A DV-HOP Localization Algorithm Against Wormhole Attacks in WSN
-
摘要: 为抵御虫洞攻击,改善定位性能,提出了一种基于安全邻居发现的抗虫洞攻击DV-HOP (distance vector-Hop)算法(secure neighbor discovery based DV-HOP, NDDV).该算法基于虫洞攻击时网络节点间通信跳数出现的异常,依据节点间路径跳数差异检测虫洞,通过搜索发现、滤除各虚假链路,以保障DV-HOP跳数跳距的准确性,减轻虫洞攻击的影响,提升节点定位精度.以变化参考节点比例的方式,对144个节点进行150次定位仿真实验,结果表明,平均节点度数达到5以上,NDDV即能有效滤除虫洞链路,提升节点定位精度;同等定位精度的情况下相比LBDV (label-based DV-HOP localization against wormhole attacks)算法所需的参考节点比例平均低约17.5%.Abstract: In order to resist wormhole attacks and improve localization performance, a secure neighbor discovery based DV-HOP(NDDV) algorithm was proposed. Based on the abnormal hop number in the network node communication when wormhole attack occurs, NDDV can detect two kinds of wormhole links according to the path hop number difference between nodes, then search, find and filter wormhole links to ensure the correctness of DV-HOP hop number and hop distance, mitigate the impact of wormhole attacks, and enhance the node localization accuracy. In the simulation experiments, 144 nodes were positioned 150 times with different locator ratios. The results show that when the mean locator ratio is more than five, NDDV can effectively filter the wormhole links and improve the node localization accuracy. With the same average localization accuracy, NDDV has the locator ratio 17.5% smaller than LBDV (label-based DV-HOP localization against wormhole attacks).
-
Key words:
- WSN /
- wormhole attack /
- DV-HOP /
- secure localization
-
邓平,伍小梅. 一种基于粒子滤波的WSN自适应定位算法 [J]. 西南交通大学学报,2014,49(2): 323-329. DENG Ping, WU Xiaomei. An adaptive localization algorithm based on particle filter in WSN [J]. Journal of Southwest Jiaotong University, 2014, 49(2): 323-329. 彭宇,王丹. 无线传感器网络定位技术综述 [J]. 电子测量与仪器学,2011,25(5): 389-399. PENG Yu, WANG Dan. A review: wireless sensor networks localization [J]. Journal of Electronic Measurement and Instrument, 2011, 25(5): 389-399. 陈鸿龙,李鸿斌,王智. 基于 TDoA测距的传感器网络安全定位研究 [J]. 通信学报,2008,29(8): 11-21. CHEN Honglong, LI Hongbin, WANG Zhi. Research on TDoA-based secure localization for wireless sensor networks [J]. Journal on Communications, 2008, 29(8): 11-21. HUANG Wenhao, WANG Yu, GUAN Haoran. The current situation and prospect of localization in wireless sensor networks [J]. Computer Science and Engineering, 2009, 1: 483-487. GARCA-OTERO M, POBLACIN A, FERNANDEZ-HERRERO A, et al. Performance of robust algorithms for secure localization in wireless sensor networks [C]//Proc. of International Conference on Localization and GNSS (ICL-GNSS). Starnberg: IEEE, 2012: 1-4. SUO Hui, WAN Jiafu, HUANG Lian, et al. Issues and challenges of wireless sensor networks localization in emerging applications [C]//International Conference on Computer Science and Electronics Engineering. Hangzhou: [s. n.], 2012: 447-451. WANG Dexin, YANG Liuqing. Cooperative robust localization against malicious anchors based on semi-definite programming [C]//Military Communications Conference. Orlando: [s. n.], 2012: 1-6. MOFARREH-BONAB M, GHORASHI S A. A low complexity and high speed gradient descent based secure localization in wireless sensor networks [C]//International Conference on Computer and Knowledge Engineering. Mashhad: [s. n.], 2013: 300-303. PATEL M M, AGGARWAL A. Security attacks in wireless sensor networks: a survey [C]//Intelligent Systems and Signal Processing (ISSP). Gujarat: [s. n.], 2013: 329-333. ABDELKARIM A, BENSLIMANE A, MABROUKI I, et al.SecAT-Dist a novel secure AT-Dist localization scheme for wireless sensor networks [C]//Vehicular Technology Conference (VTC Fall). Quebec City: [s. n.], 2012: 1-5. NICULESCUS D, NATH B. DV based position in ad-hoc networks [J]. Telecommunication Systems, 2003, 22(4): 267-280. LAZOS L, POOVENDRAN R. SeRLoc: robust localization for wireless sensor networks [J]. ACM Transactions on Sensor Networks, 2005, 1(1): 73-100. LAZOS L, POOVENDRAN R. HiRLoc: high-resolution robust localization for wireless sensor networks [J]. IEEE Journal on Selected Areas in Communications, 2006, 24: 233-246. CHEN Honglong, LOU Wei, WANG Zhi. Conflicting-set-based wormhole attack resistant localization in wireless sensor networks [C]//Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing. Brisbane: [s. n.], 2009: 296-309. CHEN Honglong, LOU Wei, SUN Xice, et al. A consistency-based secure localization scheme against wormhole attacks in WSNs [C]//Proc. of the International Conference on Wireless Algorithms, Systems and Applications. Albuquerque: [s. n.], 2009: 368-377. WU Junfeng, CHEN Honglong, LOU Wei, et al. Label-based DV-Hop localization against wormhole attacks in wireless sensor networks [C]//Proc. of the 5th IEEE International Conference on Networking, Architecture, Storage. Macau: IEEE, 2010: 79-88. HAYAJNEH T, KRISHNAMURTHY P, TIPPER D. DeWorm: a simple protocol to detect wormhole attacks in wireless ad hoc networks [C]//Proc. of the 3rd International Conference on Network and System Security. Gold Coast: [s. n.], 2009: 73-80.
点击查看大图
计量
- 文章访问数: 1100
- HTML全文浏览量: 169
- PDF下载量: 531
- 被引次数: 0