计算机科学 ›› 2019, Vol. 46 ›› Issue (2): 102-108.doi: 10.11896/j.issn.1002-137X.2019.02.016

• 信息安全 • 上一篇    下一篇

一种针对无线传感网中黑洞攻击的检测与防御方法

王珺1,2, 朱志伟2刘俊杰, 1,2   

  1. 南京邮电大学宽带无线通信与传感网技术教育部重点实验室 南京2100031
    南京邮电大学通信与信息工程学院 南京2100032
  • 收稿日期:2018-01-09 出版日期:2019-02-25 发布日期:2019-02-25
  • 通讯作者: 王 珺(1975-),女,博士,副教授,主要研究方向为下一代网络技术、传感器网络,E-mail:wang_jun@njupt.edu.cn
  • 作者简介:朱志伟(1991-),男,硕士,主要研究方向为传感器网络的安全性研究;刘俊杰(1994-),男,硕士生,主要研究方向为网络安全技术。
  • 基金资助:
    本文受国家自然科学基金(61401234),江苏省高校优势学科工程资助.

Detection and Defense Method for Blackhole Attacks in Wireless Sensor Networks

WANG Jun1,2, ZHU Zhi-wei2, LIU Jun-jie1,2   

  1. Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,Nanjing University of Posts and Telecommunications,Nanjing 210003,China1
    College of Telecommunications and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China2
  • Received:2018-01-09 Online:2019-02-25 Published:2019-02-25

摘要: 无线传感器网络WSN(Wireless Sensor Networks)被广泛应用于军事、生产、医疗等各个方面,而当下的许多传感器网络都部署在恶劣、开放的环境中,存在各种各样的威胁。黑洞攻击是一种典型的路由攻击,在这种攻击中恶意节点声称自己是剩余能量多、能够一跳到达目的节点的节点或者声称自己就是目的节点,因此很多节点会把要发送的数据发给该恶意节点,而恶意节点吸引数据包后,并不将数据包转发而是丢弃,这就造成传输空洞。针对这种特性,文中提出了一种基于位置信息的诱捕检测算法BTCOLI(Blackhole Attack Detection Algorithm Based on Location Information),以实际不存在的目的节点为诱饵,找到黑洞节点,对其进行身份验证以及位置检测,从而剔除该恶意节点。同时,还提出了相应的防御方案:在网络中加入预共享对称密钥,并提供HMAC(Hash-based Message Authentication Code)消息验证机制,以防止恶意节点加入网络。最后通过搭建NS-2下的仿真平台,验证了该算法在检测率方面的优越性。

关键词: 黑洞攻击, 路由层攻击, 无线传感器网络

Abstract: Wireless sensor networks(WSN) are widely used in military,production,medical and so on.Many sensor networks are deployed in hostile and open environments,so there exist a variety of threats.Blackhole attack is a typical route attack in WSNs.A malicious node claims that it has enough residual energy and it can reach the destination in one hop or claims itself to be the destination node.So the malicious node can attract other nodes to send data to it.But it will discard the packets without forwarding it which results in the “data hole”.This paper proposed a new location detection method with trapping method.A non-existent destination node is used as a bait to locate the blackhole nodes.By verifying the identity and position information of the nodes,the malicious nodes can be removed.At the same time,the algorithm adds the pre-shared symmetric key and HMAC(Hash-based message authentication code) message authentication mechanism to prevent malicious nodes from joining the network.The results of simulation based on NS2 platform show that the proposed algorithm is superior to other ones with higher detection ratio.

Key words: Blackhole attack, Routing layer attacks, WSN

中图分类号: 

  • TN915.08
[1]牟思,殷虹,苏醒.无线传感网络技术与应用[M].北京:中国水利水电出版社,2016:1-243.
[2]DAS S,MILLER D R,KAUFMAN Y,et al.Introduction to Wireless Sensor Networks[M]∥Wireless Sensor and Mobile Ad-Hoc Networks.New York:Springer,2015:1-18.
[3]ZHANG L.Research on Wireless Sensor Network Routing Protocol Based on Energy Equilibrium[C]∥International Confe-rence on Frontiers of Manufacturing Science & Measuring Technology.2017.
[4]KOZMA W,LAZOS L.REAct:resource-efficient accountability for node misbehavior in ad hoc networks based on random audits[C]∥ACM Conference on Wireless Network Security(WISEC 2009).Zurich,Switzerland,2009:103-110.
[5]GUPTA S,KAR S,DHARMARAJA S.BAAP:Blackhole at- tack avoidance protocol for wireless network[C]∥International Conference on Computer and Communication Technology.2011:468-473.
[6]WAZID M,KATAL A,SACHAN R S,et al.Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network[C]∥International Conference on Communications and Signal Processing.IEEE,2013:576-581.
[7]AAD I,HUBAUX J P,KNIGHTLY E W.Denial of service resilience in ad hoc networks[C]∥Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.ACM,2004:202-215.
[8]DENG H,LI W,AGRAWAL D P.Routing security in wireless ad hoc networks[J].IEEE Communications Magazine,2002,40(10):70-75.
[9]AL-SHURMAN M,YOO S M,PARK S.Black hole attack in mobile Ad Hoc networks[C]∥Southeast Regional Conference,2004.Huntsville,Alabama,USA,2004:96-97.
[10]SHANG X H.Research on Location Algorithm of Wireless Sensor Network Based on DV-Hop[D].Jilin:Jilin University,2012.(in Chinese)
尚小航.基于DV-Hop的无线传感器网络定位算法研究[D].吉林:吉林大学,2012.
[11]LAZOS L,POOVENDRAN R,MEADOWS C,et al.Preventing wormhole attacks on wireless ad hoc networks:a graph theoretic approach[C]∥Wireless Communications and Networking Conference.2015.
[12]ABDELSHAFY M A, KING P J B.Resisting blackhole attacks on MANETs[C]∥IEEE Consumer Communications & Networking Conference.IEEE,2016:1048-1053.
[13]宋成明,赵文,常浩.计算机网络安全原理与技术研究[M].北京:中国水利水电出版社,2015.
[14]LI J,CHEN X,LI M,et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(6):1615-1625.
[1] 范星泽, 禹梅.
改进灰狼算法的无线传感器网络覆盖优化
Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer
计算机科学, 2022, 49(6A): 628-631. https://doi.org/10.11896/jsjkx.210500037
[2] 王国武, 陈元琰.
基于跳数修正和遗传模拟退火优化DV-Hop定位算法
Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm
计算机科学, 2021, 48(6A): 313-316. https://doi.org/10.11896/jsjkx.201000101
[3] 王栋, 王虎, 姜迁里.
基于6LoWPAN的低功耗长距离海洋环境监测系统
Low Power Long Distance Marine Environment Monitoring System Based on 6LoWPAN
计算机科学, 2020, 47(6A): 596-598. https://doi.org/10.11896/JsJkx.190900194
[4] 刘宁宁,樊建席,林政宽.
基于地址空间的树型网络地址分配
Address Assignment Algorithm for Tree Network Based on Address Space
计算机科学, 2020, 47(2): 239-244. https://doi.org/10.11896/jsjkx.190400130
[5] 苏凡军,杜可怡.
WSNs中基于信任度的节能机会路由算法
Trust Based Energy Efficient Opportunistic Routing Algorithm in Wireless Sensor Networks
计算机科学, 2020, 47(2): 300-305. https://doi.org/10.11896/jsjkx.190100172
[6] 周文祥, 乔学工.
基于能量优化的无线传感器网络任播路由算法
Anycast Routing Algorithm for Wireless Sensor Networks Based on Energy Optimization
计算机科学, 2020, 47(12): 291-295. https://doi.org/10.11896/jsjkx.190900069
[7] 李正阳, 陶洋, 周远林, 杨柳.
基于能量获取的能耗均衡多跳分簇路由协议
Energy-balanced Multi-hop Cluster Routing Protocol Based on Energy Harvesting
计算机科学, 2020, 47(11A): 296-302. https://doi.org/10.11896/jsjkx.200300002
[8] 侯明星,亓慧,黄斌科.
基于分布式压缩感知的无线传感器网络异常数据处理
Data Abnormality Processing in Wireless Sensor Networks Based on Distributed Compressed Sensing
计算机科学, 2020, 47(1): 276-280. https://doi.org/10.11896/jsjkx.180901667
[9] 王改云, 王磊杨, 路皓翔.
基于混合群智能算法优化的RSSI质心定位算法
RSSI-based Centroid Localization Algorithm Optimized by Hybrid Swarm Intelligence Algorithm
计算机科学, 2019, 46(9): 125-129. https://doi.org/10.11896/j.issn.1002-137X.2019.09.017
[10] 刘静, 赖英旭, 杨胜志, Lina Xu.
一种面向WSN的双向身份认证协议及串空间模型
Bilateral Authentication Protocol for WSN and Certification by Strand Space Model
计算机科学, 2019, 46(9): 169-175. https://doi.org/10.11896/j.issn.1002-137X.2019.09.024
[11] 王静, 仇晓鹤.
基于分簇和融合补偿策略的多维标度定位算法
Advanced MDS-MAP Localization Algorithm with Clustering and Fusion Compensation Strategy
计算机科学, 2019, 46(8): 145-151. https://doi.org/10.11896/j.issn.1002-137X.2019.08.024
[12] 叶娟, 陈元琰, 王明, 尼迎波.
多通信半径与角度修正的凸规划改进定位算法
Optimized Convex Localization Algorithm Using Multiple Communication Radius and Angle Correction
计算机科学, 2019, 46(6A): 317-320.
[13] 梁平元, 李杰, 彭娇, 王会.
基于协作MIMO的UWSN三维动态分簇路由算法研究
Research on 3D Dynamic Clustering Routing Algorithm Based on Cooperative MIMO for UWSN
计算机科学, 2019, 46(6A): 336-342.
[14] 李秀琴, 王天荆, 白光伟, 沈航.
基于压缩感知的两阶段多目标定位算法
Two-phase Multi-target Localization Algorithm Based on Compressed Sensing
计算机科学, 2019, 46(5): 50-56. https://doi.org/10.11896/j.issn.1002-137X.2019.05.007
[15] 孙博文, 韦素媛.
基于自适应调整策略灰狼算法的DV-Hop定位算法
DV-Hop Localization Algorithm Based on Grey Wolf Optimization Algorithm with
Adaptive Adjutment Strategy
计算机科学, 2019, 46(5): 77-82. https://doi.org/10.11896/j.issn.1002-137X.2019.05.012
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!