系统仿真学报 ›› 2019, Vol. 31 ›› Issue (1): 27-35.doi: 10.16182/j.issn1004731x.joss.17-0043E

• 仿真建模理论与方法 • 上一篇    下一篇

传感器网络中基于位置的虚假数据过滤的建模与仿真

刘志雄, 黎梨苗   

  1. 长沙学院 计算机工程与应用数学学院,长沙 410003
  • 收稿日期:2017-01-09 修回日期:2017-05-18 出版日期:2019-01-08 发布日期:2019-04-16

Modeling and Simulation of False Report Filtering Scheme Based on Position in Wireless Sensor Networks

Liu Zhixiong, Li Limiao   

  1. School of Computer engineering and applied mathematics, Changsha University, Changsha 410003, China
  • Received:2017-01-09 Revised:2017-05-18 Online:2019-01-08 Published:2019-04-16
  • About author:Liu Zhixiong (1982-), male, Loudi, Hunan, Doctor, associate professor, Research on wireless sensor networks; Li Limiao (1979-),female, Yueyang, Hunan, Doctor, lecturer, Research on wireless sensor networks.
  • Supported by:
    National Natural Science Foundation of China (61502057)

摘要: 攻击者可以通过妥协节点往传感器网络中注入虚假数据。已有安全机制无法检测由一组妥协节点协同伪造的虚假数据,且部分稀疏区域的事件无法顺利上报到sink。提出一种基于位置的过滤方案PFS。推导出最优覆盖度ω,并基于该结论部署节点。节点在部署后将位置分发给部分其它节点。每个数据报告必须附带t个不同的消息验证码MAC (Message Authentication Codes)以及各检测节点的位置。各转发节点同时对MAC和位置的正确性,以及位置的合法性进行验证。分析及仿真表明,PFS在覆盖效率,妥协容忍以及过滤性能方面均优于已有方案。

关键词: 无线传感器网络, 虚假数据注入, 最优覆盖, 位置, 妥协容忍

Abstract: In wireless sensor networks, the adversary can inject false reports from compromised nodes. Previous security designs cannot detect faked reports that are forged coordinately by a group of compromised nodes. Furthermore, in sparse areas, some events failed to be reported to sink. This paper proposes a position based filtering scheme (PFS). It derives the optimal coverage degree ω, and the nodes are deployed accordingly. After deployment, each node distributes its position to some other nodes. When a report is generated for an observed event, it must carry t distinct MACs (Message Authentication Codes) along with positions of all detecting nodes. Each forwarding node verifies the correctness of MACs and positions, and checks the legitimacy of all locations attached in the report. Analysis and simulation results show that PFS outperforms existing schemes in terms of covering efficiency, compromise tolerance and filtering capacity.

Key words: wireless sensor network, false report injection, optimal coverage, position, compromise tolerance

中图分类号: