TMCnet News

Anti Spoofing Attack Positioning Algorithm for Wireless Sensor Networks Based on Distance Verification [Sensors & Transducers (Canada)]
[April 22, 2014]

Anti Spoofing Attack Positioning Algorithm for Wireless Sensor Networks Based on Distance Verification [Sensors & Transducers (Canada)]


(Sensors & Transducers (Canada) Via Acquire Media NewsEdge) Abstract: The precise location of sensor node is the premise of guaranteeing the effectiveness and validity of WSNS in its application and nodes positioning technology is a key technology of wireless sensor networks. For its inherent characteristics, such as limitation of the resources, insecurity and openness of the deployment environment, mechanism of location for wireless sensor networks has security problems. An effective approach to monitoring and detecting spoofing attacks based on distance verification are proposed. The detecting mechanism is based on the visualization of the consistency between the time of transmission and the loss of the power. Experimental studies are conducted to investigate the effect of the algorithm. Copyright © 2013 IFSA.



Keywords: Wireless sensor networks, Secure positioning, Spoofing attack, Distance verification, Algorithm.

(ProQuest: ... denotes formulae omitted.) 1. Introduction Wireless sensor networks, by its unique merits, has wide application potential in industry, agriculture and military domain. The precise location of sensor node is the premise of guaranteeing the effectiveness and validity of WSNS in its application and nodes positioning technology is a key technology of wireless sensor networks. For its inherent characteristics, such as limitation of the resources, insecurity and openness of the deployment environment, mechanism of location for wireless sensor networks has security problems [1-7].


This paper based on distance validation against deception attack localization algorithm FaltBdv (Forge Attack-resistant Localization Technology Based on distance verification). The secure localization algorithm respectively with the signal power loss and propagation time calculating the distance between nodes, using the distance of the consistency of eliminating positioning reference concentration of abnormal nodes, then the use of LS (Least Squares Estimate) - Newton positioning algorithm for estimating the unknown node coordinate. Because power measurement and the measurement of the propagation time can be done at the same time, so the FaltBdv algorithm can at no additional time cost at the same time, effectively detect the attack nodes.

2. Detection Principle Analysis of node location process and principle of available node distance consistency principle, which assumes that the nodes in the wireless sensor network is stationary, then the node between the objective distance is constant, is also in the absence of attacks, through the signal transmission time by calculating the distance between the nodes should be equal to the received power calculation the distance (in considering error exists, the difference between the two distance should be less than a smaller value).

If want to achieve the purpose of malicious node attacks, must change with time to transmit signals and power loss of two parameters. Therefore, you can design a special positioning mechanism, the malicious nodes can change two parameters, and then through the surveillance by the time of calculating distance and power loss are consistency of the distance to judge whether the presence of ARP spoofing attack. Undertake surveillance detection tasks and nodes is called the detecting node, may be unknown nodes can also be the beacon node.

a) Distance between two nodes and signal propagation time relationship.

Signal propagation time and the distance between the nodes is proportional, meet dt=(Tl-T0)*V (1) type, based on the signal propagation time between the nodes is calculated distance, is the signal propagation speed, the unknown node transmits a request for location signal moments, this signals arrive at the beacon nodes when the. Beacon node will be written reply unknown node location request packet. If the beacon node capture, an attacker can change the value to change the node between the measured distance value can be increased, which can also be reduced. In order to reduce the possibility of malicious node attacks, this paper uses signal feedback time calculating the distance between the nodes, as shown in formula (2): ...

Unknown nodes in sending position request packet, the packet in time to reach beacon node, beacon node in a reply to the request for reply packet, in time to reach the unknown node. As the beacon node processing packet time, processor speed, value is approximately equal to the constant. As can be seen, the return time calculating the distance between nodes can reduce the possibility of malicious attack, where the attacker can extend the propagation time of a signal, is only to increase the distance between the nodes.

b) Distance between two nodes and the power loss of the relationship.

In the same transmission power, node receiving power and inversely proportional to the distance between nodes, content type (3): ...

Wherein, said by the power loss calculated distance, and constant. As the unknown node receives beacon node power, to write the packet transmit power, when the beacon node is the attacker capture, malicious nodes can be changed through the write data packet to the objective of the attack, c) dt and dp relationship.

From the propagation time and the received power of the calculated distances between nodes in the ideal condition should be equal, i.e.

d,=dp (4) By the formula (2) and (3) to ...(5) d) Detection basis.

The attacker in order to achieve the purpose of success, must also change the spread time of the signal and power loss, to make the change of the power of the distance change the volume of the cause Adp and the change of the time of the distance change the volume of the cause Adt meet Adp=Ad, (6) To RTOF ranging method, attacker only change the distance between nodes measurement by increasing spread time.

If malicious node intentionally delay At reply the positioning of the unknown nodes request, malicious node can change power consumption by the two ways.

Malicious node will make the reply to request packets Pa increase, the actual launch power constant. Power change the volume Adp should meet ... (7) Malicious node don't change written reply packet's P[x , reduce the actual transmission power, then, Adp should meet ... (8) We can know from (7) and (8), to malicious node, Prcv and Ap are unknown, can't accurately get's solution. So, we can use the power loss and signal transmission time testing whether there are attacks.

3. FaltBdv Algorithm FaltBdv algorithm's basic idea is based on such a fact, at WSN node location's process, spread by time and power loss the calculated the distance between the nodes in ideal condition should be equal, cheating on attack happened, malicious node can't change power and time caused the distance change the same amount.

Because wireless transmission of scattering characteristics, there is always some node in a malicious node of the communication area. As shown in Fig. 1, when unknown nodes S neighbor node to send positioning request information, malicious A to its launch deceive attack node. In a node A communication within the scope of the beacon nodes Bx and B3 and unknown nodes S and Si will be listening to the wrong position parameter from A, the nodes can be as the test node to other nodes the authenticity of the test. So, can use these test nodes, through the test of the consistency of the distance to judge whether there are malicious attacks, recognition malicious node.

FaltBdv algorithm provisions of the beacon nodes reply positioning parameters packet format as shown in Fig. 2. Among them, (x, y) is the beacon node of the coordinates idB , trcv and Prcv are the beacon nodes to receive unknown nodes ids request information moment and receive power, ta and Plx are the beacon nodes reply the time and send request power. Based on (2) and (3) can be calculated dt and dp respectively.

As shown in Fig. 1 shows, unknown nodes to its neighbors sent S node location information request, node A, Bx, S and Si are neighbors, the four nodes can write to each other. If A malicious node to S launch deceive attack, beacon nodes Bx right, unknown nodes S and Si can afford the testing tasks, called test node.

a) Unknown nodes S as a test node * Node S received from node of A reply information and record receiving moment, measurement and receive power from A combination of positioning parameters are calculated dt, dp; * If ... no attack, accept A by the positioning parameter, if ..., then A for fraud against node; * If in the Bi S communication within the range, the property 3-5, it is known that the node A and node distance between Bi dAB must be less or equal to 2 R, R for beacon nodes communication radius. Node S validation i dAB < 2R is formed, if not set up, then A for fraud against node b) The unknown node Si as the detecting node * Node Si receives from node A reply information, recording the received data packet time and measuring the received power and calculating dt and dP' *Validation of |¿/( < £* (()<£*) is established, if not established, then the A spoofing attack node.

c) Beacon node Bx as the detecting node.

Beacon node coordinate position Bx is known, its coordinates is , and the distance "d" between Bx and the node A can be calculated by formula (9) ...(9) where (x, y) is the node A location coordinates.

* Beacon node Bx receives from node A information, recording the received data packet time and measuring the received power and calculating dt and dp ; * The data packets in a location parameter calculation of distance "d"; ...

...

is established, if not established, then the A spoofing attack node.

The detecting node once found cheating attack node, node id will store the attack, at the same time to its neighbor nodes releases exist attack warning.

4. Simulation Experiments and Results Analysis a) Experimental parameters The simulation experiment, in 100 unknown nodes in 10 randomly set of nodes as the detecting node, set the beacon nodes for sensor node. Maximum credible reference sets the number of elements is set to 4, between the nodes location using RSSI and RTOF combination method. The experiment mainly node average localization error, the success probability of detection as a performance index to evaluate the performance of algorithm. Each test scene runs 100 times and the statistical results of operation.

b) The effect of positioning algorithm.

The first application of FaltBdv security positioning algorithm to node layout scene simulation, the simulation results as shown in Fig. 3. Map (a) for node localization effect diagram, diagram (b) to the nodes of the original layout diagram, diagram (c) for positioning the effect chart and the original layout of the superimposed comparison chart. The experimental setting attack node number is 5. As can be seen from the graph, in the introduction of FaltBdv secure localization algorithm, positioning effect is improved obviously.

In the simulation scene randomly placed 5 spoofing attack nodes, nodes in the communication range and unknown nodes and beacon node is the same as, for 15 m. Fig. 4 shows no attack network node average localization error (curve 1), presence of attack in the case of network node location error (curve 2) and the use of FaltBdv algorithm node positioning error (curve 3). The results showed that: in the use of FaltBdv algorithm, node average position error of approximation in the attack position error, and the beacon node numbers, better approximation degree. This is because of the increasing number of beacon, involved in the detection of the number of nodes increases, thereby detecting the success rate increases, the unknown node by node pollution smaller attack.

c) Number of nodes to attack algorithm.

Fig. 5 shows the attack number of nodes on node positioning accuracy, the experimental set-up, beacon node into 23 nodes, detection for 33. Curve 1, 2 and 3 respectively represent attack exists, network node average localization error, using FaltBra algorithm of node location error and using the FaltBdv algorithm node positioning errors with the number of nodes in the changing trend of attack.

Obviously, the use of FaltBdv algorithm of node localization error almost tends to be stable, i.e. to attack the number of nodes does not significantly affect the node location. And FaltBdv algorithm to attack a number of nodes is small FaltBra, the reason is that FaltBdv algorithm will not accord with standard nodes from the reference collection all removed, and FaltBra algorithm is the reference collection of residuals is different from the other node beacon out, if the reference set against the number of nodes is greater than or equal to good beacon node number, FaltBra algorithm will lose the ability to judge.

d) The detection rate.

In the FaltBdv algorithm, in attack node communication within the scope of any benign nodes are able to act as the detecting node, and only need a sensor node can complete the detection task. If the beacon nodes and the unknown node deployment density respectively and, node communication radius, node receives beacon node probability obeys the Poisson distribution, all beacon nodes and unknown node can bear the detection task, so the detecting node density, the sensing region of the malicious nodes can receive a detection of the probability of the node type (available 10) says.

...

Type, says the malicious node receives the detection of node number.

By type (10) can be detected nodes to detect malicious node probability value ...(11) Obviously, the malicious node communication radius and the detecting node deployment density affect the FaltBdv security positioning algorithm of detection probability of important factors. As a result of malicious nodes in the communication radius can not be changed, so can increase the detection of the density of nodes to improve the detection probability.

5. Conclusions WSN secure node positioning algorithm to make the sensor node accurately, effectively to obtain the position information. FaltBdv algorithm for the analysis of malicious nodes to achieve spoofing attack way, using deceit attack nature, the signal propagation time and the power loss of consistency as attack detecting standard. Establish the process safety location algorithm based on the testing standards. The simulation results show that, the detection method can detect malicious nodes, thereby reducing the malicious attack effect, the unknown node from spoofing attack threat.

Acknowledgements This work is supported by Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi under Grant No. 20121112 and the project of key discipline construction in Xinzhou Teachers University under Grant No. ZDXK201204.

References [1] . Y. Shang, W. Ruml, Y. Zhang, et al., Localization from mere connectivity, in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, USA: ACM, 2009, pp. 201-212.

[2] .X. Ji, H. Zha, Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling, in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China: IEEE, 2011, pp. 2652-2661.

[3] . Y. Shang, W. Ruml, Y. Zhang, et al., Localization from connectivity in sensor networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 15, Issue 11, 2012, pp. 961-974.

[4] .J. A. Costa, N. Patwari, A. O. Hero, Distributed weighted-multidimensional scaling for node localization in sensor net-works, ACM Transactions on Sensor Networks, Vol. 2, Issue 1,2008, pp. 39-64.

[5] .Hongyang Chen, Kaoru Sezaki, Ping Deng, Hing Cheung So, An improved DV-hop localization algorithm with reduced node location error for wireless sensor networks, Communications and Computer Sciences, Vol. E91-A, Issue 8,2008, pp. 2232-2236.

[6] . Dio Niculescu, B. Nath, DV based positioning in Ad hoc networks, Journal of Telecommunication Systems, Vol. 31, Issue 4, 2012, pp. 267-280.

[7] .R. Nagpal, H. Shrobe, J. Bachrach, Organing a global coordinate system from local information on an ad hoc sensor network, in Proceedings of the 8nd International Workshop on Information Processing in Sensor Networks (IPSN'03), California, USA, 2009.

1,2 Hongbin WANG, 3 Yueqi HAN 1 Department of Computer Science, Xinzhou Teachers University, Xinzhou, 034000, China College of Electric Information Engineering, Tianjin University, Tianjin, 300072, China 3 College of Mechanical Engineering, Taiyuan University of Science and Technology, Taiyuan, 030024, China 1 E-mail: [email protected] Received: 10 September 2013 /Accepted: 25 October 2013 /Published: 30 November 2013 (c) 2013 International Frequency Sensor Association

[ Back To TMCnet.com's Homepage ]