGE071
,当节点判定实际单位面积节点密度大于阈值
Figure 126852DEST_PATH_IMAGE072
时,便会将自身判定为虫洞攻击节点,阈值
Figure 167489DEST_PATH_IMAGE073
的计算公式为:The cluster head node and the cluster head node wormhole attack identification method include: when the two cluster head nodes are both wormhole attack nodes, the density of nodes per unit area in an ideal state is at least
Figure 483064DEST_PATH_IMAGE070
, but in the actual node layout process, considering the unevenness of node distribution and the fact that wormhole attack nodes may be distributed on the edge of geographical locations, in order to reduce the misjudgment ratio of wormhole nodes, a wormhole node determination coefficient
Figure 364433DEST_PATH_IMAGE071
, when the node determines that the actual unit area node density is greater than the threshold
Figure 126852DEST_PATH_IMAGE072
, it will determine itself as a wormhole attack node, and the threshold
Figure 167489DEST_PATH_IMAGE073
The calculation formula is:

Figure 357162DEST_PATH_IMAGE074
(2)
Figure 357162DEST_PATH_IMAGE074
(2)

定义网络中各簇为

Figure 991406DEST_PATH_IMAGE075
,各簇头节点为
Figure 291937DEST_PATH_IMAGE076
,各簇内节点为
Figure 685616DEST_PATH_IMAGE077
,若网络中簇头节点
Figure 46190DEST_PATH_IMAGE078
和簇头节点
Figure 902151DEST_PATH_IMAGE079
为虫洞攻击节点时,各簇内节点
Figure 6373DEST_PATH_IMAGE080
向簇头节点
Figure 21603DEST_PATH_IMAGE081
传输信息时会通过簇头节点
Figure 553078DEST_PATH_IMAGE081
与簇头节点
Figure 896335DEST_PATH_IMAGE082
形成的虫洞链路向簇头节点
Figure 538669DEST_PATH_IMAGE082
传输信息;同理,各簇内节点
Figure 408405DEST_PATH_IMAGE083
向簇头节点
Figure 845202DEST_PATH_IMAGE084
传输信息时会通过该虫洞链路向簇头节点
Figure 675755DEST_PATH_IMAGE085
传输信息,这样会导致簇头节点
Figure 246413DEST_PATH_IMAGE085
与簇头节点
Figure 111601DEST_PATH_IMAGE084
均能接收来自两个簇的信息;对簇头节点
Figure 984879DEST_PATH_IMAGE085
与簇头节点
Figure 37149DEST_PATH_IMAGE084
分别进行单位面积节点密度计算,与阈值
Figure 912963DEST_PATH_IMAGE086
进行比较,若
Figure 632658DEST_PATH_IMAGE087
,则可以判断出网络受到了虫洞攻击,且簇头节点
Figure 676837DEST_PATH_IMAGE088
与簇头节点
Figure 216403DEST_PATH_IMAGE089
均为虫洞攻击节点。Each cluster in the network is defined as
Figure 991406DEST_PATH_IMAGE075
, each cluster head node is
Figure 291937DEST_PATH_IMAGE076
, the nodes in each cluster are
Figure 685616DEST_PATH_IMAGE077
, if the cluster head node in the network
Figure 46190DEST_PATH_IMAGE078
and cluster head node
Figure 902151DEST_PATH_IMAGE079
When a node is attacked by a wormhole, the nodes in each cluster
Figure 6373DEST_PATH_IMAGE080
cluster head node
Figure 21603DEST_PATH_IMAGE081
When transmitting information, it will pass through the cluster head node
Figure 553078DEST_PATH_IMAGE081
with the cluster head node
Figure 896335DEST_PATH_IMAGE082
The formed wormhole link leads to the cluster head node
Figure 538669DEST_PATH_IMAGE082
Transmission information; similarly, nodes in each cluster
Figure 408405DEST_PATH_IMAGE083
cluster head node
Figure 845202DEST_PATH_IMAGE084
When transmitting information, it will pass the wormhole link to the cluster head node
Figure 675755DEST_PATH_IMAGE085
transfer information, which will lead to the cluster head node
Figure 246413DEST_PATH_IMAGE085
with the cluster head node
Figure 111601DEST_PATH_IMAGE084
Both can receive information from two clusters; for the cluster head node
Figure 984879DEST_PATH_IMAGE085
with the cluster head node
Figure 37149DEST_PATH_IMAGE084
Calculate the node density per unit area separately, and the threshold
Figure 912963DEST_PATH_IMAGE086
To compare, if
Figure 632658DEST_PATH_IMAGE087
, it can be judged that the network has been attacked by a wormhole, and the cluster head node
Figure 676837DEST_PATH_IMAGE088
with the cluster head node
Figure 216403DEST_PATH_IMAGE089
Both are wormhole attack nodes.

所述簇内节点与簇内节点虫洞攻击识别方法包括:若网络中簇内节点

Figure 128864DEST_PATH_IMAGE090
与簇内节点
Figure 703065DEST_PATH_IMAGE091
为虫洞攻击节点时,簇内节点
Figure 918146DEST_PATH_IMAGE092
向簇头节点
Figure 210587DEST_PATH_IMAGE093
传输信息时会通过簇内节点
Figure 661160DEST_PATH_IMAGE092
与簇内节点
Figure 355446DEST_PATH_IMAGE094
形成的虫洞链路向簇内节点
Figure 741428DEST_PATH_IMAGE094
传输信息;同理,簇内节点
Figure 255586DEST_PATH_IMAGE094
向簇头节点
Figure DEST_PATH_IMAGE095
传输信息时会通过该虫洞链路向簇内节点
Figure 244271DEST_PATH_IMAGE092
传输信息,导致簇头节点
Figure 793064DEST_PATH_IMAGE096
接收来自簇内节点
Figure 349947DEST_PATH_IMAGE094
信息,簇头节点
Figure 974570DEST_PATH_IMAGE095
接收来自簇内节点
Figure 907891DEST_PATH_IMAGE092
信息;为了解决此类攻击影响,簇头节点需将接收信息的节点识别号
Figure 311190DEST_PATH_IMAGE097
与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点的
Figure 38975DEST_PATH_IMAGE097
,若簇头节点
Figure 652359DEST_PATH_IMAGE098
通过对接收信息的节点
Figure 389371DEST_PATH_IMAGE097
Figure 647177DEST_PATH_IMAGE099
簇成员节点列表进行比较,找到不属于本簇内节点
Figure 545863DEST_PATH_IMAGE097
Figure 646543DEST_PATH_IMAGE100
,同时簇头节点
Figure 921666DEST_PATH_IMAGE101
通过对接收信息的节点
Figure 33979DEST_PATH_IMAGE097
Figure 369145DEST_PATH_IMAGE102
簇成员节点列表进行比较,找到不属于本簇内节点
Figure 691542DEST_PATH_IMAGE097
Figure 770356DEST_PATH_IMAGE103
,则可以判断出网络受到了虫洞攻击,且簇内节点
Figure 737175DEST_PATH_IMAGE103
与簇内节点
Figure 243243DEST_PATH_IMAGE104
均为虫洞攻击节点。The described intra-cluster node and intra-cluster node wormhole attack identification method include: if the intra-cluster node in the network
Figure 128864DEST_PATH_IMAGE090
with cluster nodes
Figure 703065DEST_PATH_IMAGE091
When a node is attacked by a wormhole, the nodes in the cluster
Figure 918146DEST_PATH_IMAGE092
cluster head node
Figure 210587DEST_PATH_IMAGE093
When transmitting information, it will pass through the nodes in the cluster
Figure 661160DEST_PATH_IMAGE092
with cluster nodes
Figure 355446DEST_PATH_IMAGE094
The formed wormhole links to the nodes in the cluster
Figure 741428DEST_PATH_IMAGE094
Transmission information; similarly, nodes in the cluster
Figure 255586DEST_PATH_IMAGE094
cluster head node
Figure DEST_PATH_IMAGE095
When transmitting information, it will pass the wormhole link to the nodes in the cluster
Figure 244271DEST_PATH_IMAGE092
transmit information, resulting in the cluster head node
Figure 793064DEST_PATH_IMAGE096
received from nodes in the cluster
Figure 349947DEST_PATH_IMAGE094
information, cluster head node
Figure 974570DEST_PATH_IMAGE095
received from nodes in the cluster
Figure 907891DEST_PATH_IMAGE092
information; in order to solve the impact of this kind of attack, the cluster head node needs to receive the node identification number of the information
Figure 311190DEST_PATH_IMAGE097
Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster
Figure 38975DEST_PATH_IMAGE097
, if the cluster head node
Figure 652359DEST_PATH_IMAGE098
Nodes that receive information through
Figure 389371DEST_PATH_IMAGE097
and
Figure 647177DEST_PATH_IMAGE099
Compare the list of cluster member nodes to find nodes that do not belong to the cluster
Figure 545863DEST_PATH_IMAGE097
of
Figure 646543DEST_PATH_IMAGE100
, while the cluster head node
Figure 921666DEST_PATH_IMAGE101
Nodes that receive information through
Figure 33979DEST_PATH_IMAGE097
and
Figure 369145DEST_PATH_IMAGE102
Compare the list of cluster member nodes to find nodes that do not belong to the cluster
Figure 691542DEST_PATH_IMAGE097
of
Figure 770356DEST_PATH_IMAGE103
, it can be judged that the network has been attacked by wormholes, and the nodes in the cluster
Figure 737175DEST_PATH_IMAGE103
with cluster nodes
Figure 243243DEST_PATH_IMAGE104
Both are wormhole attack nodes.

所述簇头节点与簇内节点虫洞攻击识别方法包括:若网络

Figure 554401DEST_PATH_IMAGE105
簇中簇头节点
Figure 171327DEST_PATH_IMAGE056
Figure 258232DEST_PATH_IMAGE106
簇中簇内节点
Figure 935201DEST_PATH_IMAGE107
为虫洞攻击节点时,簇内节点
Figure 232190DEST_PATH_IMAGE108
向簇头节点
Figure 652807DEST_PATH_IMAGE109
传输信息时会通过簇头节点
Figure 594218DEST_PATH_IMAGE109
与簇内节点
Figure 442088DEST_PATH_IMAGE110
形成的虫洞链路向簇内节点
Figure 226374DEST_PATH_IMAGE110
传输信息,导致簇内节点
Figure 919523DEST_PATH_IMAGE110
接收来自簇头节点
Figure 981020DEST_PATH_IMAGE111
信息,进而导致簇头节点
Figure 858846DEST_PATH_IMAGE112
接收来自两个簇内信息;同时,簇内节点
Figure 5794DEST_PATH_IMAGE113
向簇头节点
Figure 768214DEST_PATH_IMAGE114
传输信息时会通过该虫洞链路向簇头节点
Figure 684217DEST_PATH_IMAGE115
传输信息,导致簇头节点
Figure 497059DEST_PATH_IMAGE116
接收来自簇内节点
Figure 865723DEST_PATH_IMAGE117
信息;为了解决此类攻击影响,簇头节点需要进行单位面积节点密度计算,判断自身单位面积节点密度是否满足阈值条件,同时簇头节点需要将接收信息的节点
Figure 166255DEST_PATH_IMAGE118
与此前记录的簇成员节点列表进行比较,寻找不属于该簇内节点
Figure 202344DEST_PATH_IMAGE118
,簇头节点
Figure 687552DEST_PATH_IMAGE119
与簇头节点
Figure 543512DEST_PATH_IMAGE120
分别进行单位面积节点密度计算,与阈值
Figure 647734DEST_PATH_IMAGE121
进行比较,若
Figure 538330DEST_PATH_IMAGE122
,同时簇头节点
Figure 194439DEST_PATH_IMAGE123
与簇头节点
Figure 537696DEST_PATH_IMAGE124
通过对接收信息的节点
Figure 180030DEST_PATH_IMAGE118
与自身簇成员节点列表进行比较,发现簇头节点
Figure 925132DEST_PATH_IMAGE125
找到不属于本簇内节点
Figure 752143DEST_PATH_IMAGE118
Figure 582695DEST_PATH_IMAGE126
,则可以判断出网络受到了虫洞攻击,且簇头节点
Figure 28720DEST_PATH_IMAGE127
与簇内节点
Figure 628329DEST_PATH_IMAGE128
均为虫洞攻击节点。The cluster head node and the node wormhole attack identification method in the cluster include: if the network
Figure 554401DEST_PATH_IMAGE105
cluster head node
Figure 171327DEST_PATH_IMAGE056
and
Figure 258232DEST_PATH_IMAGE106
Intra-cluster node in cluster
Figure 935201DEST_PATH_IMAGE107
When a node is attacked by a wormhole, the nodes in the cluster
Figure 232190DEST_PATH_IMAGE108
cluster head node
Figure 652807DEST_PATH_IMAGE109
When transmitting information, it will pass through the cluster head node
Figure 594218DEST_PATH_IMAGE109
with cluster nodes
Figure 442088DEST_PATH_IMAGE110
The formed wormhole links to the nodes in the cluster
Figure 226374DEST_PATH_IMAGE110
Transmitting information, resulting in nodes in the cluster
Figure 919523DEST_PATH_IMAGE110
received from the cluster head node
Figure 981020DEST_PATH_IMAGE111
information, which leads to the cluster head node
Figure 858846DEST_PATH_IMAGE112
Receive information from two clusters; at the same time, nodes in the cluster
Figure 5794DEST_PATH_IMAGE113
cluster head node
Figure 768214DEST_PATH_IMAGE114
When transmitting information, it will pass the wormhole link to the cluster head node
Figure 684217DEST_PATH_IMAGE115
transmit information, resulting in the cluster head node
Figure 497059DEST_PATH_IMAGE116
received from nodes in the cluster
Figure 865723DEST_PATH_IMAGE117
information; in order to solve the impact of such attacks, the cluster head node needs to calculate the node density per unit area to judge whether its own node density per unit area meets the threshold condition, and the cluster head node needs to
Figure 166255DEST_PATH_IMAGE118
Compare with the previously recorded list of cluster member nodes to find nodes that do not belong to the cluster
Figure 202344DEST_PATH_IMAGE118
, the cluster head node
Figure 687552DEST_PATH_IMAGE119
with the cluster head node
Figure 543512DEST_PATH_IMAGE120
Calculate the node density per unit area separately, and the threshold
Figure 647734DEST_PATH_IMAGE121
To compare, if
Figure 538330DEST_PATH_IMAGE122
, while the cluster head node
Figure 194439DEST_PATH_IMAGE123
with the cluster head node
Figure 537696DEST_PATH_IMAGE124
Nodes that receive information through
Figure 180030DEST_PATH_IMAGE118
Compare with the list of its own cluster member nodes to find the cluster head node
Figure 925132DEST_PATH_IMAGE125
Find nodes that do not belong to this cluster
Figure 752143DEST_PATH_IMAGE118
Figure 582695DEST_PATH_IMAGE126
, it can be judged that the network has been attacked by a wormhole, and the cluster head node
Figure 28720DEST_PATH_IMAGE127
with cluster nodes
Figure 628329DEST_PATH_IMAGE128
Both are wormhole attack nodes.

以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included in the protection of the present invention. within range.

Claims (1)

1. A distributed power monitoring system network clustering routing wormhole attack recognition method is characterized by comprising a cluster head node and cluster head node wormhole attack recognition method, an intra-cluster node and intra-cluster node wormhole attack recognition method and a cluster head node and intra-cluster node wormhole attack recognition method;
when the nodes in the network are uniformly distributed,
Figure 99376DEST_PATH_IMAGE001
the nodes are arranged on the side length
Figure 928660DEST_PATH_IMAGE002
Within the square region of (2), network unit area node density
Figure 204921DEST_PATH_IMAGE003
Expressed as:
Figure 438456DEST_PATH_IMAGE004
(1)
the cluster head node and cluster head node wormhole attack identification method comprises the following steps:
when two cluster head nodes are both wormhole attack nodes, a wormhole node judgment coefficient is introduced
Figure 800167DEST_PATH_IMAGE005
When the node judges that the actual node density per unit area is greater than the threshold value
Figure 918296DEST_PATH_IMAGE006
Then, the self is judged as a wormhole attack node and the threshold value
Figure 49063DEST_PATH_IMAGE007
The calculation formula of (2) is as follows:
Figure 453500DEST_PATH_IMAGE008
(2)
defining clusters in a network as
Figure 427141DEST_PATH_IMAGE009
Each cluster head node is
Figure 942436DEST_PATH_IMAGE010
Nodes in each cluster are
Figure 193289DEST_PATH_IMAGE011
If cluster head node in network
Figure 768626DEST_PATH_IMAGE012
And cluster head node
Figure 245875DEST_PATH_IMAGE013
When the nodes are attacked by wormholes, the nodes in each cluster
Figure 564861DEST_PATH_IMAGE014
To cluster head node
Figure 670220DEST_PATH_IMAGE015
When transmitting information, the cluster head node is passed
Figure 541093DEST_PATH_IMAGE015
With cluster head node
Figure 99114DEST_PATH_IMAGE016
Formed wormhole link-to-cluster head node
Figure 221790DEST_PATH_IMAGE016
Transmitting information; in the same way, each cluster of nodes
Figure 181656DEST_PATH_IMAGE017
To cluster head node
Figure 974163DEST_PATH_IMAGE016
When transmitting information, the information can be transmitted to the cluster head node through the wormhole link
Figure 550638DEST_PATH_IMAGE015
Transmitting information, which results in cluster head nodes
Figure 211426DEST_PATH_IMAGE015
With cluster head node
Figure 150432DEST_PATH_IMAGE016
Both are capable of receiving information from both clusters; to cluster head node
Figure 504053DEST_PATH_IMAGE015
With cluster head node
Figure 36665DEST_PATH_IMAGE016
Respectively calculating the node density per unit area and the threshold value
Figure 642090DEST_PATH_IMAGE006
Make a comparison if
Figure 310969DEST_PATH_IMAGE018
Then, it can be determined that the network is attacked by wormhole and cluster head nodes
Figure 835491DEST_PATH_IMAGE015
With cluster head node
Figure 855400DEST_PATH_IMAGE016
All nodes are wormhole attack nodes;
the cluster node and cluster node wormhole attack identification method comprises the following steps:
if in-cluster node in network
Figure 982625DEST_PATH_IMAGE019
With nodes in the cluster
Figure 771589DEST_PATH_IMAGE020
When the nodes are attacked by wormholes, the nodes in the cluster
Figure 467013DEST_PATH_IMAGE021
To cluster head node
Figure 708638DEST_PATH_IMAGE022
When transmitting information, the information passes through the nodes in the cluster
Figure 390286DEST_PATH_IMAGE021
With nodes in the cluster
Figure 564916DEST_PATH_IMAGE023
The formed wormhole link is connected to the nodes in the cluster
Figure 165661DEST_PATH_IMAGE023
Transmitting information; in the same way, nodes in a cluster
Figure 284796DEST_PATH_IMAGE023
To cluster head node
Figure 629190DEST_PATH_IMAGE024
When information is transmitted, the wormhole link is used for transmitting information to the nodes in the cluster
Figure 392746DEST_PATH_IMAGE021
Transmitting information resulting in cluster head nodes
Figure 164393DEST_PATH_IMAGE025
Receiving from an intra-cluster node
Figure 521556DEST_PATH_IMAGE023
Information, cluster head node
Figure 669641DEST_PATH_IMAGE024
Receiving from an intra-cluster node
Figure 287704DEST_PATH_IMAGE021
Information; in order to solve the attack influence, the cluster head node needs to identify the node identification number of the received information
Figure 495832DEST_PATH_IMAGE026
Comparing with the previously recorded cluster member node list to find the nodes not belonging to the cluster
Figure 323979DEST_PATH_IMAGE026
If cluster head node
Figure 10175DEST_PATH_IMAGE027
By pairing nodes receiving information
Figure 748324DEST_PATH_IMAGE026
And
Figure 2719DEST_PATH_IMAGE028
comparing the cluster member node lists to find out nodes not belonging to the cluster
Figure 193529DEST_PATH_IMAGE026
Is
Figure 683416DEST_PATH_IMAGE023
While clustering nodes
Figure 276072DEST_PATH_IMAGE029
By pairing nodes receiving information
Figure 956495DEST_PATH_IMAGE026
And
Figure 634601DEST_PATH_IMAGE030
comparing the cluster member node lists to find out the nodes which do not belong to the cluster
Figure 662600DEST_PATH_IMAGE026
Is/are as follows
Figure 250707DEST_PATH_IMAGE021
Then, it can be determined that the network is attacked by wormhole and the nodes in the cluster
Figure 971538DEST_PATH_IMAGE021
And nodes in the cluster
Figure 136941DEST_PATH_IMAGE023
All are wormhole attack nodes;
the cluster head node and cluster internal node wormhole attack identification method comprises the following steps:
if network
Figure 968630DEST_PATH_IMAGE031
Cluster head node in cluster
Figure 394932DEST_PATH_IMAGE032
And
Figure 286665DEST_PATH_IMAGE033
in-cluster node in cluster
Figure 939363DEST_PATH_IMAGE023
When the nodes are attacked by wormholes, the nodes in the cluster
Figure 309165DEST_PATH_IMAGE034
To cluster head node
Figure 606285DEST_PATH_IMAGE032
When transmitting information, the cluster head node is passed
Figure 934498DEST_PATH_IMAGE032
And nodes in the cluster
Figure 808913DEST_PATH_IMAGE023
Formed wormhole link to intra-cluster node
Figure 372619DEST_PATH_IMAGE023
Transmitting information resulting in nodes within a cluster
Figure 648879DEST_PATH_IMAGE023
Receiving from cluster head node
Figure 882414DEST_PATH_IMAGE035
Information, in turn, leading to cluster head nodes
Figure 244126DEST_PATH_IMAGE036
Receiving information from two clusters; at the same time, the nodes in the cluster
Figure 831096DEST_PATH_IMAGE023
To cluster head node
Figure 227442DEST_PATH_IMAGE036
When transmitting information, the information can be transmitted to the cluster head node through the wormhole link
Figure 631879DEST_PATH_IMAGE035
Transmitting information resulting in cluster head nodes
Figure 871099DEST_PATH_IMAGE035
Receiving from an intra-cluster node
Figure 386394DEST_PATH_IMAGE023
Information; in order to solve the attack influence, the cluster head nodes need to calculate the density of the nodes in unit area, judge whether the density of the nodes in unit area meets the threshold condition, and meanwhile, the cluster head nodes need to receive the nodes of information
Figure 637247DEST_PATH_IMAGE037
Comparing with the cluster member node list recorded before, searching for the nodes not belonging to the cluster
Figure 212585DEST_PATH_IMAGE037
Cluster head node
Figure 424254DEST_PATH_IMAGE038
With cluster head node
Figure 743240DEST_PATH_IMAGE039
Respectively calculating the node density of unit area and threshold
Figure 848599DEST_PATH_IMAGE040
Make a comparison if
Figure 594839DEST_PATH_IMAGE041
While clustering nodes
Figure 277493DEST_PATH_IMAGE038
With cluster head node
Figure 400169DEST_PATH_IMAGE039
By pairing nodes receiving information
Figure 360035DEST_PATH_IMAGE037
Comparing with the self cluster member node list to discover the cluster head node
Figure 277176DEST_PATH_IMAGE038
Finding out nodes not belonging to the cluster
Figure 729017DEST_PATH_IMAGE037
Figure 389805DEST_PATH_IMAGE042
Then, it can be determined that the network is attacked by wormhole and cluster head nodes
Figure 204177DEST_PATH_IMAGE038
And nodes in the cluster
Figure 682432DEST_PATH_IMAGE043
All are wormhole attack nodes.
CN202111029581.8A 2021-09-03 2021-09-03 Distributed power monitoring system network clustering routing wormhole attack identification method Active CN113497808B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111029581.8A CN113497808B (en) 2021-09-03 2021-09-03 Distributed power monitoring system network clustering routing wormhole attack identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111029581.8A CN113497808B (en) 2021-09-03 2021-09-03 Distributed power monitoring system network clustering routing wormhole attack identification method

Publications (2)

Publication Number Publication Date
CN113497808A CN113497808A (en) 2021-10-12
CN113497808B true CN113497808B (en) 2023-01-24

Family

ID=77997159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111029581.8A Active CN113497808B (en) 2021-09-03 2021-09-03 Distributed power monitoring system network clustering routing wormhole attack identification method

Country Status (1)

Country Link
CN (1) CN113497808B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2552168A1 (en) * 2011-07-27 2013-01-30 Alcatel Lucent Clustering and resource allocation in ad hoc networks
CN111865469A (en) * 2020-07-31 2020-10-30 江西师范大学 A fault-tolerant time synchronization method and system for industrial Internet of things based on blockchain
CN113038565A (en) * 2021-02-05 2021-06-25 南京航空航天大学 Wireless sensor privacy protection route control method based on inter-cluster planned route

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213770B (en) * 2019-07-09 2022-10-21 国网宁夏电力有限公司 Collusion attack prevention method and system for wireless sensor network
CN113055891B (en) * 2021-03-17 2023-08-15 长春工业大学 A Secure Routing Method for Wireless Sensor Networks Based on Adaptive Trust Mechanism

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2552168A1 (en) * 2011-07-27 2013-01-30 Alcatel Lucent Clustering and resource allocation in ad hoc networks
CN111865469A (en) * 2020-07-31 2020-10-30 江西师范大学 A fault-tolerant time synchronization method and system for industrial Internet of things based on blockchain
CN113038565A (en) * 2021-02-05 2021-06-25 南京航空航天大学 Wireless sensor privacy protection route control method based on inter-cluster planned route

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一个新型分布式无线传感器分层路由协议;刘春涛等;《计算机技术与发展》;20100410(第04期);41-44 *

Also Published As

Publication number Publication date
CN113497808A (en) 2021-10-12

Similar Documents

Publication Publication Date Title
KR100669238B1 (en) How to provide routing protocol of sensor network
CN104335530B (en) Network routing protocol power-economizing method and device for network element
CN106878995B (en) Method for identifying abnormal type of wireless sensor network based on perception data
CN108770036B (en) Inter-cluster-head communication method and wireless sensor network routing device
CN110830998A (en) A method for identifying malicious nodes in the Internet of Vehicles based on trust mechanism
EP4209108B1 (en) Malicious black hole node detection and circumvention
CN102917430A (en) Credible security route of wireless sensor network on basis of quantum ant colony algorithm
CN107197495B (en) Wireless sensor network security routing method based on multi-attribute decision
CN113411213B (en) Topology control method and collaborative monitoring method of ad hoc network based on Internet of Things
CN110198549A (en) Event driving type wireless sensor network cluster routing method and system
CN111769867A (en) Satellite network security routing method
CN104202787A (en) Optimum redundancy based adaptive wireless sensor network routing method
CN113497808B (en) Distributed power monitoring system network clustering routing wormhole attack identification method
CN108924825A (en) A kind of high energy efficiency trust management and credible routing method towards SDWSNs
CN108900517B (en) Safety route defense method based on HWMP protocol
CN106303901A (en) In a kind of wireless sense network, infallible data based on collaborative filtering merges optimization method
CN113708953B (en) Underwater acoustic sensor network anti-damage method based on node importance balance
CN102271063A (en) Self loop detecting method and system
CN106332131B (en) A wireless sensor network clone node detection method and system
CN113301571A (en) Strong defense method for malicious node attack in wireless sensor network
CN102843672A (en) Malicious node detection method for sensing network based on energy fields
CN102932794B (en) Black hole attack detection method in a kind of clustering self-organizing network
CN111031506B (en) Wireless sensor network clustering method based on Voronoi domain processing
CN110086779A (en) A kind of communication security method of discrimination of multi-area optical network crosstalk attack
Gowtham et al. An artificial immune system‐based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant