Wireless Sensor Networks(WSN),because of its low cost and low power consumption,has brought about an information innovation that makes WSN widely used in various fields of life.Due to the harsh application environment of WSN,wireless sensor nodes are often attacked.The attacking node launches a false data injection attack on the network,causing the network to be paralyzed.Therefore,tracking the attack node becomes a research hotspot of the WSN.In this paper,different tracking schemes are proposed for the two cases of continuous attack nodes and no continuous attack nodes on the attack path in WSN.The specific content is divided into the following aspects:Firstly,in the absence of continuous attack nodes,an attack node tracking scheme based on double ciphertext is proposed.First,the Sink node sends a key to all nodes in the network,and then the node takes the key as its own master key,and then generates a unidirectional chain key string by using the key generation algorithm;During the transmission process,the source node protects the initial information by using the private key of the sink node,and the intermediate node uses the shared key of the onehop neighbor node to authenticate the attack node.Finally,the information protection mechanism is used to securely transmit the data packet to the sink node.After receiving the data packet,the Sink node extracts the value of the attack node domain record in the data packet,and finds the attack node in the network according to the table information saved by itself.After the tracking process is performed,whether there is a fake data packet in the data packet received by the Sink node,thereby determining the existence of the attack node in the network.Secondly,in the case of continuous attack nodes,an attack node tracking scheme based on hierarchical structure tag is proposed.The scheme first divides the randomly distributed wireless sensor network into four horizontal and vertical divisions and numbers them separately,then applies the same division method to each area,and so on,until only one node in each area stops.Thus,each sensor node has a different area number than the other nodes;the node encrypts the original data and fills in the data packet with the node's own domain bit string and the encrypted data;The node uses the hierarchical structure tagging method to mark the data of the first node that forwards the data packet in each layer and the data of the node that forwards the first data packet in the upper layer in the packet header;After the last data packet is delivered to the Sink node,the attack node is located in a progressively progressive manner.Finally,the simulation experiments of the two schemes proposed in this paper are carried out using OMNET5.1++ simulation software.The BPPM scheme and the NIT scheme are compared in terms of communication overhead,tracking the success rate of the attack node,and the time required to track the attack node.In the same application environment,this scheme has better tracking effect on attack nodes in WSN. |