[go: up one dir, main page]

CN111801953A - Positioning optimization method, device, device and storage medium for wireless sensor network - Google Patents

Positioning optimization method, device, device and storage medium for wireless sensor network Download PDF

Info

Publication number
CN111801953A
CN111801953A CN202080001503.4A CN202080001503A CN111801953A CN 111801953 A CN111801953 A CN 111801953A CN 202080001503 A CN202080001503 A CN 202080001503A CN 111801953 A CN111801953 A CN 111801953A
Authority
CN
China
Prior art keywords
target
attack
ranging
detection threshold
receiver noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202080001503.4A
Other languages
Chinese (zh)
Other versions
CN111801953B (en
Inventor
谢宁
陈逸枞
李卓远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Publication of CN111801953A publication Critical patent/CN111801953A/en
Application granted granted Critical
Publication of CN111801953B publication Critical patent/CN111801953B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/345Interference values
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed herein are a method, an apparatus, a device and a storage medium for location optimization of a wireless sensor network, wherein the method comprises: acquiring first receiver noise extracted by a target node when receiving a challenge signal and second receiver noise extracted by an anchor point when receiving a response signal; determining the target distance between the anchor point and the target node; determining a target detection threshold value according to a set upper limit value of the false alarm probability; determining a detection result of the ranging augmentation attack according to the first receiver noise, the second receiver noise and a target detection threshold; if the detection result of the ranging increase attack is that the ranging increase attack does not exist, positioning the target node according to the target distance; otherwise, the target distance is discarded.

Description

无线传感器网络的定位优化方法、装置、设备和存储介质Positioning optimization method, device, device and storage medium for wireless sensor network

技术领域technical field

本申请实施例涉及无线网络通信技术领域,例如涉及一种无线传感器网络的定位优化方法、装置、设备和存储介质。The embodiments of the present application relate to the technical field of wireless network communications, for example, to a method, apparatus, device, and storage medium for positioning optimization of a wireless sensor network.

背景技术Background technique

无线传感器网络在军事和民用领域有着广泛的应用,传感器节点的位置信息对于环境监测和目标节点的跟踪非常重要。虽然可以通过全球定位系统(Global PositioningSystem,GPS)提供传感器节点的位置信息,但是GPS的性能对环境非常敏感,对于低成本的传感器节点来说成本过高。因此,在某些应用中,系统通过锚点目标节点之间的无线传输对目标节点进行定位,例如基于接收信号强度(Received Signal Strength,RSS)、到达时间(Time Of Arrival,ToA)、到达时差(基于目标辐射源)和到达角(Angle of Arrival,AoA)等。Wireless sensor networks have a wide range of applications in military and civilian fields, and the location information of sensor nodes is very important for environmental monitoring and target node tracking. Although the location information of sensor nodes can be provided through a Global Positioning System (Global Positioning System, GPS), the performance of GPS is very sensitive to the environment, and the cost is too high for low-cost sensor nodes. Therefore, in some applications, the system locates the target node through wireless transmission between anchor target nodes, such as based on Received Signal Strength (RSS), Time Of Arrival (ToA), time difference of arrival (based on target radiation source) and angle of arrival (Angle of Arrival, AoA), etc.

无线系统的安全是一个重要问题,而无线系统中的开放性造成的安全漏洞、传感器定位方案的分布式特性以及可能存在多个攻击者(尤其是协同攻击者),使得在无线传感器网络中保证定位方案的安全性具有一定的挑战性。针对定位方案的攻击防御方案往往会引入较高的通信开销,其安全性依赖于攻击者的能力。而传统方案的高通信开销导致了以下限制,首先,所有传感器节点的电池寿命需要足够高;其次,各传感器节点的存储空间要足够大;第三,在移动传感器节点的情况下,时效性较差。此外,如果攻击者有足够的能量来发动更多的攻击,那么即使引入了较高的通信开销,也会导致传统方案失效。综上,相关技术中的无线传感器网络中保证定位安全的方案不能满足灵活性的需求。The security of wireless systems is an important issue, and the security loopholes caused by the openness of wireless systems, the distributed nature of sensor positioning schemes, and the possible existence of multiple attackers (especially coordinated attackers) make it impossible to guarantee wireless sensor networks. The security of the positioning scheme is challenging. The attack defense scheme for the positioning scheme often introduces high communication overhead, and its security depends on the attacker's ability. The high communication overhead of the traditional scheme leads to the following limitations. First, the battery life of all sensor nodes needs to be high enough; second, the storage space of each sensor node must be large enough; third, in the case of mobile sensor nodes, the timeliness is relatively high. Difference. In addition, if the attacker has enough energy to launch more attacks, even if a high communication overhead is introduced, the traditional scheme will fail. To sum up, the solutions for ensuring positioning security in the wireless sensor network in the related art cannot meet the requirement of flexibility.

发明内容SUMMARY OF THE INVENTION

本申请实施例提供一种无线传感器网络的定位优化方法、装置、设备和存储介质,以优化无线传感器的定位优化方案,减少通信开销,提高灵活性。The embodiments of the present application provide a positioning optimization method, device, device, and storage medium for a wireless sensor network, so as to optimize the positioning optimization scheme of the wireless sensor, reduce communication overhead, and improve flexibility.

本申请实施例提供了一种无线传感器网络的定位优化方法,包括:An embodiment of the present application provides a method for optimizing the positioning of a wireless sensor network, including:

获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;obtaining the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determining the target distance between the anchor point and the target node;

根据设定误报概率上限值确定目标检测阈值;Determine the target detection threshold according to the set false alarm probability upper limit;

根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;determining a detection result of a ranging increase attack according to the first receiver noise, the second receiver noise, and the target detection threshold;

如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。If the detection result of the range increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded.

本申请实施例还提供了一种无线传感器网络的定位优化装置,包括:The embodiment of the present application also provides a positioning optimization device for a wireless sensor network, including:

信息获取模块,用于获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;The information acquisition module is used to acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the difference between the anchor point and the target node target distance;

检测阈值确定模块,用于根据设定误报概率上限值确定目标检测阈值;The detection threshold determination module is used to determine the target detection threshold according to the set false alarm probability upper limit value;

攻击检测模块,用于根据所述第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;an attack detection module, configured to determine the detection result of the ranging attack according to the first receiver noise, the second receiver noise and the target detection threshold;

定位模块,用于如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。A positioning module, configured to locate the target node according to the target distance if the detection result of the range increase attack is that there is no range increase attack; otherwise, discard the target distance.

本申请实施例还提供了一种设备,所述设备包括:The embodiment of the present application also provides a device, the device includes:

一个或多个处理器;one or more processors;

存储装置,用于存储一个或多个程序;a storage device for storing one or more programs;

当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如上所述的无线传感器网络的定位优化方法。When the one or more programs are executed by the one or more processors, the one or more processors implement the above-mentioned method for optimizing the positioning of the wireless sensor network.

本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如上所述的无线传感器网络的定位优化方法。Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, implements the above-mentioned method for positioning optimization of a wireless sensor network.

本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; the target detection threshold is determined according to the upper limit of the false alarm probability; the detection result of the ranging attack is determined according to the noise of the first receiver, the noise of the second receiver and the target detection threshold; If the detection result of the increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.

附图说明Description of drawings

图1为本申请实施例提供的一种无线传感器网络的定位优化方法的流程图;FIG. 1 is a flowchart of a method for positioning optimization of a wireless sensor network according to an embodiment of the present application;

图2为本申请实施例提供的一种无线传感器网络的定位优化方法的示意图;FIG. 2 is a schematic diagram of a positioning optimization method for a wireless sensor network provided by an embodiment of the present application;

图3为本申请实施例提供的一种相关技术的定位方法的示意图;3 is a schematic diagram of a related art positioning method provided by an embodiment of the present application;

图4为本申请实施例提供的一种测距增大攻击的示意图;FIG. 4 is a schematic diagram of a ranging attack provided by an embodiment of the present application;

图5为本申请实施例提供的一种测距增大攻击的定位示意图;FIG. 5 is a schematic diagram of the location of a range-enhancing attack provided by an embodiment of the present application;

图6为本申请实施例提供的一种双向定位示意图;6 is a schematic diagram of bidirectional positioning provided by an embodiment of the present application;

图7为本申请实施例提供的另一种无线传感器网络的定位优化方法的流程图;FIG. 7 is a flowchart of another wireless sensor network positioning optimization method provided by an embodiment of the present application;

图8为本申请实施例提供的一种无线传感器网络系统的示意图;FIG. 8 is a schematic diagram of a wireless sensor network system according to an embodiment of the present application;

图9为本申请实施例提供的一种实验和理论的对比示意图;Fig. 9 is a kind of comparative schematic diagram of experiment and theory provided by the embodiment of this application;

图10为本申请实施例提供的一种检测性能与测量次数的关系示意图;10 is a schematic diagram of the relationship between a detection performance and the number of measurements provided by an embodiment of the application;

图11为本申请实施例提供的一种通信开销与锚点数量的关系示意图;11 is a schematic diagram of the relationship between a communication overhead and the number of anchor points according to an embodiment of the present application;

图12为本申请实施例提供的一种通信开销与测量次数的关系示意图;12 is a schematic diagram of the relationship between a communication overhead and the number of measurements provided by an embodiment of the present application;

图13为本申请实施例提供的一种性能开销比与测量次数的关系示意图;13 is a schematic diagram of the relationship between a performance-overhead ratio and the number of measurements provided by an embodiment of the present application;

图14为本申请实施例提供的一种无线传感器网络的定位优化装置的结构示意图;FIG. 14 is a schematic structural diagram of an apparatus for positioning optimization of a wireless sensor network according to an embodiment of the present application;

图15为本申请实施例提供的一种设备的结构示意图。FIG. 15 is a schematic structural diagram of a device provided by an embodiment of the present application.

具体实施方式Detailed ways

下面结合附图和实施例对本申请进行说明。此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。The present application will be described below with reference to the accompanying drawings and embodiments. The specific embodiments described herein are only used to explain the present application, but not to limit the present application. For convenience of description, the drawings only show some but not all structures related to the present application.

在讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各步骤描述成顺序的处理,但是其中的许多步骤可以被并行地、并发地或者同时实施。此外,各步骤的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。Before discussing the exemplary embodiments, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowchart depicts the steps as a sequential process, many of the steps may be performed in parallel, concurrently, or concurrently. Furthermore, the order of the steps can be rearranged. The process may be terminated when its operation is complete, but may also have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, subroutines, and the like.

图1为本申请实施例提供的一种无线传感器网络的定位优化方法的流程图,本实施例可适用于实现无线传感器的安全定位的情况,该方法可以由无线传感器网络的定位优化装置执行,该装置可以采用软件和/或硬件的方式实现,该装置可配置于电子设备中,例如服务器或终端设备。如图1所示,该方法可以包括:FIG. 1 is a flowchart of a method for positioning optimization of a wireless sensor network provided by an embodiment of the present application. This embodiment is applicable to the situation of realizing safe positioning of wireless sensors, and the method can be executed by a positioning optimization device of a wireless sensor network, The apparatus may be implemented in software and/or hardware, and the apparatus may be configured in an electronic device, such as a server or a terminal device. As shown in Figure 1, the method may include:

S110、获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离。S110. Acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the target distance between the anchor point and the target node.

其中,目标节点和锚点是指无线传感器网络中的传感器节点,锚点用于确定目标节点的位置,本实施例中假设锚点的位置在任何时间和地点都可以通过GPS系统或其他方式预先确定。挑战信号为锚点发送给目标节点的信号,响应信号为目标节点接收到挑战信号之后返回给锚点的信号。第一接收机噪声为目标节点接收挑战信号时提取的接收机噪声,第二接收机噪声为锚点接收响应信号时提取的接收机噪声。Among them, the target node and the anchor point refer to the sensor node in the wireless sensor network, and the anchor point is used to determine the position of the target node. In this embodiment, it is assumed that the position of the anchor point can be pre-determined by the GPS system or other methods at any time and place. Sure. The challenge signal is the signal sent by the anchor to the target node, and the response signal is the signal returned by the target node to the anchor after receiving the challenge signal. The first receiver noise is the receiver noise extracted when the target node receives the challenge signal, and the second receiver noise is the receiver noise extracted when the anchor point receives the response signal.

本实施例中,锚点可以发送一个挑战信号给目标节点,目标节点接收到挑战信号之后,提取此时的第一接收机噪声;目标节点根据第一接收机噪声和挑战信号生成响应信号,并发送响应信号给锚点;锚点接收到响应信号之后,可以提取第二接收机噪声。锚点接收到响应信号之后,可以记录时间间隔,并根据该时间间隔确定锚点和目标节点之间的目标距离,即实现测距。或者,无线传感器网络的定位优化装置也可以获取锚点记录的时间间隔,进而确定锚点和目标节点之间的目标距离,即实现测距。In this embodiment, the anchor point can send a challenge signal to the target node, and after the target node receives the challenge signal, it extracts the first receiver noise at this time; the target node generates a response signal according to the first receiver noise and the challenge signal, and The response signal is sent to the anchor; after the anchor receives the response signal, the second receiver noise can be extracted. After the anchor point receives the response signal, the time interval can be recorded, and the target distance between the anchor point and the target node can be determined according to the time interval, that is, the ranging is realized. Alternatively, the positioning optimization device of the wireless sensor network can also obtain the time interval recorded by the anchor point, and then determine the target distance between the anchor point and the target node, that is, to achieve ranging.

示例性的,参见图2,图2为本申请实施例提供的一种无线传感器网络的定位优化方法的示意图。图2中锚点A发送一个挑战信号给目标节点S,目标节点S在时间t1接收到的挑战信号D,估计第一接收机噪声

Figure BDA0002629444420000061
目标节点S生成响应信号,并将响应信号返回给锚点A;锚点A在t2接收到响应信号,记录时间间隔为τAS=t2-t1,以备后续进行定位,并估计第二接收机噪声
Figure BDA0002629444420000062
2 is a schematic diagram of a method for positioning optimization of a wireless sensor network according to an embodiment of the present application. In Figure 2, the anchor point A sends a challenge signal to the target node S, and the target node S receives the challenge signal D at time t1 , and estimates the first receiver noise
Figure BDA0002629444420000061
The target node S generates a response signal and returns the response signal to the anchor point A; the anchor point A receives the response signal at t 2 , and the recording time interval is τ AS =t 2 -t 1 for subsequent positioning and estimation of the first Two receiver noise
Figure BDA0002629444420000062

传统方案中,是通过连续测量多个到达时间并存储中值来估计锚点与目标节点之间的距离,提出了一种安全定位方案,如图3所示。图3为本申请实施例提供的一种相关技术的定位方法的示意图,假设密钥K在所有的锚节点和目标节点之间共享,并使用消息完整性代码技术来保证安全性,MIC对信息M进行加密用gK(M),g(·)表示哈希函数和K是密钥,外部攻击者可能知道的g(·)细节,但不知道密钥K,作用有两方面:一是确定M来源,二是要保证M完整来防御篡改攻击。In the traditional scheme, the distance between the anchor point and the target node is estimated by continuously measuring multiple arrival times and storing the median value. A secure positioning scheme is proposed, as shown in Figure 3. 3 is a schematic diagram of a positioning method of a related art provided by an embodiment of the present application. It is assumed that the key K is shared between all anchor nodes and the target node, and the message integrity code technology is used to ensure security. M is encrypted with g K (M), g( ) represents the hash function and K is the key, external attackers may know the details of g( ), but do not know the key K, which has two functions: one is To determine the source of M, the second is to ensure the integrity of M to prevent tampering attacks.

传统方案要求L次测量,每次测量由三个无线传输组成即L≥3,如图3所示。在每次测量中,首先锚点A发送由l-bit随机数D组成的挑战信号给目标节点S;目标节点S在时间t1接收到挑战信号,然后提取随机数D,目标节点S发送2l-bit的D||B的响应信号给锚点A,锚点A在时间t2接收到响应信号,||表示消息连接操作符,B也是一个l-bit的随机数;然后锚点A将流逝时间记录为τAS=t2-t1并计算了双向ToA的tAS。与此同时,锚点A从接收到的响应信号中提取D||B,并计算v=gK(D||B)的值;目标节点S发送MIC信号gK(D||B)给锚点A。The traditional scheme requires L measurements, each measurement consists of three wireless transmissions, that is, L≥3, as shown in Figure 3. In each measurement, first the anchor point A sends a challenge signal consisting of an l-bit random number D to the target node S; the target node S receives the challenge signal at time t1 , and then extracts the random number D, and the target node S sends 2l The response signal of -bit D||B is sent to anchor point A, anchor point A receives the response signal at time t 2 , || represents the message connection operator, and B is also an l-bit random number; then anchor point A will The elapsed time was recorded as τ AS = t 2 -t 1 and t AS for the bidirectional ToA was calculated. At the same time, the anchor point A extracts D||B from the received response signal, and calculates the value of v=g K (D||B); the target node S sends the MIC signal g K (D||B) to the Anchor point A.

传统方案通过两个连续的步骤检测距离减少和测距增大攻击,在第一步中,如果接收到的MIC与v的值相同,距离缩小攻击的检测已经通过;在第二步中,在连续测量多个ToA后,先验方案以测量次数的中位数作为最终测量值,以抵御测距增大攻击。传统方案对测距增大攻击的抵抗依赖于发起攻击的次数M,如果M≤(L-1)/2,才能成功侦测到测距增大攻击;否则,其安全性就无法得到保证。虽然两种类型的攻击都通过了检测,锚点A可以接受tAS作为合法的ToA,并将其存储为有用的定位信息,以获取目标节点的实际位置。对于一个包括NA个锚点的无线传感器网络,传统方案的通信开销为3LNA,数字3表示每次测量包含三个无线传输,L表示测量次数,因此当NA或L增加时,传统方案的通信开销增加。并且传统方案中对测距增大攻击检测的灵活性较低,不考虑实际情况的变化,简单根据每次测量地MIC与v比较后确定是否保留测量结果,之后取多次测量结果的中位数作为最终结果。基于上述技术问题,本实施例中考虑到当外部攻击者转发质询信号时,不可避免地会引入额外的接收机噪声,通过该接收机噪声进行安全定位前的攻击检测,基于攻击检测结果进行目标节点的安全定位,以减小通信开销,提高灵活性。The traditional scheme detects range reduction and range increase attacks in two consecutive steps. In the first step, if the received MIC is the same as the value of v, the detection of the range reduction attack has passed; in the second step, in the After continuous measurement of multiple ToAs, the prior scheme uses the median of the measurement times as the final measurement value to resist range-enhancing attacks. The resistance of the traditional scheme to the range increase attack depends on the number of attacks M. If M≤(L-1)/2, the range increase attack can be successfully detected; otherwise, its security cannot be guaranteed. While both types of attacks pass the detection, anchor A can accept t AS as a legitimate ToA and store it as useful positioning information to obtain the actual location of the target node. For a wireless sensor network including N A anchor points, the communication overhead of the traditional scheme is 3L N A , the number 3 means that each measurement contains three wireless transmissions, and L means the number of measurements, so when N A or L increases, the traditional scheme increased communication overhead. In addition, the traditional scheme has low flexibility in detecting range-enhancing attacks, regardless of changes in the actual situation, simply compare the MIC of each measurement with v to determine whether to retain the measurement results, and then take the median of multiple measurement results. number as the final result. Based on the above technical problems, in this embodiment, it is considered that when an external attacker forwards the challenge signal, additional receiver noise will inevitably be introduced, the receiver noise is used to perform attack detection before security positioning, and the target is detected based on the attack detection result. Secure positioning of nodes to reduce communication overhead and improve flexibility.

S120、根据设定误报概率上限值确定目标检测阈值。S120. Determine the target detection threshold according to the upper limit value of the set false alarm probability.

其中,假设H0表示不存在测距增大攻击的情况,H1表示存在测距增大攻击的情况,接受假设H1当H0为真时称为误报概率(PFA),即Pfa=P{H1|H0}。设定误报概率上限值为当存在信道估计误差时,用户根据当前实际需求以及实际情况预先设定的误报概率的上限值,可以基于用户选择进行灵活改变。目标检测阈值用于检测测距增大攻击的一个阈值,目标检测阈值与设定误报概率上限值之间存在关联关系,可以基于设定误报概率上限值确定该目标检测阈值。因此,当设定误报概率上限值可以根据实际情况灵活设置时,目标检测阈值也灵活变化。Among them, it is assumed that H 0 indicates that there is no ranging attack, and H 1 indicates that there is a ranging attack. Accepting the assumption H 1 when H 0 is true is called the probability of false alarm (PFA), that is, P fa =P{H 1 |H 0 }. The upper limit value of the false alarm probability is set as the upper limit value of the false alarm probability preset by the user according to the current actual demand and the actual situation when there is a channel estimation error, which can be flexibly changed based on the user's choice. The target detection threshold is a threshold used to detect range-enhancing attacks. There is a correlation between the target detection threshold and the upper limit of the false alarm probability. The target detection threshold can be determined based on the upper limit of the false alarm probability. Therefore, when the upper limit of the false alarm probability can be set flexibly according to the actual situation, the target detection threshold can also be flexibly changed.

本实施例中,确定目标检测阈值时考虑两种情况,一种是存在信道估计误差的情况,一种是不存在信道估计误差的情况。In this embodiment, two situations are considered when determining the target detection threshold, one is a situation where there is a channel estimation error, and the other is a situation where there is no channel estimation error.

根据设定误报概率上限值确定目标检测阈值,可以包括:根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值。一实施例中,检测阈值表达式为:

Figure BDA0002629444420000081
其中,Pfa表示误报概率,θ表示目标检测阈值,
Figure BDA0002629444420000082
表示响应信号或挑战信号的方差,
Figure BDA0002629444420000083
表示信道估计误差的方差。Determining the target detection threshold according to the set false alarm probability upper limit value may include: determining the target detection threshold value according to the set false alarm probability upper limit value and a predetermined detection threshold expression. In one embodiment, the detection threshold expression is:
Figure BDA0002629444420000081
Among them, P fa represents the probability of false positives, θ represents the target detection threshold,
Figure BDA0002629444420000082
represents the variance of the response signal or challenge signal,
Figure BDA0002629444420000083
Represents the variance of the channel estimation error.

目标检测阈值基于误报概率表达式可以确定,误报概率表达式为:

Figure BDA0002629444420000084
其中,Pfa表示误报概率,θ表示目标检测阈值,H1表示存在测距增大攻击的情况,H0表示无测距增大攻击的情况,
Figure BDA0002629444420000085
表示响应信号或挑战信号的方差,
Figure BDA0002629444420000086
表示信道估计误差的方差。The target detection threshold can be determined based on the false positive probability expression, and the false positive probability expression is:
Figure BDA0002629444420000084
Among them, P fa represents the probability of false positives, θ represents the target detection threshold, H 1 represents the presence of a ranging attack, H 0 represents no ranging attack,
Figure BDA0002629444420000085
represents the variance of the response signal or challenge signal,
Figure BDA0002629444420000086
Represents the variance of the channel estimation error.

当存在信道估计误差的情况下,假设挑战信号和响应信号的传输功率相同,即

Figure BDA0002629444420000087
所有的锚点和目标节点都有相同的接收机噪声,即
Figure BDA0002629444420000088
但是,恶意节点的传输功率和接收噪声不同,增加了硬件成本,恶意节点的传输功率由GE确定,nE的噪声方差为
Figure BDA0002629444420000089
其中β表示恶意节点的硬件性能,β=1表示恶意节点的硬件性能与锚节点和目标节点相似;β<1表示恶意节点硬件性能较好,但硬件成本较高;β>1表示恶意节点的硬件性能较差,但硬件成本较低。基于S110中第一接收机噪声和第二接收机噪声的表达式,将信道估计误差的方差表示为
Figure BDA00026294444200000810
Figure BDA00026294444200000811
其中α表示所采用的信道估计算法的性能,信道估计误差由采用的信道估计算法和接收机噪声共同决定。When there is a channel estimation error, it is assumed that the transmission power of the challenge signal and the response signal are the same, i.e.
Figure BDA0002629444420000087
All anchor and target nodes have the same receiver noise, i.e.
Figure BDA0002629444420000088
However, the transmission power of the malicious node is different from the received noise, which increases the hardware cost. The transmission power of the malicious node is determined by G E , and the noise variance of n E is
Figure BDA0002629444420000089
Among them, β represents the hardware performance of the malicious node, β=1 indicates that the hardware performance of the malicious node is similar to that of the anchor node and the target node; β<1 indicates that the hardware performance of the malicious node is better, but the hardware cost is high; The hardware performance is poor, but the hardware cost is lower. Based on the expressions of the first receiver noise and the second receiver noise in S110, the variance of the channel estimation error is expressed as
Figure BDA00026294444200000810
and
Figure BDA00026294444200000811
Among them, α represents the performance of the adopted channel estimation algorithm, and the channel estimation error is jointly determined by the adopted channel estimation algorithm and the receiver noise.

基于误报概率表达式可以确定目标检测阈值

Figure BDA00026294444200000812
确定响应信号或挑战信号的方差、信道估计误差的方差以及设定误报概率上限值之后,代入上述公式,即可确定目标检测阈值。The target detection threshold can be determined based on the false positive probability expression
Figure BDA00026294444200000812
After determining the variance of the response signal or the challenge signal, the variance of the channel estimation error, and setting the upper limit of the false alarm probability, the target detection threshold can be determined by substituting the above formula.

可选的,根据设定误报概率上限值确定目标检测阈值,可以包括:当不存在信道估计误差的情况下,设定误报概率上限值和目标检测阈值均为零。如果忽略所有的信道估计误差,则误报概率Pfa=P{H1|H0}=0,则目标检测阈值θ=0。Optionally, determining the target detection threshold according to the set false alarm probability upper limit value may include: setting both the false alarm probability upper limit value and the target detection threshold value to zero when there is no channel estimation error. If all channel estimation errors are ignored, the false alarm probability P fa =P{H 1 |H 0 }=0, and the target detection threshold θ=0.

此外,当存在信道估计误差的情况下,根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值之后,还包括:根据目标检测阈值、误报概率表达式和检测概率表达式,确定检测概率,以根据检测概率对目标检测阈值进行验证。In addition, when there is a channel estimation error, after determining the target detection threshold according to the upper limit value of the false alarm probability and the predetermined detection threshold expression, it also includes: according to the target detection threshold, the false alarm probability expression and the detection threshold A probability expression that determines the detection probability to validate the target detection threshold based on the detection probability.

接受假设H1当H1为真时称为检测概率(PD),即Pd=P{H1|H1}。通过奈曼一皮尔逊定理计算可以确定检测概率的最优阈值。检测概率表达式可以为Accepting the hypothesis H 1 when H 1 is true is called the probability of detection (PD), ie P d =P{H 1 |H 1 }. The optimal threshold of detection probability can be determined by the calculation of the Neyman-Pearson theorem. The detection probability expression can be expressed as

Figure BDA0002629444420000091
Figure BDA0002629444420000091

根据目标检测阈值、误报概率表达式和检测概率表达式确定检测概率之后,根据检测概率与检测概率最优阈值,可以验证当前的目标检测阈值的性能较好,即确定当前的环境合适本实施例中采用的方法。After the detection probability is determined according to the target detection threshold, the false alarm probability expression and the detection probability expression, according to the detection probability and the optimal detection probability threshold, it can be verified that the performance of the current target detection threshold is better, that is, it is determined that the current environment is suitable for this implementation. method used in the example.

S130、根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果。S130. Determine the detection result of the ranging attack according to the noise of the first receiver, the noise of the second receiver, and the target detection threshold.

本实施例中采用的定位方法为双向到达时间(Time Of Arrival,ToA)算法,而在双向ToA技术中,存在距离缩小攻击和测距增大攻击两个漏洞,本实施例中针对的是测距增大攻击。两个恶意节点协同发起攻击,如图4所示,图4为本申请实施例提供的一种测距增大攻击的示意图。图5展示了攻击的效果,图5为本申请实施例提供的一种测距增大攻击的定位示意图。在图4和图5中,S1是目标节点的实际位置,

Figure BDA0002629444420000101
是目标节点的估计位置,A1表示锚点,E1和E2表示恶意节点,恶意节点的目的是破坏定位过程或降低定位精度。The positioning method used in this embodiment is the two-way Time Of Arrival (ToA) algorithm, and in the two-way ToA technology, there are two loopholes: distance reduction attack and range increase attack. Range increases attack. Two malicious nodes cooperate to launch an attack, as shown in FIG. 4 . FIG. 4 is a schematic diagram of a ranging attack provided by an embodiment of the present application. FIG. 5 shows the effect of the attack, and FIG. 5 is a schematic diagram of the location of a range-enhancing attack provided by an embodiment of the present application. In Figures 4 and 5, S1 is the actual position of the target node,
Figure BDA0002629444420000101
is the estimated location of the target node, A 1 represents the anchor point, E 1 and E 2 represent malicious nodes, and the purpose of malicious nodes is to disrupt the localization process or reduce the localization accuracy.

在测距增大攻击中,如图4所示,E2在两个阶段有不同的作用。在第一阶段,当A1发送挑战信号

Figure BDA0002629444420000102
E2发射干扰信号S1,然后E1收到
Figure BDA0002629444420000103
表示为
Figure BDA0002629444420000104
在第二阶段,E2保持沉默和E1直接发送
Figure BDA0002629444420000105
给S1,附带增益GE,接收信号在S1表示为
Figure BDA0002629444420000106
Figure BDA0002629444420000107
是来自E1到S1的信道响应。然后S1发送响应信号
Figure BDA0002629444420000108
给A1。因此A1接收响应信号需要更长的时间,A1与无攻击时相比,将获得更长的双向ToA值。因此A1得到距离增大的估计值,如图5所示。最后,估计了S1的错误位置。In the range augmentation attack, as shown in Figure 4, E2 has different roles in two stages. In the first stage, when A1 sends a challenge signal
Figure BDA0002629444420000102
E 2 transmits interfering signal S 1 , which is then received by E 1
Figure BDA0002629444420000103
Expressed as
Figure BDA0002629444420000104
In the second stage, E2 keeps silent and E1 sends directly
Figure BDA0002629444420000105
Given S 1 , with gain G E , the received signal at S 1 is expressed as
Figure BDA0002629444420000106
Figure BDA0002629444420000107
is the channel response from E1 to S1 . Then S1 sends a response signal
Figure BDA0002629444420000108
give A 1 . Therefore, it takes a longer time for A 1 to receive the response signal, and A 1 will obtain a longer bidirectional ToA value than when there is no attack. Therefore A1 gets an estimate of the increase in distance, as shown in Figure 5. Finally, the error location of S1 is estimated.

根据第一接收机噪声、第二接收机噪声以及目标检测阈值确定测距增大攻击的检测结果,可以包括:确定第二接收机噪声方差和第一接收机噪声方差的方差差值;根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果。一实施例中,根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果,包括:如果方差差值小于或等于目标检测阈值,则测距增大攻击的检测结果为不存在测距增大攻击;否则,测距增大攻击的检测结果为存在测距增大攻击。Determining the detection result of the ranging attack according to the first receiver noise, the second receiver noise, and the target detection threshold may include: determining a variance difference between the noise variance of the second receiver and the noise variance of the first receiver; The comparison result of the difference value and the target detection threshold value determines the detection result of the range-enhancing attack. In one embodiment, determining the detection result of the ranging attack according to the comparison result of the variance difference and the target detection threshold, including: if the variance difference is less than or equal to the target detection threshold, then determining the detection result of the ranging attack It means that there is no ranging attack; otherwise, the detection result of the ranging attack is that there is a ranging attack.

本实施例中,假设H0表示不存在测距增大攻击的情况,H1表示存在测距增大攻击的情况。目标节点S接收到的挑战信号在H0和H1时分别表示为

Figure BDA0002629444420000111
Figure BDA0002629444420000112
在H0时,目标节点S通过信道估计算法和恢复消息
Figure BDA0002629444420000113
获得估计的信道响应
Figure BDA0002629444420000114
因为恢复的错误可以通过调制和信道编码来纠正,本实施例中假设消息可以完全恢复,即
Figure BDA0002629444420000115
目标节点S提取接收机噪声为
Figure BDA0002629444420000116
目标节点S计算它的方差
Figure BDA0002629444420000117
在H1时,目标节点S得到信道响应为
Figure BDA0002629444420000118
提取的接收机噪声为
Figure BDA0002629444420000119
目标节点S计算它的方差
Figure BDA00026294444200001110
之后,由于本实施例中以假设锚点A发送挑战信号给目标节点S时有攻击,而目标节点S返回响应信号时无攻击,因此锚点A得到信道响应为
Figure BDA00026294444200001111
提取的接收机噪声为
Figure BDA00026294444200001112
锚点A计算它的方差
Figure BDA00026294444200001113
In this embodiment, it is assumed that H 0 indicates that there is no ranging attack, and H 1 indicates that there is a ranging attack. The challenge signal received by the target node S is expressed as H 0 and H 1 , respectively
Figure BDA0002629444420000111
and
Figure BDA0002629444420000112
At H 0 , the target node S recovers the message through the channel estimation algorithm and
Figure BDA0002629444420000113
Get the estimated channel response
Figure BDA0002629444420000114
Since the recovered error can be corrected by modulation and channel coding, it is assumed in this embodiment that the message can be completely recovered, i.e.
Figure BDA0002629444420000115
The target node S extracts the receiver noise as
Figure BDA0002629444420000116
The target node S computes its variance
Figure BDA0002629444420000117
At H1 , the target node S gets the channel response as
Figure BDA0002629444420000118
The extracted receiver noise is
Figure BDA0002629444420000119
The target node S computes its variance
Figure BDA00026294444200001110
After that, since it is assumed in this embodiment that there is an attack when the anchor point A sends the challenge signal to the target node S, and the target node S has no attack when it returns the response signal, the channel response obtained by the anchor point A is:
Figure BDA00026294444200001111
The extracted receiver noise is
Figure BDA00026294444200001112
Anchor A calculates its variance
Figure BDA00026294444200001113

方差差值可以为

Figure BDA00026294444200001114
Figure BDA00026294444200001115
表示绝对值运算符。当存在信道估计误差的情况下,在H0和H1分别重写为
Figure BDA00026294444200001116
Figure BDA00026294444200001117
其中
Figure BDA00026294444200001118
Figure BDA00026294444200001119
Figure BDA00026294444200001120
基于引理1,误报概率
Figure BDA00026294444200001121
根据奈曼-皮尔逊定理,通过设置最大值来计算误报概率的最大阈值,本实施例中通过ε表示该误报概率的最大阈值,Pfa≤ε。根据引理2,可以得到检测概率的表达式。当不存在信道估计误差的情况下,在H0和H1分别重写为
Figure BDA00026294444200001122
Figure BDA00026294444200001123
由于
Figure BDA00026294444200001124
|hES|2是参数为
Figure BDA00026294444200001125
指数分布的随机变量。即
Figure BDA00026294444200001126
因此目标检测阈值设为θ=0。因此Pfa=P{δ>θ°|H0}=0和
Figure BDA0002629444420000121
The variance difference can be
Figure BDA00026294444200001114
Figure BDA00026294444200001115
Represents an absolute value operator. When there is a channel estimation error, H 0 and H 1 are rewritten as
Figure BDA00026294444200001116
and
Figure BDA00026294444200001117
in
Figure BDA00026294444200001118
Figure BDA00026294444200001119
and
Figure BDA00026294444200001120
Based on Lemma 1, the false positive probability
Figure BDA00026294444200001121
According to the Neyman-Pearson theorem, the maximum threshold of the false alarm probability is calculated by setting the maximum value. In this embodiment, ε represents the maximum threshold of the false alarm probability, and P fa ≤ε. According to Lemma 2, the expression of detection probability can be obtained. When there is no channel estimation error, H 0 and H 1 are rewritten as
Figure BDA00026294444200001122
and
Figure BDA00026294444200001123
because
Figure BDA00026294444200001124
|h ES | 2 is the parameter for
Figure BDA00026294444200001125
An exponentially distributed random variable. which is
Figure BDA00026294444200001126
Therefore, the target detection threshold is set to θ=0. Therefore P fa =P{δ>θ°|H 0 }=0 and
Figure BDA0002629444420000121

当δ≤θ,则可以确定测距增大攻击的检测结果为不存在测距增大攻击,否则,测距增大攻击的检测结果为存在测距增大攻击。其中θ表示目标检测阈值。When δ≤θ, it can be determined that the detection result of the ranging attack is that there is no ranging attack; otherwise, the detection result of the ranging attack is that there is a ranging attack. where θ represents the target detection threshold.

本实施例中,每次测量包括两个无线传输,通过适当地增加了挑战信号的最后一位到达目标节点的天线后直到第一比特的响应信号从目标节点的天线发射的持续时间的值,得到一个较大的常数,该常数足够大,可以完成所有的操作;并且本实施例中的攻击检测方法只需要一次测量。针对一个无线传感器网络,通信开销为2NA,其中NA为无线传感器网络中的锚点数量。因此,与传统方案相比,本方案节省了通信开销,特别是在大规模无线传感器网络或强大的外部攻击者的情况下。并且,当存在信道估计误差时,设定误报概率上限值可以根据实际情况灵活设置,目标检测阈值也灵活变化,在节省通信开销的基础上提高了灵活性。In this embodiment, each measurement includes two wireless transmissions, by appropriately increasing the value of the duration after the last bit of the challenge signal reaches the antenna of the target node until the first bit of the response signal is transmitted from the antenna of the target node, A large constant is obtained, which is large enough to complete all operations; and the attack detection method in this embodiment only needs one measurement. For a wireless sensor network, the communication overhead is 2NA , where NA is the number of anchor points in the wireless sensor network. Therefore, compared with traditional schemes, the present scheme saves communication overhead, especially in the case of large-scale wireless sensor networks or powerful external attackers. Moreover, when there is a channel estimation error, the upper limit of the false alarm probability can be set flexibly according to the actual situation, and the target detection threshold can also be changed flexibly, which improves flexibility on the basis of saving communication overhead.

本实施例中在确定测距增大攻击的检测结果的同时,还可以通过引入接收机噪声方差进行距离缩小攻击的检测,得到距离缩小攻击的检测结果。In this embodiment, while determining the detection result of the range increase attack, the detection result of the range reduction attack can also be obtained by introducing the receiver noise variance to detect the range reduction attack.

S140、如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。S140. If the detection result of the range increase attack is that there is no range increase attack, locate the target node according to the target distance; otherwise, discard the target distance.

如果当前仅考虑测距增大攻击时,则可以仅根据测距增大攻击的检测结果对目标节点进行定位。即如果攻击检测结果为不存在测距增大攻击,则根据目标距离采用双向到时间到达算法对目标节点进行定位;如果攻击检测结果为存在测距增大攻击,则将目标距离丢弃。将目标距离丢弃之后,需要对无线传感器网络进行攻击恶意节点的排查以消除测距增大攻击,直到攻击检测结果为不存在测距增大攻击时再对目标节点进行定位。If only the range-increasing attack is currently considered, the target node can be located only according to the detection result of the range-increasing attack. That is, if the attack detection result is that there is no ranging attack, the two-way arrival time algorithm is used to locate the target node according to the target distance; if the attack detection result is that there is a ranging attack, the target distance is discarded. After discarding the target distance, it is necessary to check the malicious nodes attacking the wireless sensor network to eliminate the range increase attack, and then locate the target node until the attack detection result is that there is no range increase attack.

如果当前需要同时考虑测距增大攻击和距离缩小攻击时,则根据目标距离对目标节点进行定位之前,还可以包括:确定测距缩小攻击的检测结果;相应的,如果测距增大攻击的检测结果为不存在测距增大攻击以及测距缩小攻击的检测结果为不存在测距缩小攻击时,执行根据目标距离对目标节点进行定位;否则,将目标距离丢弃。如果攻击检测结果为存在距离缩小攻击或者存在测距增大攻击,则需要对无线传感器网络进行攻击恶意节点的排查以消除攻击,直到攻击检测结果为不存在距离缩小攻击和增大攻击时再对目标节点进行定位。If it is currently necessary to consider both the range-increasing attack and the range-reducing attack, before locating the target node according to the target distance, it may also include: determining the detection result of the range-reducing attack; correspondingly, if the range-increasing attack is When the detection result is that there is no range increase attack and the detection result of the range reduction attack is that there is no range reduction attack, the target node is located according to the target distance; otherwise, the target distance is discarded. If the attack detection result is that there is a range reduction attack or a range increase attack, it is necessary to check the malicious nodes that attack the wireless sensor network to eliminate the attack, until the attack detection result is that there is no distance reduction attack or increase attack. target node for positioning.

双向到达时间算法是一种在无线传感器网络中定位传感器节点的算法。无线传感器网络中可以包括三种类型的传感器节点:锚点、目标节点和恶意节点。锚点的作用是确定目标节点的位置,而恶意节点的目的是破坏定位过程或降低定位精度。为了确定目标节点的二维位置,锚点的数量应该大于3个。而锚点越多,对应的定位精度越高,但同时增加了通信开销,因此锚点的数量可以根据实际情况进行设定。The two-way time of arrival algorithm is an algorithm for locating sensor nodes in wireless sensor networks. Three types of sensor nodes can be included in a wireless sensor network: anchors, target nodes and malicious nodes. The role of the anchor point is to determine the location of the target node, while the purpose of the malicious node is to disrupt the localization process or reduce the localization accuracy. In order to determine the 2D position of the target node, the number of anchor points should be greater than 3. The more anchor points, the higher the corresponding positioning accuracy, but at the same time increase the communication overhead, so the number of anchor points can be set according to the actual situation.

在无线传感器网络中,所有的传感器节点随机部署在一个平面上,目标节点的定位过程通常在网络初始化阶段完成。假设有NA个锚点,表示为

Figure BDA0002629444420000131
NS个目标节点,表示为
Figure BDA0002629444420000132
和NE个恶意节点,表示为
Figure BDA0002629444420000133
其中NA≥3。假设NA=3,NS=1和NE=2,A1在时间t1首先发送一个挑战信号
Figure BDA0002629444420000134
给S1。S1收到的信号表示为
Figure BDA0002629444420000135
其中
Figure BDA0002629444420000136
Figure BDA0002629444420000137
分别是A1到S1的信道响应和S1提取的接收端噪声,假设所有的信道响应都建模为零均值复高斯随机变量(RVs),即
Figure BDA0002629444420000138
其中
Figure BDA0002629444420000139
和d是发射机和接收机之间的距离,λ=c/fc是发射信号的波长,c是光速,fc是发射信号的载波频率。Gt和Gr分别是发射天线增益和接收天线增益。假设接收机噪声也被建模为零均值复高斯随机变量,如
Figure BDA0002629444420000141
Figure BDA0002629444420000142
是基于硬件的。接收到的信噪比(Signal Noise Ratio,SNR)表示为
Figure BDA0002629444420000143
其中Pt表示传输功率。In wireless sensor networks, all sensor nodes are randomly deployed on a plane, and the localization process of the target node is usually completed in the network initialization phase. Suppose there are N A anchors, denoted as
Figure BDA0002629444420000131
N S target nodes, denoted as
Figure BDA0002629444420000132
and N E malicious nodes, denoted as
Figure BDA0002629444420000133
where N A ≥ 3. Assuming NA = 3, NS = 1 and NE = 2, A 1 first sends a challenge signal at time t 1
Figure BDA0002629444420000134
give S 1 . The signal received by S1 is expressed as
Figure BDA0002629444420000135
in
Figure BDA0002629444420000136
and
Figure BDA0002629444420000137
are the channel responses from A 1 to S 1 and the receiver noise extracted by S 1 , respectively, assuming that all channel responses are modeled as zero-mean complex Gaussian random variables (RVs), namely
Figure BDA0002629444420000138
in
Figure BDA0002629444420000139
and d is the distance between the transmitter and receiver, λ=c/f c is the wavelength of the transmitted signal, c is the speed of light, and f c is the carrier frequency of the transmitted signal. G t and Gr are transmit antenna gain and receive antenna gain, respectively. Assume that the receiver noise is also modeled as a zero-mean complex Gaussian random variable, such as
Figure BDA0002629444420000141
Figure BDA0002629444420000142
is hardware based. The received signal-to-noise ratio (Signal Noise Ratio, SNR) is expressed as
Figure BDA0002629444420000143
where P t represents the transmission power.

S1发送响应信号

Figure BDA0002629444420000144
给A1,接收信号在A1表示为
Figure BDA0002629444420000145
其中hS1A1
Figure BDA0002629444420000146
分别是S1到A1的信道响应和A1的噪声,最后A1计算双向ToA,
Figure BDA0002629444420000147
Figure BDA0002629444420000148
表示从挑战信号的最后一位发送到A1响应信号完全解码的时间;
Figure BDA0002629444420000149
表示响应信号的最后一位到达A1天线后直到响应信号被A1完全解码的持续时间;
Figure BDA00026294444200001410
表示挑战信号的最后一位到达S1天线后直到第一比特的响应信号从S1天线发射的持续时间;ttran表示传输时间。
Figure BDA00026294444200001411
Figure BDA00026294444200001412
是基于设备的,在定位过程中是常数,可以预先确定和预加载到A1用于校准时间测量到一定的精度。ttran=2l/b,l是发射信号的长度和b为无线传感器网络的带宽。S 1 sends a response signal
Figure BDA0002629444420000144
Given A 1 , the received signal at A 1 is represented as
Figure BDA0002629444420000145
where h S1A1 and
Figure BDA0002629444420000146
are the channel response of S 1 to A 1 and the noise of A 1 , respectively, and finally A 1 calculates the bidirectional ToA,
Figure BDA0002629444420000147
Figure BDA0002629444420000148
Indicates the time from the transmission of the last bit of the challenge signal to the complete decoding of the A1 response signal;
Figure BDA0002629444420000149
Indicates the duration from when the last bit of the response signal reaches the A1 antenna until the response signal is fully decoded by A1 ;
Figure BDA00026294444200001410
Represents the duration of the last bit of the challenge signal reaching the S1 antenna until the first bit of the response signal is transmitted from the S1 antenna; t tran represents the transmission time.
Figure BDA00026294444200001411
and
Figure BDA00026294444200001412
is device-based, constant during positioning, and can be pre-determined and preloaded into A1 for calibrating time measurements to a certain accuracy. t tran = 2l/b, l is the length of the transmitted signal and b is the bandwidth of the wireless sensor network.

图6为本申请实施例提供的一种双向定位示意图。估计A1和S1两者之间的距离为

Figure BDA00026294444200001413
同样,其他的锚点也可以估计到的距离S1。表示Aj和Sj的二维位置为
Figure BDA00026294444200001414
Figure BDA00026294444200001415
在不失一般性的前提下,假定第一个锚点A1作为领导者从其他锚点收集所有定位信息。基于三个锚点的定位信息,A1建立下列方程,
Figure BDA00026294444200001416
通过该方程,得到其位置为三个圆形成的交点,如图6所示。FIG. 6 is a schematic diagram of bidirectional positioning according to an embodiment of the present application. The estimated distance between A 1 and S 1 is
Figure BDA00026294444200001413
Similarly, other anchor points can also estimate the distance S 1 . Representing the two-dimensional positions of A j and S j as
Figure BDA00026294444200001414
and
Figure BDA00026294444200001415
Without loss of generality, it is assumed that the first anchor A1 acts as the leader to collect all positioning information from other anchors. Based on the positioning information of the three anchor points, A1 establishes the following equation,
Figure BDA00026294444200001416
Through this equation, the position of the intersection formed by the three circles is obtained, as shown in Figure 6.

本实施例提供的无线传感器网络的定位优化方法,具有以下优势:可以根据实际环境抵御测距增大攻击,灵活性强;适应性强,因为本方案保证了传感器节点在苛刻条件下的安全性,如传感器节点的电池寿命有限、传感器节点的存储空间有限以及传感器节点的移动性高等;无论外部攻击者发起多少次攻击,都不会影响所提方案的安全性。The positioning optimization method for a wireless sensor network provided in this embodiment has the following advantages: it can resist ranging attack according to the actual environment, and has strong flexibility; it has strong adaptability, because this solution ensures the security of sensor nodes under harsh conditions , such as the limited battery life of sensor nodes, the limited storage space of sensor nodes, and the high mobility of sensor nodes; no matter how many attacks are launched by external attackers, the security of the proposed scheme will not be affected.

本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; the target detection threshold is determined according to the upper limit of the false alarm probability; the detection result of the ranging attack is determined according to the noise of the first receiver, the noise of the second receiver and the target detection threshold; If the detection result of the increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.

在一些实施例中,上述引理1可以为:如果X和Y是参数是

Figure BDA0002629444420000151
的独立同分布指数随机变量,即
Figure BDA0002629444420000152
|X-Y|的概率密度函数(Probability Density Function,PDF)为
Figure BDA0002629444420000153
x>0,|X-Y|的累积分布函数(Cumulative DistributionFunction,CDF)为
Figure BDA0002629444420000154
x>0。证明过程可以根据相关技术进行证明,在此不进行说明。In some embodiments, the above Lemma 1 may be: If X and Y are parameters are
Figure BDA0002629444420000151
The independent and identically distributed exponential random variables of
Figure BDA0002629444420000152
The probability density function (PDF) of |XY| is
Figure BDA0002629444420000153
x>0, the cumulative distribution function (CDF) of |XY| is
Figure BDA0002629444420000154
x>0. The certification process can be certified according to related technologies, which will not be described here.

在一些实施例中,上述引理2可以为:如果X、Y和Z是具有不同参数

Figure BDA0002629444420000155
Figure BDA0002629444420000161
Figure BDA0002629444420000162
的独立分布指数型随机变量,即
Figure BDA0002629444420000163
Figure BDA0002629444420000164
In some embodiments, the above Lemma 2 may be: if X, Y and Z are with different parameters
Figure BDA0002629444420000155
Figure BDA0002629444420000161
and
Figure BDA0002629444420000162
independent distributed exponential random variable, that is
Figure BDA0002629444420000163
and
Figure BDA0002629444420000164

则|X-Y-Z|的PDF为

Figure BDA0002629444420000165
Then the PDF of |XYZ| is
Figure BDA0002629444420000165

|X-Y-Z|的CDF为

Figure BDA0002629444420000166
The CDF of |XYZ| is
Figure BDA0002629444420000166

证明过程可以根据相关技术进行证明,在此不进行说明。The certification process can be certified according to related technologies, which will not be described here.

图7为本申请实施例提供的另一种无线传感器网络的定位优化方法的流程图。本实施例在上述实施例的基础上,优化了上述无线传感器网络的定位优化方法。相应的,本实施例的方法包括:FIG. 7 is a flowchart of another method for positioning optimization of a wireless sensor network according to an embodiment of the present application. This embodiment optimizes the above-mentioned positioning optimization method of the wireless sensor network on the basis of the above-mentioned embodiment. Correspondingly, the method of this embodiment includes:

S210、获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离。S210: Acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the target distance between the anchor point and the target node.

S220、根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值。S220: Determine the target detection threshold according to the set false alarm probability upper limit value and the predetermined detection threshold expression.

本实施例中,确定目标检测阈值时考虑两种情况,一种是存在信道估计误差的情况,一种是不存在信道估计误差的情况。即,目标检测阈值包括存在信道估计误差和不存在信道估计误差两种情况下的检测阈值。In this embodiment, two situations are considered when determining the target detection threshold, one is a situation where there is a channel estimation error, and the other is a situation where there is no channel estimation error. That is, the target detection threshold includes detection thresholds in the presence of channel estimation errors and in the absence of channel estimation errors.

检测阈值表达式为:

Figure BDA0002629444420000171
其中,Pfa表示误报概率,θ表示目标检测阈值,
Figure BDA0002629444420000172
表示响应信号或挑战信号的方差,
Figure BDA0002629444420000173
表示信道估计误差的方差。The detection threshold expression is:
Figure BDA0002629444420000171
Among them, P fa represents the probability of false positives, θ represents the target detection threshold,
Figure BDA0002629444420000172
represents the variance of the response signal or challenge signal,
Figure BDA0002629444420000173
Represents the variance of the channel estimation error.

根据当前的实际情况确定是否需要考虑信道估计误差,存在信道估计误差时,设定误报概率上限值可以根据实际情况灵活设置,目标检测阈值也灵活变化,在节省通信开销的基础上提高了灵活性;当不存在信道估计误差的情况下,误报概率和目标检测阈值均为零。Determine whether the channel estimation error needs to be considered according to the current actual situation. When there is a channel estimation error, the upper limit of the false alarm probability can be set flexibly according to the actual situation, and the target detection threshold can also be changed flexibly, which improves the communication cost on the basis of saving. Flexibility; when there is no channel estimation error, the false alarm probability and target detection threshold are both zero.

可选的,本实施例中在确定目标检测阈值之后,还可以包括:根据目标检测阈值、误报概率表达式和检测概率表达式,确定检测概率,以根据检测概率对目标检测阈值进行验证。Optionally, after determining the target detection threshold in this embodiment, the method may further include: determining the detection probability according to the target detection threshold, the false alarm probability expression and the detection probability expression, so as to verify the target detection threshold according to the detection probability.

根据目标检测阈值、误报概率表达式和检测概率表达式确定检测概率之后,根据检测概率与检测概率最优阈值,可以验证当前的目标检测阈值的性能较好,即确定当前的环境合适本实施例中采用的方法。检测概率表达式可以为After the detection probability is determined according to the target detection threshold, the false alarm probability expression and the detection probability expression, according to the detection probability and the optimal detection probability threshold, it can be verified that the performance of the current target detection threshold is better, that is, it is determined that the current environment is suitable for this implementation. method used in the example. The detection probability expression can be expressed as

Figure BDA0002629444420000174
Figure BDA0002629444420000174

S230、确定第二接收机噪声方差和第一接收机噪声方差的方差差值。S230. Determine the variance difference between the noise variance of the second receiver and the noise variance of the first receiver.

S240、根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果。S240. Determine the detection result of the range-enhancing attack according to the comparison result between the variance difference and the target detection threshold.

根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果,可以包括:如果方差差值小于或等于目标检测阈值,则测距增大攻击的检测结果为不存在测距增大攻击;否则,测距增大攻击的检测结果为存在测距增大攻击。According to the comparison result between the variance difference and the target detection threshold, determining the detection result of the range-enhancing attack may include: if the variance difference is less than or equal to the target detection threshold, the detection result of the range-enhancing attack is that there is no detection. Range augmentation attack; otherwise, the detection result of range augmentation attack is that range augmentation attack exists.

S250、测距增大攻击的检测结果是否为不存在测距增大攻击,若是,则执行S260;否则执行S280。S250. Whether the detection result of the range increase attack is that there is no range increase attack, if so, execute S260; otherwise, execute S280.

S260、测距缩小攻击的检测结果是否为不存在测距缩小攻击,若是,则执行S270;否则执行S280。S260. Whether the detection result of the ranging narrowing attack is that there is no ranging narrowing attack, if so, perform S270; otherwise, perform S280.

本实施例中,测距缩小攻击的检测可以采用相关技术中的方式实现,在此不作限定,可以检测测距缩小攻击的方式均可适用。In this embodiment, the detection of the range reduction attack may be implemented in a manner in the related art, which is not limited here, and any methods that can detect the range reduction attack are applicable.

S270、根据目标距离对目标节点进行定位。S270, locating the target node according to the target distance.

可以根据目标距离采用双向到达时间算法对目标节点进行定位。定位方式如上所述,在此不进行赘述。The two-way time-of-arrival algorithm can be used to locate the target node according to the target distance. The positioning method is as described above and will not be repeated here.

S280、将目标距离丢弃。S280. Discard the target distance.

将目标距离丢弃之后,可以对无线传感器网络进行攻击恶意节点的排查以消除攻击,直到攻击检测结果为不存在测距缩小攻击和测距增大攻击时再对目标节点进行定位。After discarding the target distance, the wireless sensor network can be checked for malicious nodes attacking to eliminate the attack, and the target node can be located until the attack detection result is that there is no ranging attack or ranging attack.

接下来通过实验仿真和分析对本实施例中提供的无线传感器网络的定位优化方法进行验证。本实施例研究了检测距离攻击性能的实验结果,这些结论也适用于安全定位方案的性能评估,这有两个原因,首先如果所有的距离测量都是合法的,那么最终的定位结果也是合法的;其次,如果每个距离测量中的通信开销很低,那么安全定位方案的总体开销也会很低。对于传感器节点数量的设置,提供了四个节点的简单情况下的实验结果,即锚点的数量NA=1、目标节点的数量NS=1和恶意节点的数量NE=2。在设置各个传感器节点的位置时,假设所有的锚点和恶意节点都分布在同一个平面上,先设置四个节点的位置,如图8所示,图8为本申请实施例提供的一种无线传感器网络系统的示意图。然后让E1在30m×30m平面上移动,设置传输功率Pt=1W和发射天线增益和接收天线增益Gt=Gr=8。Next, the positioning optimization method of the wireless sensor network provided in this embodiment is verified through experimental simulation and analysis. This example studies the experimental results of the detection distance attack performance. These conclusions are also applicable to the performance evaluation of the security positioning scheme. There are two reasons for this. First, if all distance measurements are valid, then the final positioning result is also valid. ; Second, if the communication overhead in each distance measurement is low, the overall overhead of the secure localization scheme will also be low. For the setting of the number of sensor nodes, the experimental results for the simple case of four nodes, namely the number of anchors N A =1, the number of target nodes N S =1 and the number of malicious nodes N E =2, are provided. When setting the positions of each sensor node, it is assumed that all anchor points and malicious nodes are distributed on the same plane, and the positions of four nodes are set first, as shown in FIG. 8 . FIG. Schematic diagram of a wireless sensor network system. Then let E 1 move on a 30m×30m plane, set transmit power P t =1W and transmit and receive antenna gains G t =G r =8.

本实施例中,由于信道衰落和接收机噪声都引入了随机性,本实施例中可以采用设定数量的独立实验方案的最终结果进行平均,例如设定数量可以为60000。本实施例中以四个性能指标为例进行说明,第一个指标是检测概率/误报概率(PD/PFA)。第二个指标是曲线下面积(Area Under Curve,AUC),根据奈曼-皮尔逊(Neyman Pearson,NP)定理得出了接收机工作特性(Receiver Operating Characteristic,ROC)曲线,然后计算ROC曲线对应的AUC。第三个指标是通信开销,定义为在一次距离测量中传输的总比特数。由于检测性能和开销冲突,通过第四个指标即性能开销比(Performance Overhead Ratio,POR),以比较各种方案,其定义为AUC与通信开销的比值。In this embodiment, since both channel fading and receiver noise introduce randomness, in this embodiment, the final results of a set number of independent experimental schemes may be used for averaging, for example, the set number may be 60,000. In this embodiment, four performance indicators are taken as an example for description, and the first indicator is the probability of detection/probability of false alarm (PD/PFA). The second indicator is the Area Under Curve (AUC). According to the Neyman-Pearson (NP) theorem, the Receiver Operating Characteristic (ROC) curve is obtained, and then the corresponding ROC curve is calculated. the AUC. The third metric is communication overhead, defined as the total number of bits transmitted in one distance measurement. Due to the conflict between detection performance and overhead, various schemes are compared through the fourth indicator, Performance Overhead Ratio (POR), which is defined as the ratio of AUC to communication overhead.

通过第一个指标的对比进行举例说明。参见图9,图9为本申请实施例提供的一种实验和理论的对比示意图,该方案的检测性能随恶意节点的接收噪声GE值的增大而提高,如图9所示,设置信噪比γ=10dB,设定误报概率上限值ε=0.01,所采用的信道估计算法的性能α=5%和恶意节点的硬件性能β=100%。如图9所示,PD和PFA的封闭形式表达式与预期的仿真结果完全吻合。和但是,如果估计误差不能被忽略,那么随着GE值的增加,该方案的检测性能会提高。GE的值不能被外部攻击者设置得太小,否则目标节点接收到的信号就会很低,甚至目标节点也无法解码挑战信号,使得距离攻击变得没有意义。An example is given by the comparison of the first indicator. Referring to FIG. 9, FIG. 9 is a schematic diagram comparing an experiment and a theory provided by an embodiment of the present application. The detection performance of this solution increases with the increase of the received noise GE value of the malicious node. As shown in FIG. The noise ratio γ=10dB, the upper limit of false alarm probability ε=0.01, the performance of the adopted channel estimation algorithm α=5% and the hardware performance of malicious nodes β=100%. As shown in Figure 9, the closed-form expressions of PD and PFA are in perfect agreement with the expected simulation results. And, if the estimation error cannot be ignored, the detection performance of this scheme improves as the value of GE increases. The value of GE cannot be set too small by an external attacker, otherwise the signal received by the target node will be very low, and even the target node cannot decode the challenge signal, making distance attacks meaningless.

本方案的检测性能随α值的增大而降低,α表示所采用的信道估计算法的性能,设置GE=150,其余条件与图9相同进行分析。随着β值的增大,检测性能提高,β表示恶意节点的硬件性能,设置GE=150,其余条件与图9相同进行分析。本方案α与β增大时,PD和PFA的封闭形式表达式与预期的仿真结果均完全吻合The detection performance of this scheme decreases with the increase of the value of α, where α represents the performance of the adopted channel estimation algorithm, and G E =150 is set, and the other conditions are the same as those in FIG. 9 for analysis. As the value of β increases, the detection performance improves, β represents the hardware performance of the malicious node, and G E = 150 is set, and the rest of the conditions are the same as in Figure 9 for analysis. When α and β increase in this scheme, the closed-form expressions of PD and PFA are in full agreement with the expected simulation results

随着目标节点与恶意节点距离的减小,检测性能提高,除GE=150与E1位置外,其余条件与图9相同进行分析。但是,如果估计误差不能被忽略,则随着目标节点与恶意节点距离的减小,该方案的检测性能提高。As the distance between the target node and the malicious node decreases, the detection performance improves. Except for the position of G E = 150 and E 1 , the rest of the conditions are the same as those in Fig. 9 for analysis. However, if the estimation error cannot be ignored, the detection performance of this scheme improves as the distance between the target node and the malicious node decreases.

接下来通过将本实施例中提供的方案和传统方案进行对比,对本方案进行说明。本方案的检测性能与测量次数无关,如图10所示,图10为本申请实施例提供的一种检测性能与测量次数的关系示意图。除了GE=150和M=3外其余条件与图9相同,L表示在传统方案中测量的次数。从图10可以看出,本方案的检测性能是独立的,而传统方案的检测性能随着L的值的增大而提高。当L≥2M+1,传统方案的检测性能较好,即AUC=1;否则,传统方案的检测性能较差,即AUC等于0.5,这相当于随机猜测。在有估计误差的情况下,方案的性能略有下降,即AUC=0.992。Next, this solution will be described by comparing the solution provided in this embodiment with the traditional solution. The detection performance of this solution has nothing to do with the number of measurements. As shown in FIG. 10 , FIG. 10 is a schematic diagram of the relationship between the detection performance and the number of measurements provided by an embodiment of the present application. The remaining conditions are the same as in FIG. 9 except that G E =150 and M=3, and L represents the number of measurements in the conventional scheme. It can be seen from Figure 10 that the detection performance of this scheme is independent, while the detection performance of the traditional scheme increases with the increase of the value of L. When L≥2M+1, the detection performance of the traditional scheme is better, that is, AUC=1; otherwise, the detection performance of the traditional scheme is poor, that is, AUC is equal to 0.5, which is equivalent to random guessing. In the case of estimation error, the performance of the scheme decreases slightly, that is, AUC=0.992.

对于不同数量的锚点,本方案比传统方案可以节省通信开销72.8%,且与L无关。首先,参见图11,图11为本申请实施例提供的一种通信开销与锚点数量的关系示意图,除L=3外其余条件与图9相同。从图11中可以看出,本方案和传统方案的通信开销均随着锚点数量NA值的增加而增加。但与传统方案相比,本方案具有更低的通信开销。例如,如果采用IEEE 802.15.4标准,对于4个锚点的情况,本方案的通信开销比传统方案低1.067Kbytes;对于10个锚点的情况,本方案的通信开销比传统方案低2.666Kbytes。对于不同数量的锚点,与传统方案相比,本方案的通信开销节省了72.8%。For different numbers of anchors, the proposed scheme can save 72.8% of the communication overhead compared with the traditional scheme, regardless of L. First, referring to FIG. 11 , FIG. 11 is a schematic diagram of a relationship between communication overhead and the number of anchor points provided by an embodiment of the present application, and other conditions are the same as those of FIG. 9 except that L=3. It can be seen from Fig. 11 that the communication overhead of this scheme and the traditional scheme both increase with the increase of the value of the number of anchor points NA . But compared with the traditional scheme, this scheme has lower communication overhead. For example, if the IEEE 802.15.4 standard is adopted, for the case of 4 anchor points, the communication overhead of this scheme is 1.067Kbytes lower than that of the traditional scheme; for the case of 10 anchor points, the communication overhead of this scheme is 2.666Kbytes lower than that of the traditional scheme. For different numbers of anchors, compared with the traditional scheme, the communication overhead of this scheme is saved by 72.8%.

其次,参见图12,图12为本申请实施例提供的一种通信开销与测量次数的关系示意图,除NA=1外其余条件与图9相同。从图12中可以看出,随着测量次数L增加,传统方案的通信开销增加,而本方案的通信开销则和L独立,与传统方案相比,该方案具有更低的通信开销,特别是在较大L的情况下。例如L=3时,本方案的通信开销比原方案低0.267Kbytes;对于L=10,该方案的通信开销比原方案低1.121Kbytes。Next, referring to FIG. 12 , FIG. 12 is a schematic diagram of a relationship between communication overhead and the number of measurements provided by an embodiment of the present application, and other conditions are the same as those of FIG. 9 except that N A =1. It can be seen from Figure 12 that as the number of measurements L increases, the communication overhead of the traditional scheme increases, while the communication overhead of this scheme is independent of L. Compared with the traditional scheme, this scheme has lower communication overhead, especially In the case of larger L. For example, when L=3, the communication overhead of this scheme is 0.267Kbytes lower than that of the original scheme; for L=10, the communication overhead of this scheme is 1.121Kbytes lower than that of the original scheme.

本方案的POR值比传统方案的POR值好得多,且POR值与L无关。如图13所示,图13为本申请实施例提供的一种性能开销比与测量次数的关系示意图,其中所有条件与图10相同。POR定义为AUC与通信开销的比值。从图13可以看出,本方案的POR值要比传统方案好得多。本方案的POR值与L无关,而传统方案的POR值随着L值的增大而减小,即使L≥2M+1。图13突出了本方案在POR方面的优越性。The POR value of this scheme is much better than that of the traditional scheme, and the POR value is independent of L. As shown in FIG. 13 , FIG. 13 is a schematic diagram of a relationship between a performance-overhead ratio and the number of measurements provided by an embodiment of the present application, where all conditions are the same as those in FIG. 10 . POR is defined as the ratio of AUC to communication overhead. It can be seen from Figure 13 that the POR value of this scheme is much better than that of the traditional scheme. The POR value of this scheme has nothing to do with L, while the POR value of the traditional scheme decreases with the increase of the L value, even if L≥2M+1. Figure 13 highlights the superiority of this scheme in terms of POR.

综上,针对无线传感器网络中两个恶意节点协同发起攻击时节点定位的安全问题,本方案利用外部距离攻击的噪声特征,提出了一种轻量级的安全定位方案。与传统方案相比,本方案提供了更低的通信开销和更高的安全性,实验结果表明了本方案的优越性。To sum up, in view of the security problem of node location when two malicious nodes cooperate to launch attacks in wireless sensor networks, this scheme uses the noise characteristics of external distance attacks to propose a lightweight security location scheme. Compared with the traditional scheme, this scheme provides lower communication overhead and higher security, and the experimental results show the superiority of this scheme.

本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值,确定第二接收机噪声方差和第一接收机噪声方差的方差差值,根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果,如果测距增大攻击的检测结果为不存在测距增大攻击,则确定测距虽小攻击的检测结果;如果测距缩小攻击的检测结果为不存在测距缩小攻击,则根据目标距离对目标节点进行定位。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; according to the upper limit value of the false alarm probability and the predetermined detection threshold expression, the target detection threshold is determined, and the variance difference between the noise variance of the second receiver and the noise variance of the first receiver is determined. According to the variance The comparison result of the difference value and the target detection threshold value determines the detection result of the ranging attack. If the detection result of the ranging attack is that there is no ranging attack, the detection result of the ranging attack is determined; If the detection result of the range reduction attack is that there is no range reduction attack, the target node is located according to the target distance. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.

图14为本申请实施例提供的一种无线传感器网络的定位优化装置的结构示意图,本实施例可适用于实现无线传感器的安全定位的情况。本申请实施例所提供的无线传感器网络的定位优化装置可执行本申请任意实施例所提供的无线传感器网络的定位优化方法,具备执行方法相应的功能模块和效果。该装置包括:FIG. 14 is a schematic structural diagram of an apparatus for positioning optimization of a wireless sensor network according to an embodiment of the present application. This embodiment is applicable to a situation in which secure positioning of a wireless sensor is implemented. The wireless sensor network positioning optimization apparatus provided by the embodiment of the present application can execute the wireless sensor network positioning optimization method provided by any embodiment of the present application, and has functional modules and effects corresponding to the execution method. The device includes:

信息获取模块310,用于获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;检测阈值确定模块320,用于根据设定误报概率上限值确定目标检测阈值;攻击检测模块330,用于根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;定位模块340,用于如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。The information acquisition module 310 is configured to acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the anchor point and the target node The detection threshold determination module 320 is used to determine the target detection threshold according to the set false alarm probability upper limit value; the attack detection module 330 is used to determine the target detection threshold according to the first receiver noise, the second receiver noise and The target detection threshold is used to determine the detection result of the range increase attack; the positioning module 340 is configured to, if the detection result of the range increase attack is that there is no range increase attack, determine the target distance according to the target distance. The target node is positioned; otherwise, the target distance is discarded.

本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; the target detection threshold is determined according to the upper limit of the false alarm probability; the detection result of the ranging attack is determined according to the noise of the first receiver, the noise of the second receiver and the target detection threshold; If the detection result of the increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.

可选的,所述检测阈值确定模块320具体用于:Optionally, the detection threshold determination module 320 is specifically configured to:

根据所述设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值。The target detection threshold is determined according to the set false alarm probability upper limit value and the predetermined detection threshold expression.

可选的,所述检测阈值表达式为:Optionally, the detection threshold expression is:

Figure BDA0002629444420000231
其中,Pfa表示误报概率,θ表示所述目标检测阈值,
Figure BDA0002629444420000232
表示所述响应信号或所述挑战信号的方差,
Figure BDA0002629444420000233
表示所述信道估计误差的方差。
Figure BDA0002629444420000231
Among them, P fa represents the probability of false positives, θ represents the target detection threshold,
Figure BDA0002629444420000232
represents the variance of the response signal or the challenge signal,
Figure BDA0002629444420000233
represents the variance of the channel estimation error.

可选的,所述目标检测阈值包括存在所述信道估计误差和不存在所述信道估计误差两种情况下的检测阈值。Optionally, the target detection threshold includes detection thresholds in the presence of the channel estimation error and the absence of the channel estimation error.

可选的,所述攻击检测模块330用于:Optionally, the attack detection module 330 is used for:

确定所述第二接收机噪声方差和第一接收机噪声方差的方差差值;根据所述方差差值以及所述目标检测阈值的比对结果,确定测距增大攻击的检测结果。Determine the variance difference between the noise variance of the second receiver and the noise variance of the first receiver; and determine the detection result of the ranging attack according to the comparison result of the variance difference and the target detection threshold.

可选的,所述攻击检测模块330具体用于:Optionally, the attack detection module 330 is specifically used for:

如果所述方差差值小于或等于所述目标检测阈值,则所述测距增大攻击的检测结果为不存在测距增大攻击;否则,所述测距增大攻击的检测结果为存在测距增大攻击。If the variance difference is less than or equal to the target detection threshold, the detection result of the range augmentation attack is that the range increase attack does not exist; otherwise, the detection result of the range increase attack is the presence of the range increase attack. Range increases attack.

可选的,所述装置还包括测距缩小攻击模块,具体用于:Optionally, the device further includes a ranging and narrowing attack module, which is specifically used for:

根据所述目标距离对所述目标节点进行定位之前,确定测距缩小攻击的检测结果;相应的,如果所述测距增大攻击的检测结果为不存在测距增大攻击以及所述测距缩小攻击的检测结果为不存在测距缩小攻击时,执行所述根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。Before locating the target node according to the target distance, determine the detection result of the ranging attack; correspondingly, if the detection result of the ranging attack is that there is no ranging attack and the ranging attack When the detection result of the narrowing attack is that there is no ranging narrowing attack, the positioning of the target node according to the target distance is performed; otherwise, the target distance is discarded.

本申请实施例所提供的无线传感器网络的定位优化装置可执行本申请任意实施例所提供的无线传感器网络的定位优化方法,具备执行方法相应的功能模块和效果。The wireless sensor network positioning optimization apparatus provided by the embodiment of the present application can execute the wireless sensor network positioning optimization method provided by any embodiment of the present application, and has functional modules and effects corresponding to the execution method.

图15为本申请实施例提供的一种设备的结构示意图。图15示出了适于用来实现本申请实施方式的示例性设备412的框图。图15显示的设备412仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。FIG. 15 is a schematic structural diagram of a device provided by an embodiment of the present application. 15 shows a block diagram of an exemplary apparatus 412 suitable for use in implementing embodiments of the present application. The device 412 shown in FIG. 15 is only an example, and should not impose any limitations on the functions and scope of use of the embodiments of the present application.

如图15所示,设备412以通用设备的形式表现。设备412的组件可以包括但不限于:一个或者多个处理器416,存储装置428,连接不同系统组件(包括存储装置428和处理器416)的总线418。As shown in FIG. 15, device 412 is represented as a generic device. Components of device 412 may include, but are not limited to, one or more processors 416, storage 428, and a bus 418 connecting various system components including storage 428 and processor 416.

总线418表示几类总线结构中的一种或多种,包括存储装置总线或者存储装置控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(Industry SubversiveAlliance,ISA)总线,微通道体系结构(Micro Channel Architecture,MAC)总线,增强型ISA总线、视频电子标准协会(Video Electronics Standards Association,VESA)局域总线以及外围组件互连(Peripheral Component Interconnect,PCI)总线。Bus 418 represents one or more of several types of bus structures, including a storage device bus or storage device controller, a peripheral bus, a graphics acceleration port, a processor, or a local bus using any of a variety of bus structures. For example, these architectures include, but are not limited to, Industry Subversive Alliance (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (Video Electronics Standards Association) , VESA) local bus and peripheral component interconnect (Peripheral Component Interconnect, PCI) bus.

设备412典型地包括多种计算机系统可读介质。这些介质可以是任何能够被设备412访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。Device 412 typically includes a variety of computer system readable media. These media can be any available media that can be accessed by device 412, including volatile and non-volatile media, removable and non-removable media.

存储装置428可以包括易失性存储器形式的计算机系统可读介质,例如随机存取存储器(Random Access Memory,RAM)430和/或高速缓存存储器432。设备412可以包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。仅作为举例,存储系统434可以用于读写不可移动的、非易失性磁介质(图15未显示,通常称为“硬盘驱动器”)。尽管图15中未示出,可以提供用于对可移动非易失性磁盘(例如“软盘”)读写的磁盘驱动器,以及对可移动非易失性光盘,例如只读光盘(Compact Disc Read-Only Memory,CD-ROM),数字视盘(Digital Video Disc-Read Only Memory,DVD-ROM)或者其它光介质)读写的光盘驱动器。在这些情况下,每个驱动器可以通过一个或者多个数据介质接口与总线418相连。存储装置428可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本申请各实施例的功能。Storage 428 may include computer system readable media in the form of volatile memory, such as random access memory (RAM) 430 and/or cache memory 432 . Device 412 may include other removable/non-removable, volatile/non-volatile computer system storage media. For example only, storage system 434 may be used to read and write to non-removable, non-volatile magnetic media (not shown in FIG. 15, commonly referred to as a "hard disk drive"). Although not shown in Figure 15, a magnetic disk drive may be provided for reading and writing to removable non-volatile magnetic disks (eg "floppy disks"), as well as removable non-volatile optical disks, such as Compact Disc Read -Only Memory, CD-ROM), digital video disc (Digital Video Disc-Read Only Memory, DVD-ROM) or other optical media) optical disc drive for reading and writing. In these cases, each drive may be connected to bus 418 through one or more data media interfaces. Storage 428 may include at least one program product having a set (eg, at least one) of program modules configured to perform the functions of various embodiments of the present application.

具有一组(至少一个)程序模块442的程序/实用工具440,可以存储在例如存储装置428中,这样的程序模块442包括但不限于操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。程序模块442通常执行本申请所描述的实施例中的功能和/或方法。A program/utility 440 having a set (at least one) of program modules 442, which may be stored, for example, in storage device 428, such program modules 442 including, but not limited to, an operating system, one or more application programs, other program modules, and programs Data, each or some combination of these examples may include an implementation of a network environment. Program modules 442 generally perform the functions and/or methods of the embodiments described herein.

设备412也可以与一个或多个外部设备414(例如键盘、指向终端、显示器424等)通信,还可与一个或者多个使得用户能与该设备412交互的终端通信,和/或与使得该设备412能与一个或多个其它计算终端进行通信的任何终端(例如网卡,调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口422进行。并且,设备412还可以通过网络适配器420与一个或者多个网络(例如局域网(Local Area Network,LAN),广域网(Wide Area Network,WAN)和/或公共网络,例如因特网)通信。如图15所示,网络适配器420通过总线418与设备412的其它模块通信。应当明白,尽管图中未示出,可以结合设备412使用其它硬件和/或软件模块,包括但不限于:微代码、终端驱动器、冗余处理器、外部磁盘驱动阵列、磁盘阵列(Redundant Arrays of Independent Disks,RAID)系统、磁带驱动器以及数据备份存储系统等。Device 412 may also communicate with one or more external devices 414 (eg, a keyboard, pointing terminal, display 424, etc.), may also communicate with one or more terminals that enable a user to interact with the device 412, and/or communicate with the device 412. Device 412 can communicate with any terminal (eg, network card, modem, etc.) that communicates with one or more other computing terminals. Such communication may take place through input/output (I/O) interface 422 . Also, device 412 may communicate with one or more networks (eg, Local Area Network (LAN), Wide Area Network (WAN), and/or public networks, such as the Internet) through network adapter 420 . As shown in FIG. 15 , network adapter 420 communicates with other modules of device 412 via bus 418 . It should be understood that, although not shown, other hardware and/or software modules may be used in conjunction with device 412, including but not limited to: microcode, terminal drivers, redundant processors, external disk drive arrays, Redundant Arrays of disks Independent Disks, RAID) systems, tape drives and data backup storage systems.

处理器416通过运行存储在存储装置428中的程序,从而执行各种功能应用以及数据处理,例如实现本申请实施例所提供的无线传感器网络的定位优化方法,该方法包括:获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。The processor 416 executes various functional applications and data processing by running the program stored in the storage device 428, for example, to realize the positioning optimization method of the wireless sensor network provided by the embodiment of the present application, the method includes: The first receiver noise extracted when challenging the signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determining the target distance between the anchor point and the target node; according to the upper limit of the false alarm probability value to determine the target detection threshold; according to the first receiver noise, the second receiver noise and the target detection threshold, determine the detection result of the ranging attack; if the detection result of the ranging attack is increased If there is no ranging attack, the target node is located according to the target distance; otherwise, the target distance is discarded.

本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如本申请实施例所提供的无线传感器网络的定位优化方法,该方法包括:获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, implements the positioning optimization method for a wireless sensor network as provided by the embodiments of the present application, and the method includes: Obtain the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the target distance between the anchor point and the target node; according to the setting The upper limit value of false alarm probability determines the target detection threshold; according to the first receiver noise, the second receiver noise and the target detection threshold, the detection result of the ranging increase attack is determined; if the ranging increase If the detection result of a large attack is that there is no ranging attack, the target node is located according to the target distance; otherwise, the target distance is discarded.

本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本文件中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。The computer storage medium of the embodiments of the present application may adopt any combination of one or more computer-readable media. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. The computer-readable storage medium can be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or a combination of any of the above. Examples (non-exhaustive list) of computer-readable storage media include: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), fiber optics, portable compact disk read only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the above. In this document, a computer-readable storage medium can be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.

计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。A computer-readable signal medium may include a propagated data signal in baseband or as part of a carrier wave, with computer-readable program code embodied thereon. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. A computer-readable signal medium can also be any computer-readable medium other than a computer-readable storage medium that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device .

计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括——但不限于无线、电线、光缆、RF等等,或者上述的任意合适的组合。Program code embodied on a computer readable medium may be transmitted using any suitable medium, including - but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.

可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或终端上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。Computer program code for performing the operations of the present application may be written in one or more programming languages, including object-oriented programming languages—such as Java, Smalltalk, C++, but also conventional Procedural programming language - such as the "C" language or similar programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or terminal. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through Internet connection).

Claims (10)

1. A positioning optimization method of a wireless sensor network comprises the following steps:
acquiring first receiver noise extracted by a target node when receiving a challenge signal and second receiver noise extracted by an anchor point when receiving a response signal; determining the target distance between the anchor point and the target node;
determining a target detection threshold value according to a set upper limit value of the false alarm probability;
determining a detection result of the ranging increase attack according to the first receiver noise, the second receiver noise and the target detection threshold;
if the detection result of the ranging increase attack is that no ranging increase attack exists, positioning the target node according to the target distance; otherwise, the target distance is discarded.
2. The method of claim 1, wherein said determining a target detection threshold from a set false positive probability upper limit value comprises:
and determining a target detection threshold according to the set upper limit value of the false alarm probability and a predetermined detection threshold expression.
3. The method of claim 2, wherein the detection threshold expression is:
Figure FDA0002629444410000011
wherein, PfaTo representSetting a false alarm probability upper limit value, theta represents the target detection threshold value,
Figure FDA0002629444410000012
representing a variance of the response signal or the challenge signal,
Figure FDA0002629444410000013
representing the variance of the channel estimation error.
4. The method of claim 3, wherein the target detection threshold comprises a detection threshold for both the presence and absence of the channel estimation error.
5. The method of claim 1, wherein determining a detection result of a ranging increase attack based on the first receiver noise, the second receiver noise, and the target detection threshold comprises:
determining a variance difference of the second receiver noise variance and the first receiver noise variance;
and determining the detection result of the ranging increase attack according to the variance difference and the comparison result of the target detection threshold.
6. The method of claim 5, wherein determining the detection result of the ranging-up attack according to the comparison result of the variance difference and the target detection threshold comprises:
if the variance difference is smaller than or equal to the target detection threshold, the detection result of the ranging increase attack is that no ranging increase attack exists; otherwise, the detection result of the ranging increase attack is that the ranging increase attack exists.
7. The method of claim 1, further comprising, prior to locating the target node according to the target distance:
determining a detection result of the ranging reduction attack;
if the detection result of the ranging increase attack is that no ranging increase attack exists and the detection result of the ranging reduction attack is that no ranging reduction attack exists, the target node is positioned according to the target distance; otherwise, the target distance is discarded.
8. A positioning optimization apparatus for a wireless sensor network, comprising:
the information acquisition module is arranged to acquire first receiver noise extracted by the target node when receiving the challenge signal and second receiver noise extracted by the anchor point when receiving the response signal; determining the target distance between the anchor point and the target node;
the detection threshold value determining module is used for determining a target detection threshold value according to a set upper limit value of the false alarm probability;
the attack detection module is set to determine the detection result of the ranging augmentation attack according to the first receiver noise, the second receiver noise and the target detection threshold;
the positioning module is set to position the target node according to the target distance if the detection result of the ranging increase attack is that the ranging increase attack does not exist; otherwise, the target distance is discarded.
9. An apparatus, comprising:
one or more processors;
a storage device arranged to store one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method for location optimization for a wireless sensor network as recited in any of claims 1-7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out a method for location optimization of a wireless sensor network according to any one of claims 1 to 7.
CN202080001503.4A 2020-06-04 2020-06-04 Positioning optimization method, device, device and storage medium for wireless sensor network Expired - Fee Related CN111801953B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/094283 WO2021243628A1 (en) 2020-06-04 2020-06-04 Positioning optimization method and apparatus for wireless sensor network, and device and storage medium

Publications (2)

Publication Number Publication Date
CN111801953A true CN111801953A (en) 2020-10-20
CN111801953B CN111801953B (en) 2022-05-10

Family

ID=72834266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080001503.4A Expired - Fee Related CN111801953B (en) 2020-06-04 2020-06-04 Positioning optimization method, device, device and storage medium for wireless sensor network

Country Status (2)

Country Link
CN (1) CN111801953B (en)
WO (1) WO2021243628A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113311385A (en) * 2021-05-18 2021-08-27 南京理工大学 Ultra-wideband-based dynamic target detection method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116545493A (en) * 2022-01-25 2023-08-04 广州海格通信集团股份有限公司 Cluster target consistency matching method, unmanned aerial vehicle, server and storage medium
CN115665783B (en) * 2022-10-28 2025-06-03 紫金山实验室 Abnormal indicator tracing method, device, electronic device and storage medium
CN116222546B (en) * 2023-05-10 2023-07-25 北京白水科技有限公司 Method, device and equipment for generating map information in group navigation positioning

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101686475A (en) * 2008-09-22 2010-03-31 华为技术有限公司 Disturbance detection method and disturbance detection equipment
US20130002477A1 (en) * 2011-06-29 2013-01-03 Sintayehu Dehnie Methods and systems for detecting GPS spoofing attacks
CN108882225A (en) * 2018-05-07 2018-11-23 中山大学 Safe positioning method based on ranging in a kind of wireless sensor network
US20190045327A1 (en) * 2017-08-04 2019-02-07 International Business Machines Corporation Device diversity correction method for rss-based precise location tracking
CN110944383A (en) * 2019-12-09 2020-03-31 青岛黄海学院 Wireless sensor network safety positioning method for clone attack

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297955A (en) * 2013-04-27 2013-09-11 天津工业大学 Wireless sensor network safety positioning method
CN106297114B (en) * 2015-06-26 2018-07-31 奇点新源国际技术开发(北京)有限公司 A kind of invader detection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101686475A (en) * 2008-09-22 2010-03-31 华为技术有限公司 Disturbance detection method and disturbance detection equipment
US20130002477A1 (en) * 2011-06-29 2013-01-03 Sintayehu Dehnie Methods and systems for detecting GPS spoofing attacks
US20190045327A1 (en) * 2017-08-04 2019-02-07 International Business Machines Corporation Device diversity correction method for rss-based precise location tracking
CN108882225A (en) * 2018-05-07 2018-11-23 中山大学 Safe positioning method based on ranging in a kind of wireless sensor network
CN110944383A (en) * 2019-12-09 2020-03-31 青岛黄海学院 Wireless sensor network safety positioning method for clone attack

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
P.RAGHU VAMSI等: "A lightweight Sybil attack detection framework for Wireless Sensor Networks", 《2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113311385A (en) * 2021-05-18 2021-08-27 南京理工大学 Ultra-wideband-based dynamic target detection method
CN113311385B (en) * 2021-05-18 2022-08-09 南京理工大学 Ultra-wideband-based dynamic target detection method

Also Published As

Publication number Publication date
CN111801953B (en) 2022-05-10
WO2021243628A1 (en) 2021-12-09

Similar Documents

Publication Publication Date Title
CN111801953A (en) Positioning optimization method, device, device and storage medium for wireless sensor network
CN112205021B (en) Secure positioning method, apparatus, device and storage medium for wireless sensor network
JP7558991B2 (en) Electronic device for performing ranging via UWB (ultra wide band) in wireless communication system and method of operating said electronic device
Cheikhrouhou et al. Blockloc: Secure localization in the internet of things using blockchain
Koh et al. Geo-spatial location spoofing detection for Internet of Things
US12248083B2 (en) Communication unit, communication device, and position estimating method
CN105247384B (en) The distance of mobile device determines
WO2021192425A1 (en) Communication device and position identification method
CN106792685A (en) A kind of joint qualification method based on carrier frequency and received signal strength
Chen et al. A secure localization approach against wormhole attacks using distance consistency
CN106713190A (en) MIMO (Multiple Input Multiple Output) transmitting antenna number blind estimation algorithm based on random matrix theory and feature threshold estimation
KR20180112780A (en) Methods and systems for ranging protocols
CN110300409A (en) Limited piece long covert communications implementation method based on channel estimation
JP7806266B2 (en) Method, apparatus, and readable storage medium for transmitting ranging signals in UWB
CN111954219A (en) Method, system and device for detecting spoofing attack of unmanned aerial vehicle
Bouabdellah et al. RSS-based localization with maximum likelihood estimation for PUE attacker detection in cognitive radio networks
CN109348503B (en) Monitoring method, device, equipment and system for wireless communication link
CN110300094B (en) A method, device, device and storage medium for trustworthiness assessment of data nodes
Chowdhury et al. Effect of sensor number and location in cross-correlation based node estimation technique for underwater communications network
CN115173975A (en) Method, device and equipment for detecting interference signal and storage medium
US12024125B2 (en) Control device and non-transitory storage medium
CN119743756A (en) Satellite communication authentication integrated method and device
CN105144181B (en) location signature
CN113325363A (en) Method and device for determining direction of arrival and related equipment
KR20200095312A (en) Method and system for ambient backscatter communication in multi-tag and multi-reader environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220510

CF01 Termination of patent right due to non-payment of annual fee