CN113497808B - Distributed power monitoring system network clustering routing wormhole attack identification method - Google Patents
Distributed power monitoring system network clustering routing wormhole attack identification method Download PDFInfo
- Publication number
- CN113497808B CN113497808B CN202111029581.8A CN202111029581A CN113497808B CN 113497808 B CN113497808 B CN 113497808B CN 202111029581 A CN202111029581 A CN 202111029581A CN 113497808 B CN113497808 B CN 113497808B
- Authority
- CN
- China
- Prior art keywords
- cluster
- nodes
- node
- cluster head
- wormhole
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a distributed power monitoring system network clustering routing wormhole attack identification method, which comprises a cluster head node and cluster head node wormhole attack identification method, an intra-cluster node and intra-cluster node wormhole attack identification method, and a cluster head node and intra-cluster node wormhole attack identification method. The method can ensure the network safety and reliability of the distributed power monitoring system and is based on the node density.
Description
Technical Field
The invention relates to the technical field of network information security, in particular to a distributed power monitoring system network clustering routing wormhole attack identification method based on node density.
Background
At present, the wormhole attack is one of common routing attacks of a distributed power monitoring system network, which can reduce the credibility of each data in the network and change the topological structure of the network. In a network clustering routing protocol of a distributed power monitoring system, an intra-cluster node is responsible for collecting data and sending the data to a cluster head node, and the cluster head node is responsible for managing and controlling member nodes in the cluster to perform data fusion, inter-cluster forwarding and other work. If the network has wormhole attack nodes, the information in the attacked cluster is disordered, and the network is in error. The adoption of the wormhole attack identification method to judge whether wormhole attack nodes exist is one of key factors for guaranteeing the safe transmission of network information.
In order to accurately judge each node and effectively identify an attack node, the traditional wormhole attack identification method adopts the arrangement of anchor nodes, obtains the hop count between two communication nodes, calculates the average distance of each hop and compares the average distance with the maximum communication radius of the node, and judges the node exceeding the maximum communication radius as the wormhole attack node.
At present, the wormhole attack identification has the following main problems:
in the process of identifying the wormhole attack, a large number of anchor nodes need to be arranged, which brings excessive equipment overhead and affects the cost of the whole network.
In the process of identifying the wormhole attack, strict clock synchronization needs to be set, which can increase the energy consumption of node information transmission and influence the survival time of the network.
In the process of identifying the wormhole attack, whether the functions of the nodes in the cluster and the cluster head nodes are different and the structural characteristics of the clustering routing protocol are adapted or not is not considered.
Disclosure of Invention
The invention mainly aims to provide a distributed power monitoring system network clustering routing wormhole attack recognition method, and provides a distributed power monitoring system network clustering routing wormhole attack recognition method based on node density, which is scientific and reasonable and can ensure the safety and reliability of a distributed power monitoring system network, aiming at the problems of incomplete considered elements, and unreasonable energy consumption and economic cost of the wormhole attack recognition method.
The technical scheme adopted by the invention is as follows: a distributed power monitoring system network clustering routing wormhole attack identification method comprises a cluster head node and cluster head node wormhole attack identification method, an intra-cluster node and intra-cluster node wormhole attack identification method and a cluster head node and intra-cluster node wormhole attack identification method; assuming that the nodes in the network are approximately evenly distributed,the nodes are arranged on the side lengthWithin the square region of (2), network unit area node densityExpressed as:
further, the cluster head node and cluster head node wormhole attack identification method includes: when the two cluster head nodes are wormhole attack nodes, the node density per unit area under the ideal state is at leastHowever, in the actual node arrangement process, the non-uniformity of node distribution is considered, and wormhole attack nodes are probably distributed at the edge of the geographic positionIntroducing a wormhole node judgment coefficient under the condition of equal conditionsWhen the node judges that the actual node density per unit area is greater than the threshold valueThen, the self is judged as a wormhole attack node and the threshold valueThe calculation formula of (2) is as follows:
defining clusters in a network asEach cluster head node isThe nodes in each cluster areIf cluster head node in networkAnd cluster head nodeWhen the nodes are attacked by wormholes, the nodes in each clusterTo cluster head nodeWhen transmitting information, the cluster head node is passedWith cluster head nodeFormed wormhole link is to cluster head nodeTransmitting information; in the same way, each cluster of nodesTo cluster head nodeWhen transmitting information, the information can be transmitted to the cluster head node through the wormhole linkTransmitting information, which results in cluster head nodesWith cluster head nodeBoth capable of receiving information from both clusters; to cluster head nodeWith cluster head nodeRespectively calculating the node density per unit area and the threshold valueMake a comparison ifThen it can be determined that the network is attacked by wormhole and the head node is clusteredWith cluster head nodeAll are wormhole attack nodes.
Furthermore, the method for identifying the cluster nodes and the cluster node wormhole attacks comprises the following steps: if the nodes in the cluster in the networkWith nodes in the clusterWhen the nodes are attacked by wormholes, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information passes through the nodes in the clusterAnd nodes in the clusterThe formed wormhole link is connected to the nodes in the clusterTransmitting information; in the same way, nodes in a clusterTo cluster head nodeWhen transmitting information, the information can pass through the wormhole link to the nodes in the clusterTransmitting information resulting in cluster head nodesReceiving from an intra-cluster nodeInformation, cluster head nodeReceiving from an intra-cluster nodeInformation; in order to solve the attack influence, the cluster head node needs to identify the node identification number of the received informationComparing with the previously recorded cluster member node list to find the nodes not belonging to the clusterIf cluster head nodeBy the node receiving the informationAnd withComparing the cluster member node lists to find out the nodes which do not belong to the clusterIs/are as followsWhile clustering nodesBy pairing nodes receiving informationAndcomparing the cluster member node lists to find out nodes not belonging to the clusterIs/are as followsThen, it can be determined that the network is attacked by wormhole and the nodes in the clusterWith nodes in the clusterAll are wormhole attack nodes.
Furthermore, the cluster head node and cluster internal node wormhole attack identification method comprises the following steps: if networkCluster head node in clusterAndin-cluster node in clusterWhen the nodes are attacked by wormholes, the nodes in the clusterTo cluster head nodeWhen transmitting information, the cluster head node is passedWith nodes in the clusterFormed wormhole link to intra-cluster nodeTransmitting information resulting in nodes within a clusterReceiving from cluster head nodeInformation, in turn, leading to cluster head nodesReceiving information from two clusters; at the same time, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information can be transmitted to the cluster head node through the wormhole linkTransmitting information resulting in cluster head nodesReceiving from an intra-cluster nodeInformation; in order to solve the attack influence, the cluster head nodes need to calculate the density of the nodes in unit area, judge whether the density of the nodes in unit area meets the threshold condition, and meanwhile, the cluster head nodes need to receive the nodes of informationComparing with the cluster member node list recorded before, searching the cluster which does not belong to the clusterNode pointCluster head nodeWith cluster head nodeRespectively calculating the node density per unit area and the threshold valueMake a comparison ifWhile clustering nodesWith cluster head nodeBy the node receiving the informationComparing with the self cluster member node list to discover the cluster head nodeFinding out nodes not belonging to the cluster Then it can be determined that the network is attacked by wormhole and the head node is clusteredWith nodes in the clusterAll are wormhole attack nodes.
The invention has the advantages that: the method can ensure the network safety and reliability of the distributed power monitoring system and is a distributed power monitoring system network clustering routing wormhole attack identification method based on the node density.
In addition to the above-described objects, features and advantages, the present invention has other objects, features and advantages. The present invention will be described in further detail below with reference to the drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification.
FIG. 1 is a flow chart of a distributed power monitoring system network clustering routing wormhole attack identification method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, a method for identifying a cluster routing wormhole attack in a network of a distributed power monitoring system includes a cluster head node and cluster head node wormhole attack identification method, an intra-cluster node and intra-cluster node wormhole attack identification method, and a cluster head node and intra-cluster node wormhole attack identification method; assuming that the nodes in the network are approximately evenly distributed,the nodes are arranged on the side lengthWithin the square region of (2), network unit area node densityExpressed as:
the cluster head node and cluster head node wormhole attack identification method comprises the following steps: when the two clusters of head nodes are both wormhole attack nodes, the density of the nodes per unit area under the ideal state is at leastHowever, in the actual node arrangement process, considering the conditions that the node distribution is non-uniform and the wormhole attack nodes are likely to be distributed at the edge of the geographic position, and the like, in order to reduce the misjudgment proportion of the wormhole nodes, a wormhole node judgment coefficient is introducedWhen the node judges that the actual node density per unit area is greater than the threshold valueThen, the self is judged as a wormhole attack node and the threshold valueThe calculation formula of (2) is as follows:
defining clusters in a network asEach cluster head node isThe nodes in each cluster areIf cluster head node in networkAnd cluster head nodeWhen the nodes are attacked by wormholes, the nodes in each clusterTo cluster head nodeWhen transmitting information, the information passes through the cluster head nodeWith cluster head nodeFormed wormhole link is to cluster head nodeTransmitting information; in the same way, each cluster of nodesTo cluster head nodeWhen transmitting information, the information can be transmitted to the cluster head node through the wormhole linkTransmitting information, which results in cluster head nodesWith cluster head nodeBoth capable of receiving information from both clusters; to cluster head nodeWith cluster head nodeRespectively calculating the node density per unit area and the threshold valueMake a comparison ifThen it can be determined that the network is attacked by wormhole and the head node is clusteredWith cluster head nodeAll are wormhole attack nodes.
The cluster node and cluster node wormhole attack identification method comprises the following steps: if the nodes in the cluster in the networkAnd nodes in the clusterWhen the nodes are attacked by wormholes, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information passes through the nodes in the clusterWith nodes in the clusterThe formed wormhole link is connected to the nodes in the clusterTransmitting information; in the same way, nodes in a clusterTo cluster head nodeWhen transmitting information, the information can pass through the wormhole link to the nodes in the clusterTransmitting information resulting in cluster head nodesReceiving from an intra-cluster nodeInformation, cluster head nodeReceiving from an intra-cluster nodeInformation; in order to solve the attack influence, the cluster head node needs to identify the node identification number of the received informationComparing with the cluster member node list recorded before, and searching for nodes not belonging to the clusterIf cluster head nodeBy pairing nodes receiving informationAndcomparing the cluster member node lists to find out the nodes which do not belong to the clusterIs/are as followsWhile clustering nodesBy pairing nodes receiving informationAndcomparing the cluster member node lists to find out the nodes which do not belong to the clusterIs/are as followsThen it can be determined that the network is attacked by wormhole and the nodes in the clusterAnd nodes in the clusterAll are wormhole attack nodes.
The cluster head node and cluster internal node wormhole attack identification method comprises the following steps: if networkCluster head node in clusterAnd withIn-cluster nodeWhen the nodes are attacked by wormholes, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information passes through the cluster head nodeWith nodes in the clusterFormed wormhole link to intra-cluster nodeTransmitting information resulting in nodes within a clusterReceiving from cluster head nodeInformation, in turn, leading to cluster head nodesReceiving information from two clusters; at the same time, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information can be transmitted to the cluster head node through the wormhole linkTransmitting information resulting in cluster head nodesReceiving from an intra-cluster nodeInformation; in order to solve the attack influence, the cluster head nodes need to calculate the density of the nodes in unit area, judge whether the density of the nodes in unit area meets the threshold condition, and meanwhile, the cluster head nodes need to receive the nodes of informationComparing with the cluster member node list recorded before, searching for the nodes not belonging to the clusterCluster head nodeWith cluster head nodeRespectively calculating the node density of unit area and thresholdMake a comparison ifWhile clustering head nodesWith cluster head nodeBy the node receiving the informationComparing with the self cluster member node list to find the cluster head nodeFinding out nodes not belonging to the cluster Then, it can be determined that the network is attacked by wormhole and cluster head nodesWith nodes in the clusterAll are wormhole attack nodes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.
Claims (1)
1. A distributed power monitoring system network clustering routing wormhole attack recognition method is characterized by comprising a cluster head node and cluster head node wormhole attack recognition method, an intra-cluster node and intra-cluster node wormhole attack recognition method and a cluster head node and intra-cluster node wormhole attack recognition method;
when the nodes in the network are uniformly distributed,the nodes are arranged on the side lengthWithin the square region of (2), network unit area node densityExpressed as:
the cluster head node and cluster head node wormhole attack identification method comprises the following steps:
when two cluster head nodes are both wormhole attack nodes, a wormhole node judgment coefficient is introducedWhen the node judges that the actual node density per unit area is greater than the threshold valueThen, the self is judged as a wormhole attack node and the threshold valueThe calculation formula of (2) is as follows:
defining clusters in a network asEach cluster head node isNodes in each cluster areIf cluster head node in networkAnd cluster head nodeWhen the nodes are attacked by wormholes, the nodes in each clusterTo cluster head nodeWhen transmitting information, the cluster head node is passedWith cluster head nodeFormed wormhole link-to-cluster head nodeTransmitting information; in the same way, each cluster of nodesTo cluster head nodeWhen transmitting information, the information can be transmitted to the cluster head node through the wormhole linkTransmitting information, which results in cluster head nodesWith cluster head nodeBoth are capable of receiving information from both clusters; to cluster head nodeWith cluster head nodeRespectively calculating the node density per unit area and the threshold valueMake a comparison ifThen, it can be determined that the network is attacked by wormhole and cluster head nodesWith cluster head nodeAll nodes are wormhole attack nodes;
the cluster node and cluster node wormhole attack identification method comprises the following steps:
if in-cluster node in networkWith nodes in the clusterWhen the nodes are attacked by wormholes, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information passes through the nodes in the clusterWith nodes in the clusterThe formed wormhole link is connected to the nodes in the clusterTransmitting information; in the same way, nodes in a clusterTo cluster head nodeWhen information is transmitted, the wormhole link is used for transmitting information to the nodes in the clusterTransmitting information resulting in cluster head nodesReceiving from an intra-cluster nodeInformation, cluster head nodeReceiving from an intra-cluster nodeInformation; in order to solve the attack influence, the cluster head node needs to identify the node identification number of the received informationComparing with the previously recorded cluster member node list to find the nodes not belonging to the clusterIf cluster head nodeBy pairing nodes receiving informationAndcomparing the cluster member node lists to find out nodes not belonging to the clusterIsWhile clustering nodesBy pairing nodes receiving informationAndcomparing the cluster member node lists to find out the nodes which do not belong to the clusterIs/are as followsThen, it can be determined that the network is attacked by wormhole and the nodes in the clusterAnd nodes in the clusterAll are wormhole attack nodes;
the cluster head node and cluster internal node wormhole attack identification method comprises the following steps:
if networkCluster head node in clusterAndin-cluster node in clusterWhen the nodes are attacked by wormholes, the nodes in the clusterTo cluster head nodeWhen transmitting information, the cluster head node is passedAnd nodes in the clusterFormed wormhole link to intra-cluster nodeTransmitting information resulting in nodes within a clusterReceiving from cluster head nodeInformation, in turn, leading to cluster head nodesReceiving information from two clusters; at the same time, the nodes in the clusterTo cluster head nodeWhen transmitting information, the information can be transmitted to the cluster head node through the wormhole linkTransmitting information resulting in cluster head nodesReceiving from an intra-cluster nodeInformation; in order to solve the attack influence, the cluster head nodes need to calculate the density of the nodes in unit area, judge whether the density of the nodes in unit area meets the threshold condition, and meanwhile, the cluster head nodes need to receive the nodes of informationComparing with the cluster member node list recorded before, searching for the nodes not belonging to the clusterCluster head nodeWith cluster head nodeRespectively calculating the node density of unit area and thresholdMake a comparison ifWhile clustering nodesWith cluster head nodeBy pairing nodes receiving informationComparing with the self cluster member node list to discover the cluster head nodeFinding out nodes not belonging to the cluster Then, it can be determined that the network is attacked by wormhole and cluster head nodesAnd nodes in the clusterAll are wormhole attack nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111029581.8A CN113497808B (en) | 2021-09-03 | 2021-09-03 | Distributed power monitoring system network clustering routing wormhole attack identification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111029581.8A CN113497808B (en) | 2021-09-03 | 2021-09-03 | Distributed power monitoring system network clustering routing wormhole attack identification method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113497808A CN113497808A (en) | 2021-10-12 |
CN113497808B true CN113497808B (en) | 2023-01-24 |
Family
ID=77997159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111029581.8A Active CN113497808B (en) | 2021-09-03 | 2021-09-03 | Distributed power monitoring system network clustering routing wormhole attack identification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113497808B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2552168A1 (en) * | 2011-07-27 | 2013-01-30 | Alcatel Lucent | Clustering and resource allocation in ad hoc networks |
CN111865469A (en) * | 2020-07-31 | 2020-10-30 | 江西师范大学 | Industrial Internet of things fault-tolerant time synchronization method and system based on block chain |
CN113038565A (en) * | 2021-02-05 | 2021-06-25 | 南京航空航天大学 | Wireless sensor privacy protection route control method based on inter-cluster planned route |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213770B (en) * | 2019-07-09 | 2022-10-21 | 国网宁夏电力有限公司 | Collusion attack prevention method and system for wireless sensor network |
CN113055891B (en) * | 2021-03-17 | 2023-08-15 | 长春工业大学 | Wireless sensor network security routing method based on self-adaptive trust mechanism |
-
2021
- 2021-09-03 CN CN202111029581.8A patent/CN113497808B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2552168A1 (en) * | 2011-07-27 | 2013-01-30 | Alcatel Lucent | Clustering and resource allocation in ad hoc networks |
CN111865469A (en) * | 2020-07-31 | 2020-10-30 | 江西师范大学 | Industrial Internet of things fault-tolerant time synchronization method and system based on block chain |
CN113038565A (en) * | 2021-02-05 | 2021-06-25 | 南京航空航天大学 | Wireless sensor privacy protection route control method based on inter-cluster planned route |
Non-Patent Citations (1)
Title |
---|
一个新型分布式无线传感器分层路由协议;刘春涛等;《计算机技术与发展》;20100410(第04期);41-44 * |
Also Published As
Publication number | Publication date |
---|---|
CN113497808A (en) | 2021-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Farzaneh et al. | An anomaly-based IDS for detecting attacks in RPL-based internet of things | |
Tao et al. | An improvement for LEACH algorithm in wireless sensor network | |
CN110830998B (en) | Vehicle networking malicious node identification method based on trust mechanism | |
CN108770036B (en) | Inter-cluster-head communication method and wireless sensor network routing device | |
CN107404718B (en) | Malicious node detection method for wireless sensor network | |
CN103095589B (en) | The sensor nodes in wireless sensor network trust value management method of tree topology based on IPv6 | |
EP2915288B1 (en) | Ip packet transmission using vehicular transport | |
WO2020093907A1 (en) | Trust and noise point detection technology-based intrusion detection method for multi-protocol layer | |
CN113949554A (en) | High-speed transmission method for distributed network global situation awareness data | |
CN108833430B (en) | Topology protection method of software defined network | |
Naveena et al. | Analysis and countermeasures of black-hole attack in manet by employing trust-based routing | |
CN111245833B (en) | Vehicle intrusion detection method and device | |
CN103401878B (en) | Frequency spectrum perception data tampering attack detection method | |
CN108924825A (en) | A kind of high energy efficiency trust management and credible routing method towards SDWSNs | |
CN113497808B (en) | Distributed power monitoring system network clustering routing wormhole attack identification method | |
Cui et al. | NRE: Suppress selective forwarding attacks in wireless sensor networks | |
CN116582910B (en) | Digital information transmission method and system | |
CN113708953A (en) | Underwater acoustic sensor network anti-damage method based on node importance balance | |
CN102271063A (en) | Self loop detecting method and system | |
CN116405503A (en) | Unmanned aerial vehicle cluster network topology inference method | |
Suganthi Evangeline et al. | An efficient data transmission in VANET using clustering method | |
CN114553322A (en) | Low-overhead underwater acoustic network decentralized method | |
Saied et al. | A lightweight threat detection system for industrial wireless sensor networks | |
CN112804685A (en) | Lightweight green safety data fusion model establishment method for industrial Internet of things | |
CN111641593A (en) | Internet of things security architecture and information security interaction method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |