CN101765109A - Program dynamic updating method for wireless sensor network capable of resisting compromised node attack - Google Patents

Program dynamic updating method for wireless sensor network capable of resisting compromised node attack Download PDF

Info

Publication number
CN101765109A
CN101765109A CN200910155041A CN200910155041A CN101765109A CN 101765109 A CN101765109 A CN 101765109A CN 200910155041 A CN200910155041 A CN 200910155041A CN 200910155041 A CN200910155041 A CN 200910155041A CN 101765109 A CN101765109 A CN 101765109A
Authority
CN
China
Prior art keywords
program
sensor node
message
base station
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910155041A
Other languages
Chinese (zh)
Other versions
CN101765109B (en
Inventor
卜佳俊
陈纯
何道敬
尹明剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN2009101550417A priority Critical patent/CN101765109B/en
Publication of CN101765109A publication Critical patent/CN101765109A/en
Application granted granted Critical
Publication of CN101765109B publication Critical patent/CN101765109B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a program dynamic updating method for a wireless sensor network capable of resisting compromised node attack, comprising the following steps: before deploying sensor nodes, a base station determines a Hash function, selects a Euclidean space, and decomposes the Euclidean space into a first subspace and a second subspace which are orthogonal to each other; the base station selects an identifier for each sensor node and a vector belonging to the first subspace; the vector, the identifier and the Hash function are respectively loaded into each sensor node; and after deploying the sensor nodes, when updating programs, the base station broadcasts a program updating message to the sensor network, and each sensor node verifies the effectiveness of the message after receiving the program updating message. The program dynamic updating method has the advantages that the programs on all the sensor nodes can be updated only by sending one broadcast message through the base station; operation is simple, and reliability is high; and even certain nodes are compromised, the safety of the wireless sensor network can still be ensured.

Description

But the method for dynamically updating wireless sensor network program of resisting compromised node attack
Technical field
The present invention relates to a kind of program (be also referred to as: software, down with) dynamically update method, belong to wireless communication field.
Background technology
In recent years, wireless sensor network is subjected to academia and industrial quarters attention more and more widely because of its wide application prospect.In most of occasions, for new demand is provided, the program on all the sensors node need be upgraded in the base station.Yet, so far, a kind of update method of dynamic routine does not safely and effectively also appear.Some agreement use digital signature ensures the fail safe of program dynamic updating, but this method can consume a large amount of resources, is not useful on the resource-constrained sensor node; Some agreements adopts the matrix orthogonality principle to ensure the fail safe of program dynamic updating, though that this method is calculated cost is few, and the spoof attack that these agreements can't resisting compromised node be started.That is to say that in these agreements, the compromise node can successfully pretend the false program updating message of base station broadcast, and then control whole sensor network.
Summary of the invention
But-the object of the present invention is to provide a kind of method for dynamically updating wireless sensor network program of resisting compromised node attack.
The technical solution adopted for the present invention to solve the technical problems is as follows:
But the method for dynamically updating wireless sensor network program of resisting compromised node attack mainly comprises with the lower part:
1) before sensor node deployment,
A hash function is determined in the base station;
A base station selected Euclidean space, this Euclidean space is decomposed into first subspace and second subspace of quadrature, the dimension of described first subspace is k, the dimension of described second subspace is n-k, wherein, n is the dimension of described Euclidean space, and k is the quantity of sensor node in the described wireless sensor network;
The base station is selected an identification identifier for each sensor node and is belonged to the vector of first subspace;
Described vector, identification identifier and hash function are loaded onto respectively in each sensor node;
2) behind sensor node deployment,
When the base station need be upgraded the program on all the sensors node, the base station is to sensor network radio program updating message, this program updating message comprises the timestamp that upgrades sequence number, message and send, the identification identifier of the program after upgrading, program version number, program identifier, each sensor node and with the corresponding cipher key Hash message authentication code of each sensor node, described cipher key Hash message authentication code with the vector of corresponding sensor node as key;
3) each sensor node is received the validity of verifying this message after the described program updating message according to the following steps:
I. sensor node extracts the cipher key Hash message authentication code of oneself according to the identification identifier of oneself from the program updating message that receives;
Ii. if the validity of the timestamp of renewal sequence number in the sensor node proving program updating message and message transmission all effective, is then carried out next step; Otherwise refuse this program updating message;
Iii. sensor node obtains the cipher key Hash message authentication code according to the vector that is loaded, with the cipher key Hash message authentication code that extracts in this cipher key Hash message authentication code and the step I relatively, if both equate, accept the program updating message line program of going forward side by side and upgrade; Otherwise refuse this program updating message.
Compared with prior art, the advantage that has of the present invention is:
(1) arbitrary sensor node m even the enemy has compromised, thus secret value C obtained mBut the enemy issues false program updates information and the checking by other sensor nodes at the base station that can't disguise oneself as, even therefore some node is compromised, the fail safe of this wireless sensor network still can be protected;
(2) ensure (comprising hash function, matrix quadrature and cipher key Hash message authentication code) fail safe of wireless sensor network by simple calculations, therefore the reliability height is particularly suitable for resource-constrained wireless sensor network;
(3) in order to upgrade the program on all the sensors node, the base station only needs to send a broadcast just can upgrade program on all the sensors node.
Description of drawings
Fig. 1 is the workflow diagram of method for dynamically updating wireless sensor network program of the present invention.
Embodiment
Relevant technical term is as follows:
The M program
X PidThe identifier of program M
X VerThe version of program M
HMAC () cipher key Hash message authentication code (keyed hash message authentication code)
Xor operation
The dot product of AB matrix A and matrix B
A TThe transposition of matrix A
|| polyphone connects operation
ID iThe identifier of node i
Referring to Fig. 1, but the method for dynamically updating wireless sensor network program of the present invention's resisting compromised node attack is as follows:
A. before sensor node deployment, a hash function h is determined in the base station; And the Euclidean space V of base station selected n dimension is decomposed into the subspace of two quadratures, the i.e. first subspace V with V 1With the second subspace V 2, V wherein 1Be the k dimension, V 2Be the n-k dimension, wherein, k is the quantity of all the sensors node of this wireless sensor network.In addition, the base station is that each sensor node i selects an identification identifier ID iWith one belong to V 1Vectorial C i, i=1,2K, k, C iLength should be enough this C to avoid guessing greatly with the method for exhaustion i, C for example iLength can be 512 bits.Vector C i, hash function h and identification identifier ID iBe installed in each sensor node.
B. behind sensor node deployment, when the base station need be upgraded the program on all the sensors node, the base station was to all sensor node broadcasts program updating message M Adv (j),
M adv ( j ) = Δ { j , t j , M , X pid , X ver , ID 1 , HMAC ( C 1 , ( j | | t j | | M | | ID 1 | | X pid | | X ver ) ) , K ,
ID k, HMAC (C k, (j||t j|| M||ID k|| X Pid|| X Ver)), j=1 wherein, 2Kk, the j representation program upgrades sequence number, t jExpression sends message M Adv (j)Timestamp, the program after M represents to upgrade.
C. work as arbitrary sensor node i and receive message M Adv (j)The time, for this message is verified, need carry out following operation:
1) sensor node i is according to the identifier ID of oneself i, extract oneself cipher key Hash message authentication code HMAC (C i, (j||t j|| M||ID i|| X Pid|| X Ver)).
2) validity of checking j is if j is less than or equal to the j that is stored in node *The time, sensor node is refused this message; Otherwise sensor node thinks that j is fresh and replaces j with j *(when initial, the j of node storage *=0).And continuation checking t jValidity, the current time of sensor node is Clock, if | Clock-t j|<Δ t, enter next step, otherwise sensor node is refused this message.Here Δ t is the time delay threshold value of the program updating message that pre-sets.
3) sensor node is according to the C of oneself iCalculate HMAC (C i, (j||t j|| M||ID i|| X Pid|| X Ver)), with the HMAC (C that calculates i, (j||t j|| M||ID i|| X Pid|| X Ver)) with 1) and in the HMAC (C that extracts i, (j||t j|| M||ID i|| X Pid|| X Ver)) compare, if equate that sensor node is accepted this broadcast and upgraded the program of self; Otherwise sensor node is refused this message;
Each sensor node carries out above a series of check to the program updates broadcast of being received, if this message can be by above whole check, then this sensor node is accepted this broadcast; Otherwise this sensor node is refused this broadcast.Suppose the enemy a certain sensor node m that compromised, thereby obtained the secret value C on this sensor node mBut the enemy can't pretend the checking that the base station is issued false program updates information and passed through other sensor nodes.Therefore, even under the situation that sensor node is compromised, the present invention also can ensure the fail safe of the program dynamic updating of sensor network.

Claims (1)

1. but the method for dynamically updating wireless sensor network program of a resisting compromised node attack is characterized in that comprising with the lower part:
1) before sensor node deployment,
A hash function is determined in the base station;
A base station selected Euclidean space, this Euclidean space is decomposed into first subspace and second subspace of quadrature, the dimension of described first subspace is k, the dimension of described second subspace is n-k, wherein, n is the dimension of described Euclidean space, and k is the quantity of sensor node in the described wireless sensor network;
The base station is selected an identification identifier for each sensor node and is belonged to the vector of first subspace;
Described vector, identification identifier and hash function are loaded onto respectively in each sensor node;
2) behind sensor node deployment,
When the base station need be upgraded the program on all the sensors node, the base station is to sensor network radio program updating message, this program updating message comprises the timestamp that upgrades sequence number, message and send, the identification identifier of the program after upgrading, program version number, program identifier, each sensor node and with the corresponding cipher key Hash message authentication code of each sensor node, described cipher key Hash message authentication code with the vector of corresponding sensor node as key;
3) each sensor node is received the validity of verifying this message after the described program updating message according to the following steps:
I) sensor node extracts the cipher key Hash message authentication code of oneself according to the identification identifier of oneself from the program updating message that receives;
Ii) if the validity of the timestamp of renewal sequence number in the sensor node proving program updating message and message transmission all effective, is then carried out next step; Otherwise refuse this program updating message;
Iii) sensor node obtains the cipher key Hash message authentication code according to the vector that is loaded, with the cipher key Hash message authentication code that extracts in this cipher key Hash message authentication code and the step I relatively, if both equate, accept the program updating message line program of going forward side by side and upgrade; Otherwise refuse this program updating message.
CN2009101550417A 2009-12-14 2009-12-14 Program dynamic updating method for wireless sensor network capable of resisting compromised node attack Expired - Fee Related CN101765109B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101550417A CN101765109B (en) 2009-12-14 2009-12-14 Program dynamic updating method for wireless sensor network capable of resisting compromised node attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101550417A CN101765109B (en) 2009-12-14 2009-12-14 Program dynamic updating method for wireless sensor network capable of resisting compromised node attack

Publications (2)

Publication Number Publication Date
CN101765109A true CN101765109A (en) 2010-06-30
CN101765109B CN101765109B (en) 2012-05-02

Family

ID=42496066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101550417A Expired - Fee Related CN101765109B (en) 2009-12-14 2009-12-14 Program dynamic updating method for wireless sensor network capable of resisting compromised node attack

Country Status (1)

Country Link
CN (1) CN101765109B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238603A (en) * 2011-08-12 2011-11-09 苏州鼎汗传感网技术有限公司 Wireless sensor network updating method
CN102547799A (en) * 2010-12-22 2012-07-04 江苏联优信息科技有限公司 Firmware management method of wireless sensing access multiplexing device
CN102665196A (en) * 2012-04-28 2012-09-12 清华大学 On-line progressive program updating method for wireless sensor network
CN103324501A (en) * 2013-05-28 2013-09-25 大连理工大学 Efficient remote updating method for node software of wireless sensor network
CN111614650A (en) * 2020-05-14 2020-09-01 长沙学院 Method and device for detecting compromised nodes in wireless sensor network
CN111614659A (en) * 2020-05-19 2020-09-01 杭州英视信息科技有限公司 Distributed detection method for unknown network flow

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277265B (en) * 2008-05-07 2011-05-04 浙江大学 Method for accelerating loading ELF document in wireless sensing network
CN101281479A (en) * 2008-05-07 2008-10-08 浙江大学 Method for dynamically allocating internal memory for wireless sensing network node operating system
CN101600198B (en) * 2009-07-08 2012-02-08 西安电子科技大学 Identity-based wireless sensor network security trust method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547799A (en) * 2010-12-22 2012-07-04 江苏联优信息科技有限公司 Firmware management method of wireless sensing access multiplexing device
CN102238603A (en) * 2011-08-12 2011-11-09 苏州鼎汗传感网技术有限公司 Wireless sensor network updating method
CN102665196A (en) * 2012-04-28 2012-09-12 清华大学 On-line progressive program updating method for wireless sensor network
CN102665196B (en) * 2012-04-28 2014-11-05 清华大学 On-line progressive program updating method for wireless sensor network
CN103324501A (en) * 2013-05-28 2013-09-25 大连理工大学 Efficient remote updating method for node software of wireless sensor network
CN103324501B (en) * 2013-05-28 2015-12-23 大连理工大学 Wireless sensor network node software Efficient Remote update method
CN111614650A (en) * 2020-05-14 2020-09-01 长沙学院 Method and device for detecting compromised nodes in wireless sensor network
CN111614650B (en) * 2020-05-14 2022-02-01 长沙学院 Method and device for detecting compromised nodes in wireless sensor network
CN111614659A (en) * 2020-05-19 2020-09-01 杭州英视信息科技有限公司 Distributed detection method for unknown network flow
CN111614659B (en) * 2020-05-19 2022-09-23 杭州英视信息科技有限公司 Distributed detection method for unknown network flow

Also Published As

Publication number Publication date
CN101765109B (en) 2012-05-02

Similar Documents

Publication Publication Date Title
CN101765109B (en) Program dynamic updating method for wireless sensor network capable of resisting compromised node attack
CN102577462B (en) Methods and apparatus for deriving, communicating and/or verifying ownership of expressions
Conti et al. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
CN103595530A (en) Software secret key updating method and device
CN101785277A (en) Method and system of communication using extended sequence number
EP3878195A1 (en) Apparatus and method
WO2018205148A1 (en) Data packet checking method and device
CN101895388B (en) Distributed dynamic keys management method and device
WO2018213496A1 (en) Regulatory domain security techniques for wireless devices
Lee et al. Flexicast: Energy-efficient software integrity checks to build secure industrial wireless active sensor networks
CN108924827A (en) A kind of fast access method and system of wireless network
Spanghero et al. Authenticated time for detecting GNSS attacks
CN103209453B (en) Trust routing algorithm of wireless sensor network based on topological structure
EP2874423B1 (en) Data transmission method, access point and station
CN101742490B (en) Safe and effective method for dynamically updating wireless sensor network program
US11139982B2 (en) Communication-efficient device delegation
CN111527731A (en) Method for restricting memory write access in an IOT device
CN110545253B (en) Information processing method, device, equipment and computer readable storage medium
CN102421094B (en) Distributed safety reprogramming method of wireless sensor network
CN105141620A (en) Small data distribution method enabling wireless sensor network security and denial of service attack defense
KR101960583B1 (en) Method for issuing a certificate
CN111182548B (en) Pseudo network equipment identification method and communication device
Han et al. Simulating denial of service attack using WiMAX experimental setup
CN101350748B (en) Method and system for accessing control terminal after being losing to obtain data summary calculation parameter
KR100953068B1 (en) Method for secure neighbor discovery in internet environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120502

Termination date: 20171214

CF01 Termination of patent right due to non-payment of annual fee