Malicious anchor node detection and target node localization method based on recovery of sparse terms
11696135 · 2023-07-04
Assignee
Inventors
Cpc classification
H04W12/009
ELECTRICITY
G06F17/16
PHYSICS
H04W12/121
ELECTRICITY
G06F17/17
PHYSICS
International classification
H04W12/00
ELECTRICITY
G06F17/17
PHYSICS
Abstract
A malicious anchor node detection and target node localization method based on recovery of sparse terms, includes: S1: establishing an unknown disturbance term by using ranging value attack terms from an attacker to nodes in a wireless sensor network, and introducing a to-be-estimated location of a target node to the unknown disturbance term, to obtain an unknown sparse vector; S2: converting a problem of malicious anchor node detection and target node localization into a problem of recovery of the unknown sparse vector; S3: determining a location of an initial node according to a recursive weighted linear least square method, and recovering and reconstructing the unknown sparse vector with sparsity; and S4: determining a malicious anchor node determination range by approximating a threshold using a recovered value of the unknown sparse vector, to implement malicious anchor node detection, and recovering and determining location information of the target node.
Claims
1. A malicious anchor node detection and target node localization method based on recovery of sparse terms, comprising the following steps: S1: establishing an unknown disturbance term by using ranging value attack terms from an attacker to nodes in a wireless sensor network, and introducing a to-be-estimated location of a target node to the unknown disturbance term, to obtain an unknown sparse vector; S2: converting a problem of malicious anchor node detection and target node localization into a problem of recovery of the unknown sparse vector; S3: determining a location of an initial node according to a recursive weighted linear least square method, and recovering and reconstructing the unknown sparse vector with sparsity by using a self-adaptive gradient projection method; and S4: determining a malicious anchor node determination range by approximating a threshold using a recovered value of the unknown sparse vector, to implement malicious anchor node detection, and recovering and determining location information of the target node by using a non-sparse part reconstructed from an interference term.
2. The method according to claim 1, wherein according to a wireless sensor distribution model, in a network environment in which the sensor network is deployed, a location information set {A.sub.1, A.sub.2 . . . A.sub.n} of anchor nodes in the network is set, and a node is randomly set as a target anchor node, wherein a location of the target anchor node is t=[t.sub.x, t.sub.y], and a real distance between an i-th anchor node and the target node is ∥A.sub.i−t∥, i=1, 2 . . . n; therefore, a measured distance d.sub.i between the i-th anchor node and the target node is expressed as follows:
d.sub.i=∥A.sub.i−t∥+n.sub.i+u.sub.i,i=1,2 . . . n (1) wherein n.sub.i represents noise in a measurement process, which is a Gaussian random variable having an independent distribution with a mean of 0; u.sub.i represents the unknown disturbance term, which is represented by a Gaussian random variable having an independent distribution and is expressed as follows:
u.sub.i˜N(μ.sub.att,σ.sub.att.sup.2) wherein i=1,2, . . . n and represents the i-th node; μ.sub.att represents a mean, σ.sub.att.sup.2 represents a variance; and if the i-th node is a malicious anchor node, u.sub.i is a non-zero value, otherwise, u.sub.i is zero or close to zero.
3. The method according to claim 1, wherein the unknown sparse vector is expressed as follows:
p=[u.sub.1,u.sub.2, . . . u.sub.n,t.sub.x,t.sub.y] wherein u.sub.i represents the unknown disturbance term, i=1,2, . . . , n; t=[t.sub.x,t.sub.y] and represents the to-be-estimated location of the target node.
4. The method according to claim 3, wherein step S2 of converting a problem of malicious anchor node detection and target node localization into a problem of recovery of the sparse vector is expressed as follows:
5. The method according to claim 4, wherein because the recovery and reconstruction of the unknown sparse vector rely on the location of the initial node, a signal energy receiving model is established according to a signal energy loss and a distance relationship between a transmitting end and a receiving end, and a linear system model is established according to the signal energy receiving model and solved by using a recursive weighted linear least square method, thereby determining the location of the initial node.
6. The method according to claim 5, wherein the signal energy receiving model is expressed as follows:
z.sub.i=10.sup.y.sup.
{tilde over (Z)}.sub.i≈α.sub.i∥A.sub.i−T∥.sup.2 (5)
σ.sub.z.sub.
7. The method according to claim 6, wherein the established linear system model is expressed as follows:
b=At+w (7) wherein t=[t.sub.x, t.sub.y] represents the to-be-estimated location of the target node, w is a noise vector, w=[ω.sub.1, ω.sub.2 . . . ω.sub.n].sup.T, and ω.sub.i represents Gaussian white noise with a mean of 0; i=1, 2 . . . n; b represents an observation vector:
f(t)=(b−At).sup.T*c(t).sup.−1*(b−At) (10)
{circumflex over (t)}=[A.sup.Tc({circumflex over (t)}).sup.−1A].sup.−1A.sup.Tc({circumflex over (t)}).sup.−1b (11).
8. The method according to claim 7, wherein to achieve higher computing accuracy, a backtracking equation is acquired through iterative solutions,
{circumflex over (t)}.sup.k=[A.sup.Tc({circumflex over (t)}).sup.−1A].sup.−1A.sup.Tc({circumflex over (t)}.sup.k−1).sup.−1b (12) wherein an iteration ending condition is: ∥{circumflex over (t)}.sup.k−{circumflex over (t)}.sup.k+1∥≤γ, and γ represents a threshold of a Euclidean distance between location information of the k-th iteration threshold of a Euclidean distance between location information of a k-th iteration result and location information of a (k+1)-th iteration result, and is set manually.
9. The method according to claim 8, wherein the unknown sparse vector is recovered by using the self-adaptive gradient projection method, two positive vectors ϕ=[ϕ.sub.1, ϕ.sub.2, . . . , ϕ.sub.n].sup.T and τ=[ϕ.sup.T, ψ.sup.T, t.sup.T].sup.T are introduced first to divide the unknown sparse vector into a positive part and a negative part, thereby dividing G(P) into a loss function and a regular function; τ=[ϕ.sup.T, ψ.sup.T, t.sup.T].sup.T is redefined in the recovery process, and then formula (2) is converted into the following form:
10. The method according to claim 9, wherein iterations are performed on iterative formula (14) according to an Armijo rule, that is, all values of k are set to 1 by using λ.sup.k, and then α.sup.k is continuously reduced until an Armijo-like inequation is satisfied, wherein the Armijo-like inequation is expressed as follows:
G(P(τ.sup.k−α.sup.k∇G(τ.sup.k)))≤μ∇G(τ.sup.k).sup.T(τ.sup.k−P(τ.sup.k−α.sup.k∇G(τ.sup.k))) (15) wherein β∈(0,0.5), α∈(1,2), and after a value of the adaptive step is fixed, τ.sup.k=P(τ.sup.k−α.sup.k∇G(τ.sup.k)) is determined.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION OF THE EMBODIMENTS
(10) The technical solutions of the embodiments of the present disclosure are clearly and completely described below with reference to the accompanying drawings. Apparently, the described embodiments are merely some of rather than all of the embodiments of the present disclosure, and are only for illustrative description but should not be construed as a limitation to the present patent. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the disclosure without creative efforts shall fall within the protection scope of the present disclosure.
(11) The following further describes the technical solution of the present disclosure in detail with reference to the accompanying drawings and embodiments.
Embodiment 1
(12) As shown in
(13) S1: Establish an unknown disturbance term by using ranging value attack terms from an attacker to nodes in a wireless sensor network, and introduce a to-be-estimated location of a target node to the unknown disturbance term, to obtain an unknown sparse vector.
(14) S2: Convert a problem of malicious anchor node detection and target node localization into a problem of recovery of the unknown sparse vector.
(15) S3: Determine a location of an initial node according to a recursive weighted linear least square method, and recover and reconstruct the unknown sparse vector with sparsity by using a self-adaptive gradient projection method.
(16) S4: Determine a malicious anchor node determination range by approximating a threshold using a recovered value of the unknown sparse vector, to implement malicious anchor node detection, and recover and determine location information of the target node by using a non-sparse part reconstructed from an interference term.
(17) In a specific embodiment, in step S1, specifically, according to a wireless sensor distribution model, in a network environment in which the sensor network is deployed, a location information set {A.sub.1, A.sub.2 . . . A.sub.n} of anchor nodes in the network is set. For ease of description, a node is randomly set as a target anchor node, where a location of the target anchor node is t=[t.sub.z, t.sub.y]. A real distance between the i-th anchor node and the target node can be recorded as ∥A.sub.i−t∥, i=1, 2 . . . n. Therefore, a measured distance di between the i-th anchor node and the target node is expressed as follows:
d.sub.i=∥A.sub.i−t∥+n.sub.i+u.sub.i,i=1,2 . . . n (1)
wherein n.sub.i represents noise in a measurement process, which is a Gaussian random variable having an independent distribution with a mean of 0; u.sub.i represents the unknown disturbance term, which is represented by a Gaussian random variable having an independent distribution and is expressed as follows:
u.sub.i˜N(μ.sub.att,σ.sub.att.sup.2)
wherein i=1,2, . . . n represents the i-th node; represents a mean, σ.sub.att.sup.2 represents a variance, and if the i-th node is a malicious anchor node, u.sub.i is a non-zero value; otherwise, the value is zero or close to zero.
(18) u.sub.i in ranging information of all the anchor nodes is used to construct a new vector, where U={u.sub.i, u.sub.2 . . . u.sub.i}; when some anchor nodes in the wireless sensor network are subject to external attacks and become malicious anchor nodes, within a certain range, it is ensured that the constructed vector is sparse. Screening of malicious anchor nodes can be converted into recovery of the unknown sparse vector and the screening and discrimination of non-zero values.
(19) The unknown disturbance item u.sub.i, i=1, 2 . . . n and the to-be-estimated location of the target node t=[t.sub.z, t.sub.y] can be re-combined, to obtain an unknown sparse vector to be solved. The unknown sparse vector is expressed as follows:
p=[u.sub.1,u.sub.2, . . . u.sub.n,t.sub.x,t.sub.y]
wherein u.sub.i represents the unknown disturbance term, i=1,2, . . . , n; t=[t.sub.x,t.sub.y] represents the to-be-estimated location of the target node.
(20) In a specific embodiment, step S2 of converting a problem of malicious anchor node detection and target node localization into a problem of recovery of the sparse vector is expressed as follows:
(21)
wherein d.sub.i represents a measured distance between the i-th anchor node and the target node; A represents a coefficient matrix, A represents a regular factor, and u represents an attack term.
(22) In a specific embodiment, in step S3, because the recovery and reconstruction of the unknown sparse vector rely on the location of the initial node, a signal energy receiving model is established according to a signal energy loss and a distance relationship between a transmitting end and a receiving end, and a linear system model is established according to the signal energy receiving model and solved by using a recursive weighted linear least square method, thereby determining the location of the initial node.
(23) Specifically, the signal energy receiving model is expressed as follows:
(24)
wherein P.sub.R represents signal energy received by the i-th receiving end from the target anchor node; P.sub.Ti represents initial signal energy sent by the i-th transmitting end, d.sub.i is a measured distance between the i-th anchor node and the target node, d.sub.0 is a reference distance, and ε.sub.i is a measurement error, which is a Gaussian variable having a mean of 0 and a variance of σ.sup.2.
formula (2) is converted into the following form:
z.sub.i=10.sup.y.sup.
wherein
(25)
α represents a channel attenuation coefficient;
after UT and mathematical operations, a mean and a variance of Z.sub.i are obtained approximately:
{tilde over (Z)}.sub.i≈α.sub.i∥A.sub.i−T∥.sup.2 (5)
σ.sub.z.sub.
wherein,
(26)
σ.sub.i.sup.2 represents a variance of u.sub.i.
(27) The established linear system model is expressed as follows:
b=At+w (7)
wherein t=[t.sub.z, t.sub.y] represents the to-be-estimated location of the target node; w is a noise vector, w=[w.sub.1, w.sub.2 . . . w.sub.n].sup.T, and w.sub.i represents Gaussian white noise with a mean of 0; i=1, 2 . . . n;
b represents an observation vector:
(28)
wherein (x.sub.r, y.sub.r) represents location information of the r-th anchor node, and the r-th anchor node is selected as a reference anchor node; A represents a coefficient matrix,
(29)
then a weighted linear least square equation and a corresponding solution are expressed as follows:
f(t)=(b−At).sup.T*c(t).sup.−1*(b−At) (10)
{circumflex over (t)}=[A.sup.Tc({circumflex over (t)}).sup.−1A].sup.−1A.sup.Tc({circumflex over (t)}).sup.−1b (11).
(30) Further, to achieve higher computing accuracy, a backtracking equation is acquired through iterative solutions,
{circumflex over (t)}.sup.k=[A.sup.Tc({circumflex over (t)}).sup.−1A].sup.−1A.sup.Tc({circumflex over (t)}.sup.k−1).sup.−1b (12)
wherein an iteration ending condition is: ∥{circumflex over (t)}.sup.k−{circumflex over (t)}.sup.k+1∥≤γ, and γ represents a threshold of a Euclidean distance between location information of the k-th iteration result and location information of the (k+1)-th iteration result, and is set manually.
(31) In a specific embodiments, the unknown sparse vector is recovered by using the self-adaptive gradient projection method, two positive vectors ϕ=ϕ=[ϕ.sub.1, ϕ.sub.2, . . . , ϕ.sub.n].sup.T and τ=[ϕ.sup.T, ψ.sup.T, t.sup.T].sup.T are introduced first to divide the unknown sparse vector into a positive part and a negative part, thereby dividing G(P) into a loss function and a regular function;
(32) τ=[ϕ.sup.T, ψ.sup.T, t.sup.T].sup.T is redefined in the recovery process, and then formula (2) is converted into the following form:
(33)
wherein P=[u.sub.1, u.sub.2 . . . u.sub.n, t.sub.x, t.sub.y];
an iterative formula is as follows:
(34)
wherein in formula (14), τ.sup.k is the k-th iteration result of τ=[ϕ.sup.T,ψ.sup.T,t.sup.T].sup.T; α.sup.k represents an adaptive step; λ.sup.k represents a positive scalar; P( ) is used to represent a projection operation for vector z, which is specifically an operation of projecting vector z to a corresponding non-negative positive quadrant.
(35) In a specific embodiment, the self-adaptive gradient projection method has multiple step selection methods. There are different selection rules for step selection. Because the iterations of the unknown sparse vector are more likely to be converged on the boundary, in this embodiment, iterations are performed on iterative formula (14) by using an Armijo rule, that is, all values of k are set to 1 by using λk, and α.sup.k is reduced continuously until an Armijo-like inequation is satisfied. The Armijo-like inequation is expressed as follows:
G(P(τ.sup.k−α.sup.k∇G(τ.sup.k)))≤μ∇G(τ.sup.k).sup.T(τ.sup.k−P(τ.sup.k−α.sup.k∇G(τ.sup.k))) (15)
wherein β∈(0,0.5), α∈(1,2), and after a value of the adaptive step is fixed, τ.sup.k=P(τ.sup.k−α.sup.k∇G(τ.sup.k)) is determined.
(36) Through the foregoing steps, a malicious anchor node determination range is determined, to implement malicious anchor node detection, and the location information of the target node is recovered and determined by using the non-sparse part reconstructed from the interference term. That is, the last two items in the recovered unknown sparse vector are location coordinates of the target node.
(37) Compared with the conventional localization method, this embodiment not only considers attacks on the sensor network and the presence of malicious anchor node, but also greatly reduces the time complexity. The method of this embodiment performs malicious anchor node detection and target node localization simultaneously, thereby effectively ensuring the accuracy and efficiency of the detection.
(38) To effectively evaluate the performance of the method in this embodiment, four evaluation metrics are introduced in this embodiment.
(39) 1. TPR (true positive rate, which is a ratio of the number of correctly detected malicious anchor nodes to the total number of malicious anchor nodes)
(40) 2. FPR (false positive rate, a ratio of the number of benign anchor nodes wrongly detected as malicious anchor nodes to the total number of benign anchor nodes)
(41) 3. FNR (false negative rate, a ratio of the number of malicious anchor nodes wrongly detected as benign anchor nodes to the number of benign anchor nodes)
(42) 4. Average localization error.
(43) Moreover, comparisons were made with other algorithms, including malicious anchor node detection based on isolation forest (MANDIF), which uses isolation forest and sequential probability ratio testing to detect malicious anchor nodes; malicious anchor node detection based on clustering and consistency (MNDC) and enhanced malicious anchor node detection based on clustering and consistency (EMDC); and the GD algorithm with fixed and variable steps proposed by Ravi-Garg et al. Computer configuration of the experimental environment: CPU: core (TM) i7-8700; memory: 32G; operating system: Windows 10. All simulation and comparison experiments were performed in a simulated experimental environment on Matalb2019a. m anchors containing n malicious anchors were deployed in a 100 m×100 m square and in the same field, and the following experiments were performed more than 1000 times to obtain accurate and stable results.
(44) In Experiment 1, a relatively simple environment was set up. The MLE is shown in
(45) The FNR, TPR and FPR curves of the compared algorithms are shown in
(46) Then, the case where attacks are more violent and malicious anchor nodes account for a higher proportion is considered. As long as the number of malicious anchor nodes
(47)
the target node localization and identification time of all malicious anchors can be achieved simultaneously. The proportion of malicious anchor nodes is set to 40%, and the same as Experiment 1, benign anchor nodes and malicious anchor nodes are randomly deployed in a 100 m×100 m area.
(48) The MLE is shown in
(49) The FPR, TPR, and FNR curves of the compared algorithms are given in
(50) It is apparent that the above embodiments are merely intended to describe the present disclosure clearly, rather than to limit the implementations of the present disclosure. The person of ordinary skill in the art may make modifications or variations in other forms based on the above description. There are no need and no way to exhaust all the embodiments. Any modification, equivalent replacement and improvement made within the spirit and principle of the present disclosure shall be included in the protection scope of the claims of the present disclosure.