CN111801953A - Positioning optimization method, device, device and storage medium for wireless sensor network - Google Patents
Positioning optimization method, device, device and storage medium for wireless sensor network Download PDFInfo
- Publication number
- CN111801953A CN111801953A CN202080001503.4A CN202080001503A CN111801953A CN 111801953 A CN111801953 A CN 111801953A CN 202080001503 A CN202080001503 A CN 202080001503A CN 111801953 A CN111801953 A CN 111801953A
- Authority
- CN
- China
- Prior art keywords
- target
- attack
- ranging
- detection threshold
- receiver noise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/345—Interference values
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本申请实施例涉及无线网络通信技术领域,例如涉及一种无线传感器网络的定位优化方法、装置、设备和存储介质。The embodiments of the present application relate to the technical field of wireless network communications, for example, to a method, apparatus, device, and storage medium for positioning optimization of a wireless sensor network.
背景技术Background technique
无线传感器网络在军事和民用领域有着广泛的应用,传感器节点的位置信息对于环境监测和目标节点的跟踪非常重要。虽然可以通过全球定位系统(Global PositioningSystem,GPS)提供传感器节点的位置信息,但是GPS的性能对环境非常敏感,对于低成本的传感器节点来说成本过高。因此,在某些应用中,系统通过锚点目标节点之间的无线传输对目标节点进行定位,例如基于接收信号强度(Received Signal Strength,RSS)、到达时间(Time Of Arrival,ToA)、到达时差(基于目标辐射源)和到达角(Angle of Arrival,AoA)等。Wireless sensor networks have a wide range of applications in military and civilian fields, and the location information of sensor nodes is very important for environmental monitoring and target node tracking. Although the location information of sensor nodes can be provided through a Global Positioning System (Global Positioning System, GPS), the performance of GPS is very sensitive to the environment, and the cost is too high for low-cost sensor nodes. Therefore, in some applications, the system locates the target node through wireless transmission between anchor target nodes, such as based on Received Signal Strength (RSS), Time Of Arrival (ToA), time difference of arrival (based on target radiation source) and angle of arrival (Angle of Arrival, AoA), etc.
无线系统的安全是一个重要问题,而无线系统中的开放性造成的安全漏洞、传感器定位方案的分布式特性以及可能存在多个攻击者(尤其是协同攻击者),使得在无线传感器网络中保证定位方案的安全性具有一定的挑战性。针对定位方案的攻击防御方案往往会引入较高的通信开销,其安全性依赖于攻击者的能力。而传统方案的高通信开销导致了以下限制,首先,所有传感器节点的电池寿命需要足够高;其次,各传感器节点的存储空间要足够大;第三,在移动传感器节点的情况下,时效性较差。此外,如果攻击者有足够的能量来发动更多的攻击,那么即使引入了较高的通信开销,也会导致传统方案失效。综上,相关技术中的无线传感器网络中保证定位安全的方案不能满足灵活性的需求。The security of wireless systems is an important issue, and the security loopholes caused by the openness of wireless systems, the distributed nature of sensor positioning schemes, and the possible existence of multiple attackers (especially coordinated attackers) make it impossible to guarantee wireless sensor networks. The security of the positioning scheme is challenging. The attack defense scheme for the positioning scheme often introduces high communication overhead, and its security depends on the attacker's ability. The high communication overhead of the traditional scheme leads to the following limitations. First, the battery life of all sensor nodes needs to be high enough; second, the storage space of each sensor node must be large enough; third, in the case of mobile sensor nodes, the timeliness is relatively high. Difference. In addition, if the attacker has enough energy to launch more attacks, even if a high communication overhead is introduced, the traditional scheme will fail. To sum up, the solutions for ensuring positioning security in the wireless sensor network in the related art cannot meet the requirement of flexibility.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供一种无线传感器网络的定位优化方法、装置、设备和存储介质,以优化无线传感器的定位优化方案,减少通信开销,提高灵活性。The embodiments of the present application provide a positioning optimization method, device, device, and storage medium for a wireless sensor network, so as to optimize the positioning optimization scheme of the wireless sensor, reduce communication overhead, and improve flexibility.
本申请实施例提供了一种无线传感器网络的定位优化方法,包括:An embodiment of the present application provides a method for optimizing the positioning of a wireless sensor network, including:
获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;obtaining the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determining the target distance between the anchor point and the target node;
根据设定误报概率上限值确定目标检测阈值;Determine the target detection threshold according to the set false alarm probability upper limit;
根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;determining a detection result of a ranging increase attack according to the first receiver noise, the second receiver noise, and the target detection threshold;
如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。If the detection result of the range increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded.
本申请实施例还提供了一种无线传感器网络的定位优化装置,包括:The embodiment of the present application also provides a positioning optimization device for a wireless sensor network, including:
信息获取模块,用于获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;The information acquisition module is used to acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the difference between the anchor point and the target node target distance;
检测阈值确定模块,用于根据设定误报概率上限值确定目标检测阈值;The detection threshold determination module is used to determine the target detection threshold according to the set false alarm probability upper limit value;
攻击检测模块,用于根据所述第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;an attack detection module, configured to determine the detection result of the ranging attack according to the first receiver noise, the second receiver noise and the target detection threshold;
定位模块,用于如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。A positioning module, configured to locate the target node according to the target distance if the detection result of the range increase attack is that there is no range increase attack; otherwise, discard the target distance.
本申请实施例还提供了一种设备,所述设备包括:The embodiment of the present application also provides a device, the device includes:
一个或多个处理器;one or more processors;
存储装置,用于存储一个或多个程序;a storage device for storing one or more programs;
当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如上所述的无线传感器网络的定位优化方法。When the one or more programs are executed by the one or more processors, the one or more processors implement the above-mentioned method for optimizing the positioning of the wireless sensor network.
本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如上所述的无线传感器网络的定位优化方法。Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, implements the above-mentioned method for positioning optimization of a wireless sensor network.
本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; the target detection threshold is determined according to the upper limit of the false alarm probability; the detection result of the ranging attack is determined according to the noise of the first receiver, the noise of the second receiver and the target detection threshold; If the detection result of the increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.
附图说明Description of drawings
图1为本申请实施例提供的一种无线传感器网络的定位优化方法的流程图;FIG. 1 is a flowchart of a method for positioning optimization of a wireless sensor network according to an embodiment of the present application;
图2为本申请实施例提供的一种无线传感器网络的定位优化方法的示意图;FIG. 2 is a schematic diagram of a positioning optimization method for a wireless sensor network provided by an embodiment of the present application;
图3为本申请实施例提供的一种相关技术的定位方法的示意图;3 is a schematic diagram of a related art positioning method provided by an embodiment of the present application;
图4为本申请实施例提供的一种测距增大攻击的示意图;FIG. 4 is a schematic diagram of a ranging attack provided by an embodiment of the present application;
图5为本申请实施例提供的一种测距增大攻击的定位示意图;FIG. 5 is a schematic diagram of the location of a range-enhancing attack provided by an embodiment of the present application;
图6为本申请实施例提供的一种双向定位示意图;6 is a schematic diagram of bidirectional positioning provided by an embodiment of the present application;
图7为本申请实施例提供的另一种无线传感器网络的定位优化方法的流程图;FIG. 7 is a flowchart of another wireless sensor network positioning optimization method provided by an embodiment of the present application;
图8为本申请实施例提供的一种无线传感器网络系统的示意图;FIG. 8 is a schematic diagram of a wireless sensor network system according to an embodiment of the present application;
图9为本申请实施例提供的一种实验和理论的对比示意图;Fig. 9 is a kind of comparative schematic diagram of experiment and theory provided by the embodiment of this application;
图10为本申请实施例提供的一种检测性能与测量次数的关系示意图;10 is a schematic diagram of the relationship between a detection performance and the number of measurements provided by an embodiment of the application;
图11为本申请实施例提供的一种通信开销与锚点数量的关系示意图;11 is a schematic diagram of the relationship between a communication overhead and the number of anchor points according to an embodiment of the present application;
图12为本申请实施例提供的一种通信开销与测量次数的关系示意图;12 is a schematic diagram of the relationship between a communication overhead and the number of measurements provided by an embodiment of the present application;
图13为本申请实施例提供的一种性能开销比与测量次数的关系示意图;13 is a schematic diagram of the relationship between a performance-overhead ratio and the number of measurements provided by an embodiment of the present application;
图14为本申请实施例提供的一种无线传感器网络的定位优化装置的结构示意图;FIG. 14 is a schematic structural diagram of an apparatus for positioning optimization of a wireless sensor network according to an embodiment of the present application;
图15为本申请实施例提供的一种设备的结构示意图。FIG. 15 is a schematic structural diagram of a device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面结合附图和实施例对本申请进行说明。此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。The present application will be described below with reference to the accompanying drawings and embodiments. The specific embodiments described herein are only used to explain the present application, but not to limit the present application. For convenience of description, the drawings only show some but not all structures related to the present application.
在讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各步骤描述成顺序的处理,但是其中的许多步骤可以被并行地、并发地或者同时实施。此外,各步骤的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。Before discussing the exemplary embodiments, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowchart depicts the steps as a sequential process, many of the steps may be performed in parallel, concurrently, or concurrently. Furthermore, the order of the steps can be rearranged. The process may be terminated when its operation is complete, but may also have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, subroutines, and the like.
图1为本申请实施例提供的一种无线传感器网络的定位优化方法的流程图,本实施例可适用于实现无线传感器的安全定位的情况,该方法可以由无线传感器网络的定位优化装置执行,该装置可以采用软件和/或硬件的方式实现,该装置可配置于电子设备中,例如服务器或终端设备。如图1所示,该方法可以包括:FIG. 1 is a flowchart of a method for positioning optimization of a wireless sensor network provided by an embodiment of the present application. This embodiment is applicable to the situation of realizing safe positioning of wireless sensors, and the method can be executed by a positioning optimization device of a wireless sensor network, The apparatus may be implemented in software and/or hardware, and the apparatus may be configured in an electronic device, such as a server or a terminal device. As shown in Figure 1, the method may include:
S110、获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离。S110. Acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the target distance between the anchor point and the target node.
其中,目标节点和锚点是指无线传感器网络中的传感器节点,锚点用于确定目标节点的位置,本实施例中假设锚点的位置在任何时间和地点都可以通过GPS系统或其他方式预先确定。挑战信号为锚点发送给目标节点的信号,响应信号为目标节点接收到挑战信号之后返回给锚点的信号。第一接收机噪声为目标节点接收挑战信号时提取的接收机噪声,第二接收机噪声为锚点接收响应信号时提取的接收机噪声。Among them, the target node and the anchor point refer to the sensor node in the wireless sensor network, and the anchor point is used to determine the position of the target node. In this embodiment, it is assumed that the position of the anchor point can be pre-determined by the GPS system or other methods at any time and place. Sure. The challenge signal is the signal sent by the anchor to the target node, and the response signal is the signal returned by the target node to the anchor after receiving the challenge signal. The first receiver noise is the receiver noise extracted when the target node receives the challenge signal, and the second receiver noise is the receiver noise extracted when the anchor point receives the response signal.
本实施例中,锚点可以发送一个挑战信号给目标节点,目标节点接收到挑战信号之后,提取此时的第一接收机噪声;目标节点根据第一接收机噪声和挑战信号生成响应信号,并发送响应信号给锚点;锚点接收到响应信号之后,可以提取第二接收机噪声。锚点接收到响应信号之后,可以记录时间间隔,并根据该时间间隔确定锚点和目标节点之间的目标距离,即实现测距。或者,无线传感器网络的定位优化装置也可以获取锚点记录的时间间隔,进而确定锚点和目标节点之间的目标距离,即实现测距。In this embodiment, the anchor point can send a challenge signal to the target node, and after the target node receives the challenge signal, it extracts the first receiver noise at this time; the target node generates a response signal according to the first receiver noise and the challenge signal, and The response signal is sent to the anchor; after the anchor receives the response signal, the second receiver noise can be extracted. After the anchor point receives the response signal, the time interval can be recorded, and the target distance between the anchor point and the target node can be determined according to the time interval, that is, the ranging is realized. Alternatively, the positioning optimization device of the wireless sensor network can also obtain the time interval recorded by the anchor point, and then determine the target distance between the anchor point and the target node, that is, to achieve ranging.
示例性的,参见图2,图2为本申请实施例提供的一种无线传感器网络的定位优化方法的示意图。图2中锚点A发送一个挑战信号给目标节点S,目标节点S在时间t1接收到的挑战信号D,估计第一接收机噪声目标节点S生成响应信号,并将响应信号返回给锚点A;锚点A在t2接收到响应信号,记录时间间隔为τAS=t2-t1,以备后续进行定位,并估计第二接收机噪声 2 is a schematic diagram of a method for positioning optimization of a wireless sensor network according to an embodiment of the present application. In Figure 2, the anchor point A sends a challenge signal to the target node S, and the target node S receives the challenge signal D at time t1 , and estimates the first receiver noise The target node S generates a response signal and returns the response signal to the anchor point A; the anchor point A receives the response signal at t 2 , and the recording time interval is τ AS =t 2 -t 1 for subsequent positioning and estimation of the first Two receiver noise
传统方案中,是通过连续测量多个到达时间并存储中值来估计锚点与目标节点之间的距离,提出了一种安全定位方案,如图3所示。图3为本申请实施例提供的一种相关技术的定位方法的示意图,假设密钥K在所有的锚节点和目标节点之间共享,并使用消息完整性代码技术来保证安全性,MIC对信息M进行加密用gK(M),g(·)表示哈希函数和K是密钥,外部攻击者可能知道的g(·)细节,但不知道密钥K,作用有两方面:一是确定M来源,二是要保证M完整来防御篡改攻击。In the traditional scheme, the distance between the anchor point and the target node is estimated by continuously measuring multiple arrival times and storing the median value. A secure positioning scheme is proposed, as shown in Figure 3. 3 is a schematic diagram of a positioning method of a related art provided by an embodiment of the present application. It is assumed that the key K is shared between all anchor nodes and the target node, and the message integrity code technology is used to ensure security. M is encrypted with g K (M), g( ) represents the hash function and K is the key, external attackers may know the details of g( ), but do not know the key K, which has two functions: one is To determine the source of M, the second is to ensure the integrity of M to prevent tampering attacks.
传统方案要求L次测量,每次测量由三个无线传输组成即L≥3,如图3所示。在每次测量中,首先锚点A发送由l-bit随机数D组成的挑战信号给目标节点S;目标节点S在时间t1接收到挑战信号,然后提取随机数D,目标节点S发送2l-bit的D||B的响应信号给锚点A,锚点A在时间t2接收到响应信号,||表示消息连接操作符,B也是一个l-bit的随机数;然后锚点A将流逝时间记录为τAS=t2-t1并计算了双向ToA的tAS。与此同时,锚点A从接收到的响应信号中提取D||B,并计算v=gK(D||B)的值;目标节点S发送MIC信号gK(D||B)给锚点A。The traditional scheme requires L measurements, each measurement consists of three wireless transmissions, that is, L≥3, as shown in Figure 3. In each measurement, first the anchor point A sends a challenge signal consisting of an l-bit random number D to the target node S; the target node S receives the challenge signal at time t1 , and then extracts the random number D, and the target node S sends 2l The response signal of -bit D||B is sent to anchor point A, anchor point A receives the response signal at time t 2 , || represents the message connection operator, and B is also an l-bit random number; then anchor point A will The elapsed time was recorded as τ AS = t 2 -t 1 and t AS for the bidirectional ToA was calculated. At the same time, the anchor point A extracts D||B from the received response signal, and calculates the value of v=g K (D||B); the target node S sends the MIC signal g K (D||B) to the Anchor point A.
传统方案通过两个连续的步骤检测距离减少和测距增大攻击,在第一步中,如果接收到的MIC与v的值相同,距离缩小攻击的检测已经通过;在第二步中,在连续测量多个ToA后,先验方案以测量次数的中位数作为最终测量值,以抵御测距增大攻击。传统方案对测距增大攻击的抵抗依赖于发起攻击的次数M,如果M≤(L-1)/2,才能成功侦测到测距增大攻击;否则,其安全性就无法得到保证。虽然两种类型的攻击都通过了检测,锚点A可以接受tAS作为合法的ToA,并将其存储为有用的定位信息,以获取目标节点的实际位置。对于一个包括NA个锚点的无线传感器网络,传统方案的通信开销为3LNA,数字3表示每次测量包含三个无线传输,L表示测量次数,因此当NA或L增加时,传统方案的通信开销增加。并且传统方案中对测距增大攻击检测的灵活性较低,不考虑实际情况的变化,简单根据每次测量地MIC与v比较后确定是否保留测量结果,之后取多次测量结果的中位数作为最终结果。基于上述技术问题,本实施例中考虑到当外部攻击者转发质询信号时,不可避免地会引入额外的接收机噪声,通过该接收机噪声进行安全定位前的攻击检测,基于攻击检测结果进行目标节点的安全定位,以减小通信开销,提高灵活性。The traditional scheme detects range reduction and range increase attacks in two consecutive steps. In the first step, if the received MIC is the same as the value of v, the detection of the range reduction attack has passed; in the second step, in the After continuous measurement of multiple ToAs, the prior scheme uses the median of the measurement times as the final measurement value to resist range-enhancing attacks. The resistance of the traditional scheme to the range increase attack depends on the number of attacks M. If M≤(L-1)/2, the range increase attack can be successfully detected; otherwise, its security cannot be guaranteed. While both types of attacks pass the detection, anchor A can accept t AS as a legitimate ToA and store it as useful positioning information to obtain the actual location of the target node. For a wireless sensor network including N A anchor points, the communication overhead of the traditional scheme is 3L N A , the
S120、根据设定误报概率上限值确定目标检测阈值。S120. Determine the target detection threshold according to the upper limit value of the set false alarm probability.
其中,假设H0表示不存在测距增大攻击的情况,H1表示存在测距增大攻击的情况,接受假设H1当H0为真时称为误报概率(PFA),即Pfa=P{H1|H0}。设定误报概率上限值为当存在信道估计误差时,用户根据当前实际需求以及实际情况预先设定的误报概率的上限值,可以基于用户选择进行灵活改变。目标检测阈值用于检测测距增大攻击的一个阈值,目标检测阈值与设定误报概率上限值之间存在关联关系,可以基于设定误报概率上限值确定该目标检测阈值。因此,当设定误报概率上限值可以根据实际情况灵活设置时,目标检测阈值也灵活变化。Among them, it is assumed that H 0 indicates that there is no ranging attack, and H 1 indicates that there is a ranging attack. Accepting the assumption H 1 when H 0 is true is called the probability of false alarm (PFA), that is, P fa =P{H 1 |H 0 }. The upper limit value of the false alarm probability is set as the upper limit value of the false alarm probability preset by the user according to the current actual demand and the actual situation when there is a channel estimation error, which can be flexibly changed based on the user's choice. The target detection threshold is a threshold used to detect range-enhancing attacks. There is a correlation between the target detection threshold and the upper limit of the false alarm probability. The target detection threshold can be determined based on the upper limit of the false alarm probability. Therefore, when the upper limit of the false alarm probability can be set flexibly according to the actual situation, the target detection threshold can also be flexibly changed.
本实施例中,确定目标检测阈值时考虑两种情况,一种是存在信道估计误差的情况,一种是不存在信道估计误差的情况。In this embodiment, two situations are considered when determining the target detection threshold, one is a situation where there is a channel estimation error, and the other is a situation where there is no channel estimation error.
根据设定误报概率上限值确定目标检测阈值,可以包括:根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值。一实施例中,检测阈值表达式为:其中,Pfa表示误报概率,θ表示目标检测阈值,表示响应信号或挑战信号的方差,表示信道估计误差的方差。Determining the target detection threshold according to the set false alarm probability upper limit value may include: determining the target detection threshold value according to the set false alarm probability upper limit value and a predetermined detection threshold expression. In one embodiment, the detection threshold expression is: Among them, P fa represents the probability of false positives, θ represents the target detection threshold, represents the variance of the response signal or challenge signal, Represents the variance of the channel estimation error.
目标检测阈值基于误报概率表达式可以确定,误报概率表达式为:其中,Pfa表示误报概率,θ表示目标检测阈值,H1表示存在测距增大攻击的情况,H0表示无测距增大攻击的情况,表示响应信号或挑战信号的方差,表示信道估计误差的方差。The target detection threshold can be determined based on the false positive probability expression, and the false positive probability expression is: Among them, P fa represents the probability of false positives, θ represents the target detection threshold, H 1 represents the presence of a ranging attack, H 0 represents no ranging attack, represents the variance of the response signal or challenge signal, Represents the variance of the channel estimation error.
当存在信道估计误差的情况下,假设挑战信号和响应信号的传输功率相同,即所有的锚点和目标节点都有相同的接收机噪声,即但是,恶意节点的传输功率和接收噪声不同,增加了硬件成本,恶意节点的传输功率由GE确定,nE的噪声方差为其中β表示恶意节点的硬件性能,β=1表示恶意节点的硬件性能与锚节点和目标节点相似;β<1表示恶意节点硬件性能较好,但硬件成本较高;β>1表示恶意节点的硬件性能较差,但硬件成本较低。基于S110中第一接收机噪声和第二接收机噪声的表达式,将信道估计误差的方差表示为和其中α表示所采用的信道估计算法的性能,信道估计误差由采用的信道估计算法和接收机噪声共同决定。When there is a channel estimation error, it is assumed that the transmission power of the challenge signal and the response signal are the same, i.e. All anchor and target nodes have the same receiver noise, i.e. However, the transmission power of the malicious node is different from the received noise, which increases the hardware cost. The transmission power of the malicious node is determined by G E , and the noise variance of n E is Among them, β represents the hardware performance of the malicious node, β=1 indicates that the hardware performance of the malicious node is similar to that of the anchor node and the target node; β<1 indicates that the hardware performance of the malicious node is better, but the hardware cost is high; The hardware performance is poor, but the hardware cost is lower. Based on the expressions of the first receiver noise and the second receiver noise in S110, the variance of the channel estimation error is expressed as and Among them, α represents the performance of the adopted channel estimation algorithm, and the channel estimation error is jointly determined by the adopted channel estimation algorithm and the receiver noise.
基于误报概率表达式可以确定目标检测阈值确定响应信号或挑战信号的方差、信道估计误差的方差以及设定误报概率上限值之后,代入上述公式,即可确定目标检测阈值。The target detection threshold can be determined based on the false positive probability expression After determining the variance of the response signal or the challenge signal, the variance of the channel estimation error, and setting the upper limit of the false alarm probability, the target detection threshold can be determined by substituting the above formula.
可选的,根据设定误报概率上限值确定目标检测阈值,可以包括:当不存在信道估计误差的情况下,设定误报概率上限值和目标检测阈值均为零。如果忽略所有的信道估计误差,则误报概率Pfa=P{H1|H0}=0,则目标检测阈值θ=0。Optionally, determining the target detection threshold according to the set false alarm probability upper limit value may include: setting both the false alarm probability upper limit value and the target detection threshold value to zero when there is no channel estimation error. If all channel estimation errors are ignored, the false alarm probability P fa =P{H 1 |H 0 }=0, and the target detection threshold θ=0.
此外,当存在信道估计误差的情况下,根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值之后,还包括:根据目标检测阈值、误报概率表达式和检测概率表达式,确定检测概率,以根据检测概率对目标检测阈值进行验证。In addition, when there is a channel estimation error, after determining the target detection threshold according to the upper limit value of the false alarm probability and the predetermined detection threshold expression, it also includes: according to the target detection threshold, the false alarm probability expression and the detection threshold A probability expression that determines the detection probability to validate the target detection threshold based on the detection probability.
接受假设H1当H1为真时称为检测概率(PD),即Pd=P{H1|H1}。通过奈曼一皮尔逊定理计算可以确定检测概率的最优阈值。检测概率表达式可以为Accepting the hypothesis H 1 when H 1 is true is called the probability of detection (PD), ie P d =P{H 1 |H 1 }. The optimal threshold of detection probability can be determined by the calculation of the Neyman-Pearson theorem. The detection probability expression can be expressed as
根据目标检测阈值、误报概率表达式和检测概率表达式确定检测概率之后,根据检测概率与检测概率最优阈值,可以验证当前的目标检测阈值的性能较好,即确定当前的环境合适本实施例中采用的方法。After the detection probability is determined according to the target detection threshold, the false alarm probability expression and the detection probability expression, according to the detection probability and the optimal detection probability threshold, it can be verified that the performance of the current target detection threshold is better, that is, it is determined that the current environment is suitable for this implementation. method used in the example.
S130、根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果。S130. Determine the detection result of the ranging attack according to the noise of the first receiver, the noise of the second receiver, and the target detection threshold.
本实施例中采用的定位方法为双向到达时间(Time Of Arrival,ToA)算法,而在双向ToA技术中,存在距离缩小攻击和测距增大攻击两个漏洞,本实施例中针对的是测距增大攻击。两个恶意节点协同发起攻击,如图4所示,图4为本申请实施例提供的一种测距增大攻击的示意图。图5展示了攻击的效果,图5为本申请实施例提供的一种测距增大攻击的定位示意图。在图4和图5中,S1是目标节点的实际位置,是目标节点的估计位置,A1表示锚点,E1和E2表示恶意节点,恶意节点的目的是破坏定位过程或降低定位精度。The positioning method used in this embodiment is the two-way Time Of Arrival (ToA) algorithm, and in the two-way ToA technology, there are two loopholes: distance reduction attack and range increase attack. Range increases attack. Two malicious nodes cooperate to launch an attack, as shown in FIG. 4 . FIG. 4 is a schematic diagram of a ranging attack provided by an embodiment of the present application. FIG. 5 shows the effect of the attack, and FIG. 5 is a schematic diagram of the location of a range-enhancing attack provided by an embodiment of the present application. In Figures 4 and 5, S1 is the actual position of the target node, is the estimated location of the target node, A 1 represents the anchor point, E 1 and E 2 represent malicious nodes, and the purpose of malicious nodes is to disrupt the localization process or reduce the localization accuracy.
在测距增大攻击中,如图4所示,E2在两个阶段有不同的作用。在第一阶段,当A1发送挑战信号E2发射干扰信号S1,然后E1收到表示为在第二阶段,E2保持沉默和E1直接发送给S1,附带增益GE,接收信号在S1表示为 是来自E1到S1的信道响应。然后S1发送响应信号给A1。因此A1接收响应信号需要更长的时间,A1与无攻击时相比,将获得更长的双向ToA值。因此A1得到距离增大的估计值,如图5所示。最后,估计了S1的错误位置。In the range augmentation attack, as shown in Figure 4, E2 has different roles in two stages. In the first stage, when A1 sends a challenge signal E 2 transmits interfering signal S 1 , which is then received by E 1 Expressed as In the second stage, E2 keeps silent and E1 sends directly Given S 1 , with gain G E , the received signal at S 1 is expressed as is the channel response from E1 to S1 . Then S1 sends a response signal give A 1 . Therefore, it takes a longer time for A 1 to receive the response signal, and A 1 will obtain a longer bidirectional ToA value than when there is no attack. Therefore A1 gets an estimate of the increase in distance, as shown in Figure 5. Finally, the error location of S1 is estimated.
根据第一接收机噪声、第二接收机噪声以及目标检测阈值确定测距增大攻击的检测结果,可以包括:确定第二接收机噪声方差和第一接收机噪声方差的方差差值;根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果。一实施例中,根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果,包括:如果方差差值小于或等于目标检测阈值,则测距增大攻击的检测结果为不存在测距增大攻击;否则,测距增大攻击的检测结果为存在测距增大攻击。Determining the detection result of the ranging attack according to the first receiver noise, the second receiver noise, and the target detection threshold may include: determining a variance difference between the noise variance of the second receiver and the noise variance of the first receiver; The comparison result of the difference value and the target detection threshold value determines the detection result of the range-enhancing attack. In one embodiment, determining the detection result of the ranging attack according to the comparison result of the variance difference and the target detection threshold, including: if the variance difference is less than or equal to the target detection threshold, then determining the detection result of the ranging attack It means that there is no ranging attack; otherwise, the detection result of the ranging attack is that there is a ranging attack.
本实施例中,假设H0表示不存在测距增大攻击的情况,H1表示存在测距增大攻击的情况。目标节点S接收到的挑战信号在H0和H1时分别表示为和在H0时,目标节点S通过信道估计算法和恢复消息获得估计的信道响应因为恢复的错误可以通过调制和信道编码来纠正,本实施例中假设消息可以完全恢复,即目标节点S提取接收机噪声为目标节点S计算它的方差在H1时,目标节点S得到信道响应为提取的接收机噪声为目标节点S计算它的方差之后,由于本实施例中以假设锚点A发送挑战信号给目标节点S时有攻击,而目标节点S返回响应信号时无攻击,因此锚点A得到信道响应为提取的接收机噪声为锚点A计算它的方差 In this embodiment, it is assumed that H 0 indicates that there is no ranging attack, and H 1 indicates that there is a ranging attack. The challenge signal received by the target node S is expressed as H 0 and H 1 , respectively and At H 0 , the target node S recovers the message through the channel estimation algorithm and Get the estimated channel response Since the recovered error can be corrected by modulation and channel coding, it is assumed in this embodiment that the message can be completely recovered, i.e. The target node S extracts the receiver noise as The target node S computes its variance At H1 , the target node S gets the channel response as The extracted receiver noise is The target node S computes its variance After that, since it is assumed in this embodiment that there is an attack when the anchor point A sends the challenge signal to the target node S, and the target node S has no attack when it returns the response signal, the channel response obtained by the anchor point A is: The extracted receiver noise is Anchor A calculates its variance
方差差值可以为 表示绝对值运算符。当存在信道估计误差的情况下,在H0和H1分别重写为和其中 和基于引理1,误报概率根据奈曼-皮尔逊定理,通过设置最大值来计算误报概率的最大阈值,本实施例中通过ε表示该误报概率的最大阈值,Pfa≤ε。根据引理2,可以得到检测概率的表达式。当不存在信道估计误差的情况下,在H0和H1分别重写为和由于|hES|2是参数为指数分布的随机变量。即因此目标检测阈值设为θ=0。因此Pfa=P{δ>θ°|H0}=0和 The variance difference can be Represents an absolute value operator. When there is a channel estimation error, H 0 and H 1 are rewritten as and in and Based on
当δ≤θ,则可以确定测距增大攻击的检测结果为不存在测距增大攻击,否则,测距增大攻击的检测结果为存在测距增大攻击。其中θ表示目标检测阈值。When δ≤θ, it can be determined that the detection result of the ranging attack is that there is no ranging attack; otherwise, the detection result of the ranging attack is that there is a ranging attack. where θ represents the target detection threshold.
本实施例中,每次测量包括两个无线传输,通过适当地增加了挑战信号的最后一位到达目标节点的天线后直到第一比特的响应信号从目标节点的天线发射的持续时间的值,得到一个较大的常数,该常数足够大,可以完成所有的操作;并且本实施例中的攻击检测方法只需要一次测量。针对一个无线传感器网络,通信开销为2NA,其中NA为无线传感器网络中的锚点数量。因此,与传统方案相比,本方案节省了通信开销,特别是在大规模无线传感器网络或强大的外部攻击者的情况下。并且,当存在信道估计误差时,设定误报概率上限值可以根据实际情况灵活设置,目标检测阈值也灵活变化,在节省通信开销的基础上提高了灵活性。In this embodiment, each measurement includes two wireless transmissions, by appropriately increasing the value of the duration after the last bit of the challenge signal reaches the antenna of the target node until the first bit of the response signal is transmitted from the antenna of the target node, A large constant is obtained, which is large enough to complete all operations; and the attack detection method in this embodiment only needs one measurement. For a wireless sensor network, the communication overhead is 2NA , where NA is the number of anchor points in the wireless sensor network. Therefore, compared with traditional schemes, the present scheme saves communication overhead, especially in the case of large-scale wireless sensor networks or powerful external attackers. Moreover, when there is a channel estimation error, the upper limit of the false alarm probability can be set flexibly according to the actual situation, and the target detection threshold can also be changed flexibly, which improves flexibility on the basis of saving communication overhead.
本实施例中在确定测距增大攻击的检测结果的同时,还可以通过引入接收机噪声方差进行距离缩小攻击的检测,得到距离缩小攻击的检测结果。In this embodiment, while determining the detection result of the range increase attack, the detection result of the range reduction attack can also be obtained by introducing the receiver noise variance to detect the range reduction attack.
S140、如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。S140. If the detection result of the range increase attack is that there is no range increase attack, locate the target node according to the target distance; otherwise, discard the target distance.
如果当前仅考虑测距增大攻击时,则可以仅根据测距增大攻击的检测结果对目标节点进行定位。即如果攻击检测结果为不存在测距增大攻击,则根据目标距离采用双向到时间到达算法对目标节点进行定位;如果攻击检测结果为存在测距增大攻击,则将目标距离丢弃。将目标距离丢弃之后,需要对无线传感器网络进行攻击恶意节点的排查以消除测距增大攻击,直到攻击检测结果为不存在测距增大攻击时再对目标节点进行定位。If only the range-increasing attack is currently considered, the target node can be located only according to the detection result of the range-increasing attack. That is, if the attack detection result is that there is no ranging attack, the two-way arrival time algorithm is used to locate the target node according to the target distance; if the attack detection result is that there is a ranging attack, the target distance is discarded. After discarding the target distance, it is necessary to check the malicious nodes attacking the wireless sensor network to eliminate the range increase attack, and then locate the target node until the attack detection result is that there is no range increase attack.
如果当前需要同时考虑测距增大攻击和距离缩小攻击时,则根据目标距离对目标节点进行定位之前,还可以包括:确定测距缩小攻击的检测结果;相应的,如果测距增大攻击的检测结果为不存在测距增大攻击以及测距缩小攻击的检测结果为不存在测距缩小攻击时,执行根据目标距离对目标节点进行定位;否则,将目标距离丢弃。如果攻击检测结果为存在距离缩小攻击或者存在测距增大攻击,则需要对无线传感器网络进行攻击恶意节点的排查以消除攻击,直到攻击检测结果为不存在距离缩小攻击和增大攻击时再对目标节点进行定位。If it is currently necessary to consider both the range-increasing attack and the range-reducing attack, before locating the target node according to the target distance, it may also include: determining the detection result of the range-reducing attack; correspondingly, if the range-increasing attack is When the detection result is that there is no range increase attack and the detection result of the range reduction attack is that there is no range reduction attack, the target node is located according to the target distance; otherwise, the target distance is discarded. If the attack detection result is that there is a range reduction attack or a range increase attack, it is necessary to check the malicious nodes that attack the wireless sensor network to eliminate the attack, until the attack detection result is that there is no distance reduction attack or increase attack. target node for positioning.
双向到达时间算法是一种在无线传感器网络中定位传感器节点的算法。无线传感器网络中可以包括三种类型的传感器节点:锚点、目标节点和恶意节点。锚点的作用是确定目标节点的位置,而恶意节点的目的是破坏定位过程或降低定位精度。为了确定目标节点的二维位置,锚点的数量应该大于3个。而锚点越多,对应的定位精度越高,但同时增加了通信开销,因此锚点的数量可以根据实际情况进行设定。The two-way time of arrival algorithm is an algorithm for locating sensor nodes in wireless sensor networks. Three types of sensor nodes can be included in a wireless sensor network: anchors, target nodes and malicious nodes. The role of the anchor point is to determine the location of the target node, while the purpose of the malicious node is to disrupt the localization process or reduce the localization accuracy. In order to determine the 2D position of the target node, the number of anchor points should be greater than 3. The more anchor points, the higher the corresponding positioning accuracy, but at the same time increase the communication overhead, so the number of anchor points can be set according to the actual situation.
在无线传感器网络中,所有的传感器节点随机部署在一个平面上,目标节点的定位过程通常在网络初始化阶段完成。假设有NA个锚点,表示为NS个目标节点,表示为和NE个恶意节点,表示为其中NA≥3。假设NA=3,NS=1和NE=2,A1在时间t1首先发送一个挑战信号给S1。S1收到的信号表示为其中和分别是A1到S1的信道响应和S1提取的接收端噪声,假设所有的信道响应都建模为零均值复高斯随机变量(RVs),即其中和d是发射机和接收机之间的距离,λ=c/fc是发射信号的波长,c是光速,fc是发射信号的载波频率。Gt和Gr分别是发射天线增益和接收天线增益。假设接收机噪声也被建模为零均值复高斯随机变量,如 是基于硬件的。接收到的信噪比(Signal Noise Ratio,SNR)表示为其中Pt表示传输功率。In wireless sensor networks, all sensor nodes are randomly deployed on a plane, and the localization process of the target node is usually completed in the network initialization phase. Suppose there are N A anchors, denoted as N S target nodes, denoted as and N E malicious nodes, denoted as where N A ≥ 3. Assuming
S1发送响应信号给A1,接收信号在A1表示为其中hS1A1和分别是S1到A1的信道响应和A1的噪声,最后A1计算双向ToA, 表示从挑战信号的最后一位发送到A1响应信号完全解码的时间;表示响应信号的最后一位到达A1天线后直到响应信号被A1完全解码的持续时间;表示挑战信号的最后一位到达S1天线后直到第一比特的响应信号从S1天线发射的持续时间;ttran表示传输时间。和是基于设备的,在定位过程中是常数,可以预先确定和预加载到A1用于校准时间测量到一定的精度。ttran=2l/b,l是发射信号的长度和b为无线传感器网络的带宽。S 1 sends a response signal Given A 1 , the received signal at A 1 is represented as where h S1A1 and are the channel response of S 1 to A 1 and the noise of A 1 , respectively, and finally A 1 calculates the bidirectional ToA, Indicates the time from the transmission of the last bit of the challenge signal to the complete decoding of the A1 response signal; Indicates the duration from when the last bit of the response signal reaches the A1 antenna until the response signal is fully decoded by A1 ; Represents the duration of the last bit of the challenge signal reaching the S1 antenna until the first bit of the response signal is transmitted from the S1 antenna; t tran represents the transmission time. and is device-based, constant during positioning, and can be pre-determined and preloaded into A1 for calibrating time measurements to a certain accuracy. t tran = 2l/b, l is the length of the transmitted signal and b is the bandwidth of the wireless sensor network.
图6为本申请实施例提供的一种双向定位示意图。估计A1和S1两者之间的距离为同样,其他的锚点也可以估计到的距离S1。表示Aj和Sj的二维位置为和在不失一般性的前提下,假定第一个锚点A1作为领导者从其他锚点收集所有定位信息。基于三个锚点的定位信息,A1建立下列方程,通过该方程,得到其位置为三个圆形成的交点,如图6所示。FIG. 6 is a schematic diagram of bidirectional positioning according to an embodiment of the present application. The estimated distance between A 1 and S 1 is Similarly, other anchor points can also estimate the distance S 1 . Representing the two-dimensional positions of A j and S j as and Without loss of generality, it is assumed that the first anchor A1 acts as the leader to collect all positioning information from other anchors. Based on the positioning information of the three anchor points, A1 establishes the following equation, Through this equation, the position of the intersection formed by the three circles is obtained, as shown in Figure 6.
本实施例提供的无线传感器网络的定位优化方法,具有以下优势:可以根据实际环境抵御测距增大攻击,灵活性强;适应性强,因为本方案保证了传感器节点在苛刻条件下的安全性,如传感器节点的电池寿命有限、传感器节点的存储空间有限以及传感器节点的移动性高等;无论外部攻击者发起多少次攻击,都不会影响所提方案的安全性。The positioning optimization method for a wireless sensor network provided in this embodiment has the following advantages: it can resist ranging attack according to the actual environment, and has strong flexibility; it has strong adaptability, because this solution ensures the security of sensor nodes under harsh conditions , such as the limited battery life of sensor nodes, the limited storage space of sensor nodes, and the high mobility of sensor nodes; no matter how many attacks are launched by external attackers, the security of the proposed scheme will not be affected.
本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; the target detection threshold is determined according to the upper limit of the false alarm probability; the detection result of the ranging attack is determined according to the noise of the first receiver, the noise of the second receiver and the target detection threshold; If the detection result of the increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.
在一些实施例中,上述引理1可以为:如果X和Y是参数是的独立同分布指数随机变量,即|X-Y|的概率密度函数(Probability Density Function,PDF)为x>0,|X-Y|的累积分布函数(Cumulative DistributionFunction,CDF)为x>0。证明过程可以根据相关技术进行证明,在此不进行说明。In some embodiments, the
在一些实施例中,上述引理2可以为:如果X、Y和Z是具有不同参数 和的独立分布指数型随机变量,即和 In some embodiments, the
则|X-Y-Z|的PDF为 Then the PDF of |XYZ| is
|X-Y-Z|的CDF为 The CDF of |XYZ| is
证明过程可以根据相关技术进行证明,在此不进行说明。The certification process can be certified according to related technologies, which will not be described here.
图7为本申请实施例提供的另一种无线传感器网络的定位优化方法的流程图。本实施例在上述实施例的基础上,优化了上述无线传感器网络的定位优化方法。相应的,本实施例的方法包括:FIG. 7 is a flowchart of another method for positioning optimization of a wireless sensor network according to an embodiment of the present application. This embodiment optimizes the above-mentioned positioning optimization method of the wireless sensor network on the basis of the above-mentioned embodiment. Correspondingly, the method of this embodiment includes:
S210、获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离。S210: Acquire the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the target distance between the anchor point and the target node.
S220、根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值。S220: Determine the target detection threshold according to the set false alarm probability upper limit value and the predetermined detection threshold expression.
本实施例中,确定目标检测阈值时考虑两种情况,一种是存在信道估计误差的情况,一种是不存在信道估计误差的情况。即,目标检测阈值包括存在信道估计误差和不存在信道估计误差两种情况下的检测阈值。In this embodiment, two situations are considered when determining the target detection threshold, one is a situation where there is a channel estimation error, and the other is a situation where there is no channel estimation error. That is, the target detection threshold includes detection thresholds in the presence of channel estimation errors and in the absence of channel estimation errors.
检测阈值表达式为:其中,Pfa表示误报概率,θ表示目标检测阈值,表示响应信号或挑战信号的方差,表示信道估计误差的方差。The detection threshold expression is: Among them, P fa represents the probability of false positives, θ represents the target detection threshold, represents the variance of the response signal or challenge signal, Represents the variance of the channel estimation error.
根据当前的实际情况确定是否需要考虑信道估计误差,存在信道估计误差时,设定误报概率上限值可以根据实际情况灵活设置,目标检测阈值也灵活变化,在节省通信开销的基础上提高了灵活性;当不存在信道估计误差的情况下,误报概率和目标检测阈值均为零。Determine whether the channel estimation error needs to be considered according to the current actual situation. When there is a channel estimation error, the upper limit of the false alarm probability can be set flexibly according to the actual situation, and the target detection threshold can also be changed flexibly, which improves the communication cost on the basis of saving. Flexibility; when there is no channel estimation error, the false alarm probability and target detection threshold are both zero.
可选的,本实施例中在确定目标检测阈值之后,还可以包括:根据目标检测阈值、误报概率表达式和检测概率表达式,确定检测概率,以根据检测概率对目标检测阈值进行验证。Optionally, after determining the target detection threshold in this embodiment, the method may further include: determining the detection probability according to the target detection threshold, the false alarm probability expression and the detection probability expression, so as to verify the target detection threshold according to the detection probability.
根据目标检测阈值、误报概率表达式和检测概率表达式确定检测概率之后,根据检测概率与检测概率最优阈值,可以验证当前的目标检测阈值的性能较好,即确定当前的环境合适本实施例中采用的方法。检测概率表达式可以为After the detection probability is determined according to the target detection threshold, the false alarm probability expression and the detection probability expression, according to the detection probability and the optimal detection probability threshold, it can be verified that the performance of the current target detection threshold is better, that is, it is determined that the current environment is suitable for this implementation. method used in the example. The detection probability expression can be expressed as
S230、确定第二接收机噪声方差和第一接收机噪声方差的方差差值。S230. Determine the variance difference between the noise variance of the second receiver and the noise variance of the first receiver.
S240、根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果。S240. Determine the detection result of the range-enhancing attack according to the comparison result between the variance difference and the target detection threshold.
根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果,可以包括:如果方差差值小于或等于目标检测阈值,则测距增大攻击的检测结果为不存在测距增大攻击;否则,测距增大攻击的检测结果为存在测距增大攻击。According to the comparison result between the variance difference and the target detection threshold, determining the detection result of the range-enhancing attack may include: if the variance difference is less than or equal to the target detection threshold, the detection result of the range-enhancing attack is that there is no detection. Range augmentation attack; otherwise, the detection result of range augmentation attack is that range augmentation attack exists.
S250、测距增大攻击的检测结果是否为不存在测距增大攻击,若是,则执行S260;否则执行S280。S250. Whether the detection result of the range increase attack is that there is no range increase attack, if so, execute S260; otherwise, execute S280.
S260、测距缩小攻击的检测结果是否为不存在测距缩小攻击,若是,则执行S270;否则执行S280。S260. Whether the detection result of the ranging narrowing attack is that there is no ranging narrowing attack, if so, perform S270; otherwise, perform S280.
本实施例中,测距缩小攻击的检测可以采用相关技术中的方式实现,在此不作限定,可以检测测距缩小攻击的方式均可适用。In this embodiment, the detection of the range reduction attack may be implemented in a manner in the related art, which is not limited here, and any methods that can detect the range reduction attack are applicable.
S270、根据目标距离对目标节点进行定位。S270, locating the target node according to the target distance.
可以根据目标距离采用双向到达时间算法对目标节点进行定位。定位方式如上所述,在此不进行赘述。The two-way time-of-arrival algorithm can be used to locate the target node according to the target distance. The positioning method is as described above and will not be repeated here.
S280、将目标距离丢弃。S280. Discard the target distance.
将目标距离丢弃之后,可以对无线传感器网络进行攻击恶意节点的排查以消除攻击,直到攻击检测结果为不存在测距缩小攻击和测距增大攻击时再对目标节点进行定位。After discarding the target distance, the wireless sensor network can be checked for malicious nodes attacking to eliminate the attack, and the target node can be located until the attack detection result is that there is no ranging attack or ranging attack.
接下来通过实验仿真和分析对本实施例中提供的无线传感器网络的定位优化方法进行验证。本实施例研究了检测距离攻击性能的实验结果,这些结论也适用于安全定位方案的性能评估,这有两个原因,首先如果所有的距离测量都是合法的,那么最终的定位结果也是合法的;其次,如果每个距离测量中的通信开销很低,那么安全定位方案的总体开销也会很低。对于传感器节点数量的设置,提供了四个节点的简单情况下的实验结果,即锚点的数量NA=1、目标节点的数量NS=1和恶意节点的数量NE=2。在设置各个传感器节点的位置时,假设所有的锚点和恶意节点都分布在同一个平面上,先设置四个节点的位置,如图8所示,图8为本申请实施例提供的一种无线传感器网络系统的示意图。然后让E1在30m×30m平面上移动,设置传输功率Pt=1W和发射天线增益和接收天线增益Gt=Gr=8。Next, the positioning optimization method of the wireless sensor network provided in this embodiment is verified through experimental simulation and analysis. This example studies the experimental results of the detection distance attack performance. These conclusions are also applicable to the performance evaluation of the security positioning scheme. There are two reasons for this. First, if all distance measurements are valid, then the final positioning result is also valid. ; Second, if the communication overhead in each distance measurement is low, the overall overhead of the secure localization scheme will also be low. For the setting of the number of sensor nodes, the experimental results for the simple case of four nodes, namely the number of anchors N A =1, the number of target nodes N S =1 and the number of malicious nodes N E =2, are provided. When setting the positions of each sensor node, it is assumed that all anchor points and malicious nodes are distributed on the same plane, and the positions of four nodes are set first, as shown in FIG. 8 . FIG. Schematic diagram of a wireless sensor network system. Then let E 1 move on a 30m×30m plane, set transmit power P t =1W and transmit and receive antenna gains G t =G r =8.
本实施例中,由于信道衰落和接收机噪声都引入了随机性,本实施例中可以采用设定数量的独立实验方案的最终结果进行平均,例如设定数量可以为60000。本实施例中以四个性能指标为例进行说明,第一个指标是检测概率/误报概率(PD/PFA)。第二个指标是曲线下面积(Area Under Curve,AUC),根据奈曼-皮尔逊(Neyman Pearson,NP)定理得出了接收机工作特性(Receiver Operating Characteristic,ROC)曲线,然后计算ROC曲线对应的AUC。第三个指标是通信开销,定义为在一次距离测量中传输的总比特数。由于检测性能和开销冲突,通过第四个指标即性能开销比(Performance Overhead Ratio,POR),以比较各种方案,其定义为AUC与通信开销的比值。In this embodiment, since both channel fading and receiver noise introduce randomness, in this embodiment, the final results of a set number of independent experimental schemes may be used for averaging, for example, the set number may be 60,000. In this embodiment, four performance indicators are taken as an example for description, and the first indicator is the probability of detection/probability of false alarm (PD/PFA). The second indicator is the Area Under Curve (AUC). According to the Neyman-Pearson (NP) theorem, the Receiver Operating Characteristic (ROC) curve is obtained, and then the corresponding ROC curve is calculated. the AUC. The third metric is communication overhead, defined as the total number of bits transmitted in one distance measurement. Due to the conflict between detection performance and overhead, various schemes are compared through the fourth indicator, Performance Overhead Ratio (POR), which is defined as the ratio of AUC to communication overhead.
通过第一个指标的对比进行举例说明。参见图9,图9为本申请实施例提供的一种实验和理论的对比示意图,该方案的检测性能随恶意节点的接收噪声GE值的增大而提高,如图9所示,设置信噪比γ=10dB,设定误报概率上限值ε=0.01,所采用的信道估计算法的性能α=5%和恶意节点的硬件性能β=100%。如图9所示,PD和PFA的封闭形式表达式与预期的仿真结果完全吻合。和但是,如果估计误差不能被忽略,那么随着GE值的增加,该方案的检测性能会提高。GE的值不能被外部攻击者设置得太小,否则目标节点接收到的信号就会很低,甚至目标节点也无法解码挑战信号,使得距离攻击变得没有意义。An example is given by the comparison of the first indicator. Referring to FIG. 9, FIG. 9 is a schematic diagram comparing an experiment and a theory provided by an embodiment of the present application. The detection performance of this solution increases with the increase of the received noise GE value of the malicious node. As shown in FIG. The noise ratio γ=10dB, the upper limit of false alarm probability ε=0.01, the performance of the adopted channel estimation algorithm α=5% and the hardware performance of malicious nodes β=100%. As shown in Figure 9, the closed-form expressions of PD and PFA are in perfect agreement with the expected simulation results. And, if the estimation error cannot be ignored, the detection performance of this scheme improves as the value of GE increases. The value of GE cannot be set too small by an external attacker, otherwise the signal received by the target node will be very low, and even the target node cannot decode the challenge signal, making distance attacks meaningless.
本方案的检测性能随α值的增大而降低,α表示所采用的信道估计算法的性能,设置GE=150,其余条件与图9相同进行分析。随着β值的增大,检测性能提高,β表示恶意节点的硬件性能,设置GE=150,其余条件与图9相同进行分析。本方案α与β增大时,PD和PFA的封闭形式表达式与预期的仿真结果均完全吻合The detection performance of this scheme decreases with the increase of the value of α, where α represents the performance of the adopted channel estimation algorithm, and G E =150 is set, and the other conditions are the same as those in FIG. 9 for analysis. As the value of β increases, the detection performance improves, β represents the hardware performance of the malicious node, and G E = 150 is set, and the rest of the conditions are the same as in Figure 9 for analysis. When α and β increase in this scheme, the closed-form expressions of PD and PFA are in full agreement with the expected simulation results
随着目标节点与恶意节点距离的减小,检测性能提高,除GE=150与E1位置外,其余条件与图9相同进行分析。但是,如果估计误差不能被忽略,则随着目标节点与恶意节点距离的减小,该方案的检测性能提高。As the distance between the target node and the malicious node decreases, the detection performance improves. Except for the position of G E = 150 and E 1 , the rest of the conditions are the same as those in Fig. 9 for analysis. However, if the estimation error cannot be ignored, the detection performance of this scheme improves as the distance between the target node and the malicious node decreases.
接下来通过将本实施例中提供的方案和传统方案进行对比,对本方案进行说明。本方案的检测性能与测量次数无关,如图10所示,图10为本申请实施例提供的一种检测性能与测量次数的关系示意图。除了GE=150和M=3外其余条件与图9相同,L表示在传统方案中测量的次数。从图10可以看出,本方案的检测性能是独立的,而传统方案的检测性能随着L的值的增大而提高。当L≥2M+1,传统方案的检测性能较好,即AUC=1;否则,传统方案的检测性能较差,即AUC等于0.5,这相当于随机猜测。在有估计误差的情况下,方案的性能略有下降,即AUC=0.992。Next, this solution will be described by comparing the solution provided in this embodiment with the traditional solution. The detection performance of this solution has nothing to do with the number of measurements. As shown in FIG. 10 , FIG. 10 is a schematic diagram of the relationship between the detection performance and the number of measurements provided by an embodiment of the present application. The remaining conditions are the same as in FIG. 9 except that G E =150 and M=3, and L represents the number of measurements in the conventional scheme. It can be seen from Figure 10 that the detection performance of this scheme is independent, while the detection performance of the traditional scheme increases with the increase of the value of L. When L≥2M+1, the detection performance of the traditional scheme is better, that is, AUC=1; otherwise, the detection performance of the traditional scheme is poor, that is, AUC is equal to 0.5, which is equivalent to random guessing. In the case of estimation error, the performance of the scheme decreases slightly, that is, AUC=0.992.
对于不同数量的锚点,本方案比传统方案可以节省通信开销72.8%,且与L无关。首先,参见图11,图11为本申请实施例提供的一种通信开销与锚点数量的关系示意图,除L=3外其余条件与图9相同。从图11中可以看出,本方案和传统方案的通信开销均随着锚点数量NA值的增加而增加。但与传统方案相比,本方案具有更低的通信开销。例如,如果采用IEEE 802.15.4标准,对于4个锚点的情况,本方案的通信开销比传统方案低1.067Kbytes;对于10个锚点的情况,本方案的通信开销比传统方案低2.666Kbytes。对于不同数量的锚点,与传统方案相比,本方案的通信开销节省了72.8%。For different numbers of anchors, the proposed scheme can save 72.8% of the communication overhead compared with the traditional scheme, regardless of L. First, referring to FIG. 11 , FIG. 11 is a schematic diagram of a relationship between communication overhead and the number of anchor points provided by an embodiment of the present application, and other conditions are the same as those of FIG. 9 except that L=3. It can be seen from Fig. 11 that the communication overhead of this scheme and the traditional scheme both increase with the increase of the value of the number of anchor points NA . But compared with the traditional scheme, this scheme has lower communication overhead. For example, if the IEEE 802.15.4 standard is adopted, for the case of 4 anchor points, the communication overhead of this scheme is 1.067Kbytes lower than that of the traditional scheme; for the case of 10 anchor points, the communication overhead of this scheme is 2.666Kbytes lower than that of the traditional scheme. For different numbers of anchors, compared with the traditional scheme, the communication overhead of this scheme is saved by 72.8%.
其次,参见图12,图12为本申请实施例提供的一种通信开销与测量次数的关系示意图,除NA=1外其余条件与图9相同。从图12中可以看出,随着测量次数L增加,传统方案的通信开销增加,而本方案的通信开销则和L独立,与传统方案相比,该方案具有更低的通信开销,特别是在较大L的情况下。例如L=3时,本方案的通信开销比原方案低0.267Kbytes;对于L=10,该方案的通信开销比原方案低1.121Kbytes。Next, referring to FIG. 12 , FIG. 12 is a schematic diagram of a relationship between communication overhead and the number of measurements provided by an embodiment of the present application, and other conditions are the same as those of FIG. 9 except that N A =1. It can be seen from Figure 12 that as the number of measurements L increases, the communication overhead of the traditional scheme increases, while the communication overhead of this scheme is independent of L. Compared with the traditional scheme, this scheme has lower communication overhead, especially In the case of larger L. For example, when L=3, the communication overhead of this scheme is 0.267Kbytes lower than that of the original scheme; for L=10, the communication overhead of this scheme is 1.121Kbytes lower than that of the original scheme.
本方案的POR值比传统方案的POR值好得多,且POR值与L无关。如图13所示,图13为本申请实施例提供的一种性能开销比与测量次数的关系示意图,其中所有条件与图10相同。POR定义为AUC与通信开销的比值。从图13可以看出,本方案的POR值要比传统方案好得多。本方案的POR值与L无关,而传统方案的POR值随着L值的增大而减小,即使L≥2M+1。图13突出了本方案在POR方面的优越性。The POR value of this scheme is much better than that of the traditional scheme, and the POR value is independent of L. As shown in FIG. 13 , FIG. 13 is a schematic diagram of a relationship between a performance-overhead ratio and the number of measurements provided by an embodiment of the present application, where all conditions are the same as those in FIG. 10 . POR is defined as the ratio of AUC to communication overhead. It can be seen from Figure 13 that the POR value of this scheme is much better than that of the traditional scheme. The POR value of this scheme has nothing to do with L, while the POR value of the traditional scheme decreases with the increase of the L value, even if L≥2M+1. Figure 13 highlights the superiority of this scheme in terms of POR.
综上,针对无线传感器网络中两个恶意节点协同发起攻击时节点定位的安全问题,本方案利用外部距离攻击的噪声特征,提出了一种轻量级的安全定位方案。与传统方案相比,本方案提供了更低的通信开销和更高的安全性,实验结果表明了本方案的优越性。To sum up, in view of the security problem of node location when two malicious nodes cooperate to launch attacks in wireless sensor networks, this scheme uses the noise characteristics of external distance attacks to propose a lightweight security location scheme. Compared with the traditional scheme, this scheme provides lower communication overhead and higher security, and the experimental results show the superiority of this scheme.
本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值,确定第二接收机噪声方差和第一接收机噪声方差的方差差值,根据方差差值以及目标检测阈值的比对结果,确定测距增大攻击的检测结果,如果测距增大攻击的检测结果为不存在测距增大攻击,则确定测距虽小攻击的检测结果;如果测距缩小攻击的检测结果为不存在测距缩小攻击,则根据目标距离对目标节点进行定位。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; according to the upper limit value of the false alarm probability and the predetermined detection threshold expression, the target detection threshold is determined, and the variance difference between the noise variance of the second receiver and the noise variance of the first receiver is determined. According to the variance The comparison result of the difference value and the target detection threshold value determines the detection result of the ranging attack. If the detection result of the ranging attack is that there is no ranging attack, the detection result of the ranging attack is determined; If the detection result of the range reduction attack is that there is no range reduction attack, the target node is located according to the target distance. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.
图14为本申请实施例提供的一种无线传感器网络的定位优化装置的结构示意图,本实施例可适用于实现无线传感器的安全定位的情况。本申请实施例所提供的无线传感器网络的定位优化装置可执行本申请任意实施例所提供的无线传感器网络的定位优化方法,具备执行方法相应的功能模块和效果。该装置包括:FIG. 14 is a schematic structural diagram of an apparatus for positioning optimization of a wireless sensor network according to an embodiment of the present application. This embodiment is applicable to a situation in which secure positioning of a wireless sensor is implemented. The wireless sensor network positioning optimization apparatus provided by the embodiment of the present application can execute the wireless sensor network positioning optimization method provided by any embodiment of the present application, and has functional modules and effects corresponding to the execution method. The device includes:
信息获取模块310,用于获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;检测阈值确定模块320,用于根据设定误报概率上限值确定目标检测阈值;攻击检测模块330,用于根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;定位模块340,用于如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。The
本申请实施例提供的无线传感器的定位优化方案,获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定锚点和目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据第一接收机噪声、第二接收机噪声以及目标检测阈值,确定测距增大攻击的检测结果;如果测距增大攻击的检测结果为不存在测距增大攻击,则根据目标距离对目标节点进行定位;否则,将目标距离丢弃。采用上述技术方案,通过在无线传输过程中提取接收机噪声,并根据接收机噪声和设定误报概率上限值通过一次测量即可实现测距增大攻击的检测,基于该检测结果对无线传感器节点进行定位,由于设定误报概率上限值可以基于实际情况灵活调整,提高了检测阈值的灵活性,在保证安全定位的基础上节省了通信开销,并且提高了测距增大攻击检测的灵活性。In the wireless sensor positioning optimization solution provided by the embodiments of the present application, the first receiver noise extracted by the target node when receiving the challenge signal and the second receiver noise extracted by the anchor point when receiving the response signal are obtained; and the anchor point and The target distance of the target node; the target detection threshold is determined according to the upper limit of the false alarm probability; the detection result of the ranging attack is determined according to the noise of the first receiver, the noise of the second receiver and the target detection threshold; If the detection result of the increase attack is that there is no range increase attack, the target node is located according to the target distance; otherwise, the target distance is discarded. By adopting the above technical scheme, by extracting the receiver noise in the wireless transmission process, and according to the receiver noise and setting the upper limit of the false alarm probability, the detection of the range increase attack can be realized by one measurement. For sensor node positioning, since the upper limit of false alarm probability can be flexibly adjusted based on the actual situation, the flexibility of detection threshold is improved, communication overhead is saved on the basis of ensuring safe positioning, and the detection of range-increasing attacks is improved. flexibility.
可选的,所述检测阈值确定模块320具体用于:Optionally, the detection
根据所述设定误报概率上限值和预先确定的检测阈值表达式,确定目标检测阈值。The target detection threshold is determined according to the set false alarm probability upper limit value and the predetermined detection threshold expression.
可选的,所述检测阈值表达式为:Optionally, the detection threshold expression is:
其中,Pfa表示误报概率,θ表示所述目标检测阈值,表示所述响应信号或所述挑战信号的方差,表示所述信道估计误差的方差。 Among them, P fa represents the probability of false positives, θ represents the target detection threshold, represents the variance of the response signal or the challenge signal, represents the variance of the channel estimation error.
可选的,所述目标检测阈值包括存在所述信道估计误差和不存在所述信道估计误差两种情况下的检测阈值。Optionally, the target detection threshold includes detection thresholds in the presence of the channel estimation error and the absence of the channel estimation error.
可选的,所述攻击检测模块330用于:Optionally, the
确定所述第二接收机噪声方差和第一接收机噪声方差的方差差值;根据所述方差差值以及所述目标检测阈值的比对结果,确定测距增大攻击的检测结果。Determine the variance difference between the noise variance of the second receiver and the noise variance of the first receiver; and determine the detection result of the ranging attack according to the comparison result of the variance difference and the target detection threshold.
可选的,所述攻击检测模块330具体用于:Optionally, the
如果所述方差差值小于或等于所述目标检测阈值,则所述测距增大攻击的检测结果为不存在测距增大攻击;否则,所述测距增大攻击的检测结果为存在测距增大攻击。If the variance difference is less than or equal to the target detection threshold, the detection result of the range augmentation attack is that the range increase attack does not exist; otherwise, the detection result of the range increase attack is the presence of the range increase attack. Range increases attack.
可选的,所述装置还包括测距缩小攻击模块,具体用于:Optionally, the device further includes a ranging and narrowing attack module, which is specifically used for:
根据所述目标距离对所述目标节点进行定位之前,确定测距缩小攻击的检测结果;相应的,如果所述测距增大攻击的检测结果为不存在测距增大攻击以及所述测距缩小攻击的检测结果为不存在测距缩小攻击时,执行所述根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。Before locating the target node according to the target distance, determine the detection result of the ranging attack; correspondingly, if the detection result of the ranging attack is that there is no ranging attack and the ranging attack When the detection result of the narrowing attack is that there is no ranging narrowing attack, the positioning of the target node according to the target distance is performed; otherwise, the target distance is discarded.
本申请实施例所提供的无线传感器网络的定位优化装置可执行本申请任意实施例所提供的无线传感器网络的定位优化方法,具备执行方法相应的功能模块和效果。The wireless sensor network positioning optimization apparatus provided by the embodiment of the present application can execute the wireless sensor network positioning optimization method provided by any embodiment of the present application, and has functional modules and effects corresponding to the execution method.
图15为本申请实施例提供的一种设备的结构示意图。图15示出了适于用来实现本申请实施方式的示例性设备412的框图。图15显示的设备412仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。FIG. 15 is a schematic structural diagram of a device provided by an embodiment of the present application. 15 shows a block diagram of an
如图15所示,设备412以通用设备的形式表现。设备412的组件可以包括但不限于:一个或者多个处理器416,存储装置428,连接不同系统组件(包括存储装置428和处理器416)的总线418。As shown in FIG. 15,
总线418表示几类总线结构中的一种或多种,包括存储装置总线或者存储装置控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(Industry SubversiveAlliance,ISA)总线,微通道体系结构(Micro Channel Architecture,MAC)总线,增强型ISA总线、视频电子标准协会(Video Electronics Standards Association,VESA)局域总线以及外围组件互连(Peripheral Component Interconnect,PCI)总线。
设备412典型地包括多种计算机系统可读介质。这些介质可以是任何能够被设备412访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。
存储装置428可以包括易失性存储器形式的计算机系统可读介质,例如随机存取存储器(Random Access Memory,RAM)430和/或高速缓存存储器432。设备412可以包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。仅作为举例,存储系统434可以用于读写不可移动的、非易失性磁介质(图15未显示,通常称为“硬盘驱动器”)。尽管图15中未示出,可以提供用于对可移动非易失性磁盘(例如“软盘”)读写的磁盘驱动器,以及对可移动非易失性光盘,例如只读光盘(Compact Disc Read-Only Memory,CD-ROM),数字视盘(Digital Video Disc-Read Only Memory,DVD-ROM)或者其它光介质)读写的光盘驱动器。在这些情况下,每个驱动器可以通过一个或者多个数据介质接口与总线418相连。存储装置428可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本申请各实施例的功能。
具有一组(至少一个)程序模块442的程序/实用工具440,可以存储在例如存储装置428中,这样的程序模块442包括但不限于操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。程序模块442通常执行本申请所描述的实施例中的功能和/或方法。A program/
设备412也可以与一个或多个外部设备414(例如键盘、指向终端、显示器424等)通信,还可与一个或者多个使得用户能与该设备412交互的终端通信,和/或与使得该设备412能与一个或多个其它计算终端进行通信的任何终端(例如网卡,调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口422进行。并且,设备412还可以通过网络适配器420与一个或者多个网络(例如局域网(Local Area Network,LAN),广域网(Wide Area Network,WAN)和/或公共网络,例如因特网)通信。如图15所示,网络适配器420通过总线418与设备412的其它模块通信。应当明白,尽管图中未示出,可以结合设备412使用其它硬件和/或软件模块,包括但不限于:微代码、终端驱动器、冗余处理器、外部磁盘驱动阵列、磁盘阵列(Redundant Arrays of Independent Disks,RAID)系统、磁带驱动器以及数据备份存储系统等。
处理器416通过运行存储在存储装置428中的程序,从而执行各种功能应用以及数据处理,例如实现本申请实施例所提供的无线传感器网络的定位优化方法,该方法包括:获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。The
本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如本申请实施例所提供的无线传感器网络的定位优化方法,该方法包括:获取目标节点在接收挑战信号时提取的第一接收机噪声,以及锚点在接收响应信号时提取的第二接收机噪声;并确定所述锚点和所述目标节点的目标距离;根据设定误报概率上限值确定目标检测阈值;根据所述第一接收机噪声、所述第二接收机噪声以及所述目标检测阈值,确定测距增大攻击的检测结果;如果所述测距增大攻击的检测结果为不存在测距增大攻击,则根据所述目标距离对所述目标节点进行定位;否则,将所述目标距离丢弃。Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, implements the positioning optimization method for a wireless sensor network as provided by the embodiments of the present application, and the method includes: Obtain the first receiver noise extracted by the target node when receiving the challenge signal, and the second receiver noise extracted by the anchor point when receiving the response signal; and determine the target distance between the anchor point and the target node; according to the setting The upper limit value of false alarm probability determines the target detection threshold; according to the first receiver noise, the second receiver noise and the target detection threshold, the detection result of the ranging increase attack is determined; if the ranging increase If the detection result of a large attack is that there is no ranging attack, the target node is located according to the target distance; otherwise, the target distance is discarded.
本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本文件中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。The computer storage medium of the embodiments of the present application may adopt any combination of one or more computer-readable media. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. The computer-readable storage medium can be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or a combination of any of the above. Examples (non-exhaustive list) of computer-readable storage media include: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), fiber optics, portable compact disk read only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the above. In this document, a computer-readable storage medium can be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。A computer-readable signal medium may include a propagated data signal in baseband or as part of a carrier wave, with computer-readable program code embodied thereon. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. A computer-readable signal medium can also be any computer-readable medium other than a computer-readable storage medium that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device .
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括——但不限于无线、电线、光缆、RF等等,或者上述的任意合适的组合。Program code embodied on a computer readable medium may be transmitted using any suitable medium, including - but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或终端上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。Computer program code for performing the operations of the present application may be written in one or more programming languages, including object-oriented programming languages—such as Java, Smalltalk, C++, but also conventional Procedural programming language - such as the "C" language or similar programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or terminal. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through Internet connection).
Claims (10)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2020/094283 WO2021243628A1 (en) | 2020-06-04 | 2020-06-04 | Positioning optimization method and apparatus for wireless sensor network, and device and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111801953A true CN111801953A (en) | 2020-10-20 |
| CN111801953B CN111801953B (en) | 2022-05-10 |
Family
ID=72834266
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202080001503.4A Expired - Fee Related CN111801953B (en) | 2020-06-04 | 2020-06-04 | Positioning optimization method, device, device and storage medium for wireless sensor network |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN111801953B (en) |
| WO (1) | WO2021243628A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113311385A (en) * | 2021-05-18 | 2021-08-27 | 南京理工大学 | Ultra-wideband-based dynamic target detection method |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116545493A (en) * | 2022-01-25 | 2023-08-04 | 广州海格通信集团股份有限公司 | Cluster target consistency matching method, unmanned aerial vehicle, server and storage medium |
| CN115665783B (en) * | 2022-10-28 | 2025-06-03 | 紫金山实验室 | Abnormal indicator tracing method, device, electronic device and storage medium |
| CN116222546B (en) * | 2023-05-10 | 2023-07-25 | 北京白水科技有限公司 | Method, device and equipment for generating map information in group navigation positioning |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101686475A (en) * | 2008-09-22 | 2010-03-31 | 华为技术有限公司 | Disturbance detection method and disturbance detection equipment |
| US20130002477A1 (en) * | 2011-06-29 | 2013-01-03 | Sintayehu Dehnie | Methods and systems for detecting GPS spoofing attacks |
| CN108882225A (en) * | 2018-05-07 | 2018-11-23 | 中山大学 | Safe positioning method based on ranging in a kind of wireless sensor network |
| US20190045327A1 (en) * | 2017-08-04 | 2019-02-07 | International Business Machines Corporation | Device diversity correction method for rss-based precise location tracking |
| CN110944383A (en) * | 2019-12-09 | 2020-03-31 | 青岛黄海学院 | Wireless sensor network safety positioning method for clone attack |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103297955A (en) * | 2013-04-27 | 2013-09-11 | 天津工业大学 | Wireless sensor network safety positioning method |
| CN106297114B (en) * | 2015-06-26 | 2018-07-31 | 奇点新源国际技术开发(北京)有限公司 | A kind of invader detection method and device |
-
2020
- 2020-06-04 CN CN202080001503.4A patent/CN111801953B/en not_active Expired - Fee Related
- 2020-06-04 WO PCT/CN2020/094283 patent/WO2021243628A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101686475A (en) * | 2008-09-22 | 2010-03-31 | 华为技术有限公司 | Disturbance detection method and disturbance detection equipment |
| US20130002477A1 (en) * | 2011-06-29 | 2013-01-03 | Sintayehu Dehnie | Methods and systems for detecting GPS spoofing attacks |
| US20190045327A1 (en) * | 2017-08-04 | 2019-02-07 | International Business Machines Corporation | Device diversity correction method for rss-based precise location tracking |
| CN108882225A (en) * | 2018-05-07 | 2018-11-23 | 中山大学 | Safe positioning method based on ranging in a kind of wireless sensor network |
| CN110944383A (en) * | 2019-12-09 | 2020-03-31 | 青岛黄海学院 | Wireless sensor network safety positioning method for clone attack |
Non-Patent Citations (1)
| Title |
|---|
| P.RAGHU VAMSI等: "A lightweight Sybil attack detection framework for Wireless Sensor Networks", 《2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3)》 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113311385A (en) * | 2021-05-18 | 2021-08-27 | 南京理工大学 | Ultra-wideband-based dynamic target detection method |
| CN113311385B (en) * | 2021-05-18 | 2022-08-09 | 南京理工大学 | Ultra-wideband-based dynamic target detection method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111801953B (en) | 2022-05-10 |
| WO2021243628A1 (en) | 2021-12-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111801953A (en) | Positioning optimization method, device, device and storage medium for wireless sensor network | |
| CN112205021B (en) | Secure positioning method, apparatus, device and storage medium for wireless sensor network | |
| JP7558991B2 (en) | Electronic device for performing ranging via UWB (ultra wide band) in wireless communication system and method of operating said electronic device | |
| Cheikhrouhou et al. | Blockloc: Secure localization in the internet of things using blockchain | |
| Koh et al. | Geo-spatial location spoofing detection for Internet of Things | |
| US12248083B2 (en) | Communication unit, communication device, and position estimating method | |
| CN105247384B (en) | The distance of mobile device determines | |
| WO2021192425A1 (en) | Communication device and position identification method | |
| CN106792685A (en) | A kind of joint qualification method based on carrier frequency and received signal strength | |
| Chen et al. | A secure localization approach against wormhole attacks using distance consistency | |
| CN106713190A (en) | MIMO (Multiple Input Multiple Output) transmitting antenna number blind estimation algorithm based on random matrix theory and feature threshold estimation | |
| KR20180112780A (en) | Methods and systems for ranging protocols | |
| CN110300409A (en) | Limited piece long covert communications implementation method based on channel estimation | |
| JP7806266B2 (en) | Method, apparatus, and readable storage medium for transmitting ranging signals in UWB | |
| CN111954219A (en) | Method, system and device for detecting spoofing attack of unmanned aerial vehicle | |
| Bouabdellah et al. | RSS-based localization with maximum likelihood estimation for PUE attacker detection in cognitive radio networks | |
| CN109348503B (en) | Monitoring method, device, equipment and system for wireless communication link | |
| CN110300094B (en) | A method, device, device and storage medium for trustworthiness assessment of data nodes | |
| Chowdhury et al. | Effect of sensor number and location in cross-correlation based node estimation technique for underwater communications network | |
| CN115173975A (en) | Method, device and equipment for detecting interference signal and storage medium | |
| US12024125B2 (en) | Control device and non-transitory storage medium | |
| CN119743756A (en) | Satellite communication authentication integrated method and device | |
| CN105144181B (en) | location signature | |
| CN113325363A (en) | Method and device for determining direction of arrival and related equipment | |
| KR20200095312A (en) | Method and system for ambient backscatter communication in multi-tag and multi-reader environments |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220510 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |