CN103702280A - Secure routing protocol of Internet of Things based on node position detection - Google Patents

Secure routing protocol of Internet of Things based on node position detection Download PDF

Info

Publication number
CN103702280A
CN103702280A CN201310605348.9A CN201310605348A CN103702280A CN 103702280 A CN103702280 A CN 103702280A CN 201310605348 A CN201310605348 A CN 201310605348A CN 103702280 A CN103702280 A CN 103702280A
Authority
CN
China
Prior art keywords
node
internet
things
information
team
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310605348.9A
Other languages
Chinese (zh)
Inventor
王江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China MCC17 Group Co Ltd
Original Assignee
China MCC17 Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China MCC17 Group Co Ltd filed Critical China MCC17 Group Co Ltd
Priority to CN201310605348.9A priority Critical patent/CN103702280A/en
Publication of CN103702280A publication Critical patent/CN103702280A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a secure routing protocol of Internet of Things based on node position detection through analysis on node distribution of Internet of Things and establishment of a mathematical model based on layout information. The secure routing protocol is not related to a specific positioning technology; in consideration of specificity of a region covered by the Internet of Things, nodes are generally in random distribution and the arranged nodes are often placed in accordance with a certain rule, thus such information can be used as an important basis for positioning detection; through observation of arrangement information of the nodes of the Internet of Things and a target, the mathematical model is established to calculate a theoretic estimated value and detect the position information of the nodes of the Internet of Things, the position information data is compared with an actual observation value, and if a certain threshold value is exceeded, a node positioning report is determined to be an abnormal value and a positioning information intrusion detection strategy is given, so that the secure routing protocol of Internet of Things based on node position detection is disclosed.

Description

A kind of safe Routing Protocol of Internet of Things detecting based on node location
Technical field
The present invention is a kind of new method of utilizing node location information to detect to obtain the safe Routing Protocol of Internet of Things for information network, particularly Internet of Things, belongs to Internet of Things safety applications technical field.
Background technology
In numerous application of Internet of Things, Internet of things node positional information is one of key technology of Internet of Things always.The positional information of node is most important for monitoring, and can occurrence positions that Obtaining Accurate event be the key of weighing Internet of Things validity.In such as geographical Routing Protocols such as GEAR, need to take equally node location information as foundation.Yet due to the restriction of the aspects such as node self-energy and computing capability, can only be according to node self-characteristic Design Orientation strategy.According to whether measuring the actual range between actual node in position fixing process, existing node locating technique can be divided into location algorithm based on distance and the location algorithm of range-independence, they have solved orientation problem to a certain extent, but the various weakness of self also come out gradually simultaneously.Enemy often utilizes these weakness to capture node and even forges false bearing information and carry out spoofing attack, very big to our destruction.Along with popularizing of Internet of Things application, various security strategies gradually victim are familiar with, and they have taked more hidden mode, walk around security system and carry out deep attack.This attack concentrates on the application of Internet of Things in military field.Under battlefield surroundings, node task focus on obtaining of sensitive data, comprise enemy's dynamic monitoring, firepower locating information etc.Enemy, when recognizing existence networking monitoring, can make targetedly and attacking, and they take counterreconnaissance means to capture node, and decode encryption system, thereby the node of capturing " is turned traitor ", become the abnormal nodes that they control, further destroy network and even implement counteroffensive.In recent years, for so novel attack, the concept that Internet of Things detects based on node location proposes gradually, and its research purpose is to change the defence system of past passive, but the threat that detection Internet of Things initiatively may exist.
The microminiaturization of Internet of things node and limited powered battery ability are very limited it in the selection of node hardware, and low-power consumption is its topmost design object.And manually dispose and be that all-network node installation gps receiver all can be subject to the restriction of the problems such as cost, power consumption, autgmentability, even in some occasion, may cannot realize at all, therefore must be for its intensive, the calculating of node, storage and communicate by letter etc. ability all limited feature design effective low-power consumption location algorithm.
Summary of the invention
Object of the present invention will overcome the above problems exactly, a kind of safe Routing Protocol of Internet of Things detecting based on node location is provided, solve the new method of the safe route of Internet of Things, the method adopts according to the placement information of Internet of things node and object observation, in conjunction with the detection and localization of node, set up a node organization structure that is distributed as Mathematical Modeling with dimensional Gaussian.Then according to team, make friends with the information of friendly first quantity, the testing mechanism that team of unit adjacent node quantity is reference is take in realization, friend member's data value size before and after occurring by comparison attacks, judges that according to mistake extent whether Routing Protocol is under attack, has guaranteed the safety of Internet of Things route.
Whether technical scheme of the present invention is achieved in that a kind of safe Routing Protocol of Internet of Things detecting based on node location, be characterized in: by the judgement to node relative position, under attack to determine Routing Protocol;
A) utilizing the placement information of Internet of things node is foundation, has set up a node organization structure that is distributed as Mathematical Modeling with dimensional Gaussian;
B) designed take and faced mutually based on Internet of things node team the testing mechanism that number of nodes is standard;
C) Internet of things node position data is compared with actual observed value, if exceeded certain threshold value, positioning reporting that can predicate node is exceptional value, has external node invasion;
D) reasonably arranging after threshold value, strategy can reach higher verification and measurement ratio and lower rate of false alarm;
E) according to different angles and actual demand, new method according to node relative positioning information design Strategy of Security Routing, its feature is to have platform-neutral, do not rely on certain concrete application, there is good versatility and transplantability, this for application widely Internet of Things have good realistic meaning and use value.
Meaning of the present invention is to provide a safe Routing Protocol of Internet of Things detecting based on node location for wireless communication networks, particularly Internet of Things.New method designs mainly for the malicious external attack node of Internet of Things, has realized the investigation to locating information authenticity and confidence level, in the practical application of locating information sensitivity, especially, in military affairs investigation field, has higher value.It utilizes the placement information of Internet of things node is foundation, has set up a node organization structure that is distributed as Mathematical Modeling with dimensional Gaussian, and has designed on this basis take and faced mutually based on team the testing mechanism that number of nodes is standard.Reasonably arranging after threshold value, strategy can reach higher verification and measurement ratio and lower rate of false alarm.According to different angles and actual demand, new method according to node relative positioning information design Strategy of Security Routing, its feature is to have platform-neutral, do not rely on certain concrete application, there is good versatility and transplantability, this for application widely Internet of Things have good realistic meaning and use value.
Accompanying drawing explanation
Tu1Shi Youyuan node switching team id information.
Fig. 2 is algorithm 2 flow charts.
The safe Routing Protocol flow process of Internet of Things that Fig. 3 detects based on node location.
Embodiment
Suppose that Internet of things node to be disposed is arranged into specific region, the node of layout composition Yi Ge node team, and node each time no longer moves after arranging and putting in place.The center position coordinates of node team after distribution be ( s x, s y ).The distributed points of each node is random, but according to certain probability distribution round central point, its is obeyed dimensional Gaussian and distributes, and establishes each node team and is t i , wherein i=1,2,3 n.
As shown in Figure 1, the node of layout is divided into nindividual team, the ithe affiliated ID of team (identity) of the node of inferior layout is i, the theoretical center position of each team be ( x i , y i ).Ze team iin, any one node, with dimensional Gaussian probability distribution be distributed in ( x i , y i ) peripheral region.Now the series of problems of relationships between nodes can be converted into analysis and the description of the mathematical feature that dimensional Gaussian is distributed.
If the distance of a certain nodal distance central point is d in the Ti of team.According to dimensional Gaussian, distribute, this probability is:
fR (d |
Figure 598152DEST_PATH_IMAGE002
)=
Figure 440206DEST_PATH_IMAGE004
Wherein
Figure 399197DEST_PATH_IMAGE006
standard deviation value for Gaussian Profile.
An if node V, the center of it and a certain Ti of team is at a distance of L, node in ZeTi team is that the V for probability (L | ni ∈ Ti) of the neighbor node of node V represents, according to dimensional Gaussian, distributes and geometric theory, can draw algorithm 1 below:
algorithm 1:
When L < R,
V(L | ni ∈Ti )=
Figure 213569DEST_PATH_IMAGE008
When L > R,
V(L | ni ∈Ti )=
Figure 98348DEST_PATH_IMAGE010
R is the signal transmission distance of Internet of things node, the maximum magnitude that signal can cover.
Therefore, when the position of certain node m is (X, Y), can calculate it in a certain Ti of team, the probability of the neighbor node that institute " makes friends with " is:
Vi (m)=V
Figure 427699DEST_PATH_IMAGE012
Node is after packet layout, and each node is to its residing ID of team of adjacent node broadcast self.Like this, each node can obtain by simple statistics its all adjacent nodes, its friend unit under the information of team, be designated as: ( t 1, t 2, t 3 ... t n ), t i for team ithe quantity of the first node of middle comprised friend.The friendly metamessage that make friends with different positions is not identical, and at a distance of two positions far away, its friendly metamessage difference is larger.If design a kind of safe Routing Protocol of Internet of Things detecting based on node location, can be input by detected locating information, by estimate different team that strategy obtains make friends with friendly first quantity for ( t e1, t e2, t e3 ... t en ) as exporting with reference to amount, two groups of data just can be used as comparison so, if error is excessive, illustrate that existence is abnormal.If consistent within the scope of certain tolerable, show that detected locating information is correct.According to above-mentioned thought, introduce algorithm 2.
algorithm 2: the detection that node location information is abnormal
Define following parameter:
1. TE:TeamError, represents measured value team and the different quantity of the ID of estimated value team.As certain node t i in,
Figure 626599DEST_PATH_IMAGE014
(1,2,4,5).And t ei in,
Figure 357794DEST_PATH_IMAGE016
(1,3,4,7), TE=2.
2. FNE:FriendNumberError, represents the difference of measured value team and the first number of nodes of the friend of estimated value team.As t i ( i=1,2,3 n)=(1,3,4,5,7). T ei ( ei=1, 2,3… n)=(2, 6, 4, 3, 5)。FNE 1=| 1-2|=1; FNE 3=| 4-4|=0; FNE 5=| 7-5|=2.
3. TET:TeamErrorThreshold, represents the threshold value of TeamError.
4. FET:FNEThreshold, represents the threshold value of FriendNumberError.
5. SOT:SingleOverThreshold, represents that FNE between any single team is enough to produce the thresholding of intrusion alarm.
6. P i : in two groups of data, after the corresponding FNE of team draws, the error Boolean coefficient of comparing with FET and drawing.If be greater than FET, P i =1.Otherwise be 0.
7. ToP i : error Boolean coefficient P i sum, i.e. ToP i =
Figure 351158DEST_PATH_IMAGE018
.
8. TOET:TotalErrorThreshold, represent error Boolean coefficient and threshold value.
By defining above, obtain four thresholding decision content: TET, FET, SOT and TOET are as the judgement of abnormal information.By estimating that the node that strategy obtains estimates friendly metamessage, and after comparing with the friendly metamessage obtaining by location technology, draw the data such as TE, FNE, enter follow procedure:
If (TE > TET) Raise an alarm; Break; If // team id information differs over TET, directly produce alarm
else if (0<TE<TET)
FET=FET-1; // TE exists but within the scope of tolerable error time, the suspicious degree of information is strengthened, and now reduces the threshold value of FET and SOT, and severization friend metamessage is judged
SOT=SOT-2;
then compare FNE with FET in each team
for (i=1; i<n; i++)
{
if (FNE i > SOT)
Raise an alarm; Break; If FNE is greater than SOT between // certain single team, directly produces and report to the police
Else if (FNE i > FET) P i =1; // draw in each team and make friends with the first error Boolean coefficient of friend
else P i =0;
}
compute ToP i =
Figure DEST_PATH_IMAGE019
If (ToP i > TOET) Raise an alarm; // error in judgement Boolean coefficient and whether crossing the border, makes invasion judgement
If then report the localization information is is normal // alarm free generation, show that locating information is correct
Fig. 2 is the flow chart of algorithm 2.
First, by the Mathematical Modeling of node placement information, draw location assessment strategy.Because placement process needs random arrangement according to scene, when arranging, node forms team according to the good ID of prior mark, in different appointed places, arrange.This place is measured in advance, can guarantee the accuracy of position by the even more advanced global position system of the GPS of fixing point.The position of each team's central point after utilizing topographic map to calculate to land, this positional information can be kept in the memory of node in advance, and preparation completes.
Internet of Things enters monitoring state after disposing.Each node is to its residing ID of team of adjacent node broadcast self.Like this, each node can obtain by simple statistics its all adjacent nodes, i.e. the information of team under its friend unit is designated as: ( t 1, t 2, t 3 ... t n ), t i for team ithe quantity of the first node of middle comprised friend.When a certain moment, monitor enemy's situation (or may be utilized and propagate spurious information by enemy), in the time of need to reporting self-position information to base station, Strategy of Security Routing starts, and judges whether this locating information report exists abnormal.The key issue of strategy is exactly to calculate based on the friendly first quantity of making friends with of team, provides embodiment below.
(1) adopt the first nodal value of the friend of team of estimating that strategy obtains
Ask based on the friendly first quantity of making friends with of team, first calculate real report position (X 0, Y 0) the distance L i of team adjacent with each central point:
L i =
Figure DEST_PATH_IMAGE021
Be located under intrusion detection strategy, the friend unit number that node is estimated in each team is (T e1, T e2, T e3t en).Each node is obeyed dimensional Gaussian and is distributed around the central point that broadcasts sowing of team under it.:
T ei = N i×V(L i )=N i×V(
Figure 719868DEST_PATH_IMAGE021
)
V(L i) represent that the distance of node and the i of team central point is L itime, the node in the i of team is the i.e. probability of friend unit of detection node adjacent node.N represents the number of node in the i of team.Therefore, the number T of the unit of the friend in each team of node eimust separate.
(2) actual friend unit of team and friend unit of the team value of estimating that strategy obtains.
Set threshold value TET, FET, SOT and TOET.By two groups of corresponding data substitution algorithms 2, draw testing result.The safe Routing Protocol flow chart of Internet of Things detecting based on node location is as Fig. 3.
By verification and measurement ratio, rate of false alarm, three parameter evaluation Strategy of Security Routing validity of rate of failing to report.In Internet of things node detection and localization, the locating information obtaining by Strategy of Security Routing identification when some nodes exists extremely, and has produced warning, yet actual geographical side-play amount is but less than intrusion rate tolerance, belongs to normal.Now think that this testing result is for wrong report.Equally, under other certain situation, Strategy of Security Routing thinks that locating information is errorless, and base station general headquarters using this as monitoring information, have been reported, but the distance that the fact is this locating information and physical location has surpassed the threshold value of attack strength, formed attack, current testing result is for failing to report.Relative with rate of failing to report is exactly verification and measurement ratio, and it is the index of weighing the whether effective most critical of Strategy of Security Routing.Therefore,, by above three parameters are reasonably set, adopt route detection mode can obtain the Internet of Things Routing Protocol of a safety.

Claims (1)

1. whether the safe Routing Protocol of Internet of Things detecting based on node location, is characterized in that: by the judgement to node relative position, under attack to determine Routing Protocol;
A) utilizing the placement information of Internet of things node is foundation, has set up a node organization structure that is distributed as Mathematical Modeling with dimensional Gaussian;
B) designed take and faced mutually based on Internet of things node team the testing mechanism that number of nodes is standard;
C) Internet of things node position data is compared with actual observed value, if exceeded certain threshold value, positioning reporting that can predicate node is exceptional value, has external node invasion;
D) reasonably arranging after threshold value, strategy can reach higher verification and measurement ratio and lower rate of false alarm;
E) according to different angles and actual demand, new method according to node relative positioning information design Strategy of Security Routing, its feature is to have platform-neutral, do not rely on certain concrete application, there is good versatility and transplantability, this for application widely Internet of Things have good realistic meaning and use value.
CN201310605348.9A 2013-11-26 2013-11-26 Secure routing protocol of Internet of Things based on node position detection Pending CN103702280A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310605348.9A CN103702280A (en) 2013-11-26 2013-11-26 Secure routing protocol of Internet of Things based on node position detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310605348.9A CN103702280A (en) 2013-11-26 2013-11-26 Secure routing protocol of Internet of Things based on node position detection

Publications (1)

Publication Number Publication Date
CN103702280A true CN103702280A (en) 2014-04-02

Family

ID=50363656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310605348.9A Pending CN103702280A (en) 2013-11-26 2013-11-26 Secure routing protocol of Internet of Things based on node position detection

Country Status (1)

Country Link
CN (1) CN103702280A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107333233A (en) * 2017-05-23 2017-11-07 北京国电通网络技术有限公司 A kind of adapted telecommunication network inbreak detection method and device
CN108141838A (en) * 2015-10-28 2018-06-08 谷歌有限责任公司 It generates and issues attested location information
CN109257697A (en) * 2018-10-30 2019-01-22 中国运载火箭技术研究院 A kind of portable locating module and its communication means based on faint collection of energy
CN110519353A (en) * 2019-08-16 2019-11-29 阿里巴巴集团控股有限公司 A kind of processing method of service request, device and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309151A (en) * 2008-07-11 2008-11-19 西安电子科技大学 Safe positioning method for wireless sensor
JP2012085065A (en) * 2010-10-08 2012-04-26 Toyota Infotechnology Center Co Ltd Information distribution system and information distribution method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309151A (en) * 2008-07-11 2008-11-19 西安电子科技大学 Safe positioning method for wireless sensor
JP2012085065A (en) * 2010-10-08 2012-04-26 Toyota Infotechnology Center Co Ltd Information distribution system and information distribution method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王江涛 等: "一种新型传感器网络节点定位法", 《计算机工程与应用》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108141838A (en) * 2015-10-28 2018-06-08 谷歌有限责任公司 It generates and issues attested location information
CN108141838B (en) * 2015-10-28 2020-12-15 谷歌有限责任公司 Method, system, and medium for generating and publishing certified location information
CN107333233A (en) * 2017-05-23 2017-11-07 北京国电通网络技术有限公司 A kind of adapted telecommunication network inbreak detection method and device
CN107333233B (en) * 2017-05-23 2020-04-28 北京中电普华信息技术有限公司 Intrusion detection method and device for power distribution and utilization communication network
CN109257697A (en) * 2018-10-30 2019-01-22 中国运载火箭技术研究院 A kind of portable locating module and its communication means based on faint collection of energy
CN109257697B (en) * 2018-10-30 2020-09-18 中国运载火箭技术研究院 Implantable positioning module based on weak energy collection and communication method thereof
CN110519353A (en) * 2019-08-16 2019-11-29 阿里巴巴集团控股有限公司 A kind of processing method of service request, device and equipment
CN110519353B (en) * 2019-08-16 2022-03-04 蚂蚁蓉信(成都)网络科技有限公司 Service request processing method, device and equipment

Similar Documents

Publication Publication Date Title
Shu et al. Gradient-based fingerprinting for indoor localization and tracking
Chowdhury et al. COVID-19 contact tracing: challenges and future directions
Zeng et al. Secure localization and location verification in wireless sensor networks: a survey
CN101309151B (en) Safe positioning method for wireless sensor
Jiang et al. Secure localization in wireless sensor networks: a survey
Lim et al. Detecting location spoofing using ADAS sensors in VANETs
CN110536265B (en) Method for detecting identity traceable Sybil attack in Internet of vehicles environment
CN105636053B (en) A kind of detection method attacked towards Sybil in WSN
Li et al. Research on secure localization model based on trust valuation in wireless sensor networks
CN103702280A (en) Secure routing protocol of Internet of Things based on node position detection
CN102711243B (en) A kind of APIT localization method improved based on RSSI
WO2021098028A1 (en) Progressive global positioning system and method
CN103491591A (en) Zoning method and node positioning method for complicated zone of wireless sensor network
Wang et al. Secure localization algorithms in wireless sensor networks: a review
Meng et al. Uav sensor spoofing detection algorithm based on gps and optical flow fusion
Liu et al. Identification of location spoofing in wireless sensor networks in non-line-of-sight conditions
Kong et al. Cooperative positioning technique with decentralized malicious vehicle detection
Xue et al. DeepTAL: Deep learning for TDOA-based asynchronous localization security with measurement error and missing data
Han et al. Localization of sybil nodes with electro-acoustic positioning in VANETs
Formaggio et al. GNSS spoofing detection techniques by cellular network cross-check in smartphones
Alawami et al. LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics
CN102497636A (en) Wireless sensor network safety locating system and method based on watermark
Won et al. Robust sensor localization against known sensor position attacks
Zhang et al. Localization for jamming attack in wireless sensor networks
CN103763704A (en) Safe locating method for underwater sensor network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140402

RJ01 Rejection of invention patent application after publication