摘要
无线传感器网络WSN(Wireless Sensor Networks)被广泛应用于军事、生产、医疗等各个方面,而当下的许多传感器网络都部署在恶劣、开放的环境中,存在各种各样的威胁。黑洞攻击是一种典型的路由攻击,在这种攻击中恶意节点声称自己是剩余能量多、能够一跳到达目的节点的节点或者声称自己就是目的节点,因此很多节点会把要发送的数据发给该恶意节点,而恶意节点吸引数据包后,并不将数据包转发而是丢弃,这就造成传输空洞。针对这种特性,文中提出了一种基于位置信息的诱捕检测算法BTCOLI(Blackhole Attack Detection Algorithm Based on Location Information),以实际不存在的目的节点为诱饵,找到黑洞节点,对其进行身份验证以及位置检测,从而剔除该恶意节点。同时,还提出了相应的防御方案:在网络中加入预共享对称密钥,并提供HMAC(Hash-based Message Authentication Code)消息验证机制,以防止恶意节点加入网络。最后通过搭建NS-2下的仿真平台,验证了该算法在检测率方面的优越性。
Wireless sensor networks(WSN)are widely used in military,production,medical and so on.Many sensor networks are deployed in hostile and open environments,so there exist a variety of threats.Blackhole attack is a typical route attack in WSNs.A malicious node claims that it has enough residual energy and it can reach the destination in one hop or claims itself to be the destination node.So the malicious node can attract other nodes to send data to it.But it will discard the packets without forwarding it which results in the"data hole".This paper proposed a new location detection method with trapping method.A non-existent destination node is used as a bait to locate the blackhole nodes.By verifying the identity and position information of the nodes,the malicious nodes can be removed.At the same time,the algorithm adds the pre-shared symmetric key and HMAC(Hash-based message authentication code)message authentication mechanism to prevent malicious nodes from joining the network.The results of simulation based on NS2 platform show that the proposed algorithm is superior to other ones with higher detection ratio.
引文
[1]牟思,殷虹,苏醒.无线传感网络技术与应用[M].北京:中国水利水电出版社,2016:1-243.
[2] DAS S,MILLER D R,KAUFMAN Y,et al.Introduction to Wireless Sensor Networks[M]∥Wireless Sensor and Mobile Ad-Hoc Networks.New York:Springer,2015:1-18.
[3] ZHANG L.Research on Wireless Sensor Network Routing Protocol Based on Energy Equilibrium[C]∥International Conference on Frontiers of Manufacturing Science&Measuring Technology.2017.
[4] KOZMA W,LAZOS L.REAct:resource-efficient accountability for node misbehavior in ad hoc networks based on random audits[C]∥ACM Conference on Wireless Network Security(WISEC2009).Zurich,Switzerland,2009:103-110.
[5] GUPTA S,KAR S,DHARMARAJA S.BAAP:Blackhole attack avoidance protocol for wireless network[C]∥International Conference on Computer and Communication Technology.2011:468-473.
[6] WAZID M,KATAL A,SACHAN R S,et al.Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network[C]∥International Conference on Communications and Signal Processing.IEEE,2013:576-581.
[7] AAD I,HUBAUX J P,KNIGHTLY E W.Denial of service resilience in ad hoc networks[C]∥Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.ACM,2004:202-215.
[8] DENG H,LI W,AGRAWAL D P.Routing security in wireless ad hoc networks[J].IEEE Communications Magazine,2002,40(10):70-75.
[9] AL-SHURMAN M,YOO S M,PARK S.Black hole attack in mobile Ad Hoc networks[C]∥Southeast Regional Conference,2004.Huntsville,Alabama,USA,2004:96-97.
[10]SHANG X H.Research on Location Algorithm of Wireless Sensor Network Based on DV-Hop[D].Jilin:Jilin University,2012.(in Chinese)尚小航.基于DV-Hop的无线传感器网络定位算法研究[D].吉林:吉林大学,2012.
[11]LAZOS L,POOVENDRAN R,MEADOWS C,et al.Preventing wormhole attacks on wireless ad hoc networks:agraph theoretic approach[C]∥Wireless Communications and Networking Conference.2015.
[12]ABDELSHAFY M A,KING P J B.Resisting blackhole attacks on MANETs[C]∥IEEE Consumer Communications&Networking Conference.IEEE,2016:1048-1053.
[13]宋成明,赵文,常浩.计算机网络安全原理与技术研究[M].北京:中国水利水电出版社,2015.
[14]LI J,CHEN X,LI M,et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J].IEEE Transactions on Parallel&Distributed Systems,2014,25(6):1615-1625.