信息网络安全 ›› 2021, Vol. 21 ›› Issue (9): 80-89.doi: 10.3969/j.issn.1671-1122.2021.09.012

• 入选论文 • 上一篇    下一篇

一种基于安全区域的WSN流量分析聚合方法

张永棠1,2()   

  1. 1.广东东软学院计算机学院,佛山 528225
    2.南昌工程学院协同感知与先进计算技术研究所,南昌 330003
  • 收稿日期:2021-06-20 出版日期:2021-09-10 发布日期:2021-09-22
  • 通讯作者: 张永棠 E-mail:gov211@163.com
  • 作者简介:张永棠(1981—),男,江西,教授,博士,主要研究方向为通信及网络空间安全技术、网络安全感知。
  • 基金资助:
    国家自然科学基金(61663029);广东省高校重点平台与特色创新项目(2020KTSCX771)

A Secure Area Based Clustering Approach for Traffic Analysis in WSN

ZHANG Yongtang1,2()   

  1. 1. School of Computer, Guangdong Neusoft Institute, Foshan 528225, China
    2. Institute of Cooperative Sensing and Advanced Computing Technology, Nanchang Technology Institute, Nanchang 330003, China
  • Received:2021-06-20 Online:2021-09-10 Published:2021-09-22
  • Contact: ZHANG Yongtang E-mail:gov211@163.com

摘要:

聚类是无线传感器网络中最重要的任务,其特点是通过簇头(Cluster Head,CH)进行数据聚合,降低了通信成本。由于无线传感器网络部署在远程和敌对环境中进行敏感信息的传输,使得传感器节点更容易受到虚假的数据注入攻击。为克服这些问题,提高网络的安全性,文章提出一种基于安全区域的无线传感器网络流量分析聚类方法。将传感器网络聚类成小簇,每个簇都有一个CH来管理和收集来自正常传感器节点的信息。根据预定义的时隙、簇中心和最高剩余能量来选择CH。基于流量分析和一次性密钥生成过程对收集到的数据进行验证,以识别路由上的恶意节点,提供一个安全的数据收集过程,提高能源效率。仿真结果表明,与现有的安全数据聚合技术相比,文章所提基于安全区域的流量分析聚类方法具有更低的平均能耗、更低的端到端延迟、更高的平均剩余能量、更高的数据聚合精度和错误数据检测率。

关键词: 假数据注入攻击, 数据聚合, 一次性密钥生成, 无线传感器网络

Abstract:

Clustering is the most important task in wireless sensor network (WSN), which is characterized by data aggregation through each cluster head (CH), and reduces transportation costs. Because wireless sensor network is deployed in remote and hostile environments to transmit sensitive information, sensor nodes are more vulnerable to false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a secure area based clustering approach for data aggregation using traffic analysis (SAC-TA) in WSN. The sensor network is grouped into small clusters, each of which has a CH to manage and collect information from normal sensor nodes. The CH is selected according to the predefined time slot, cluster center and maximum residual energy. The collected data is verified based on traffic analysis and one-time key generation process to identify malicious nodes on the route, provide a secure data collection process and improve energy efficiency. The simulation results show that compared with the existing secure data aggregation technology (SDAT), SAC-TA has lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and error data detection rate.

Key words: false data injection attacks, data aggregation, one-time key generation, wireless sensor network

中图分类号: