Search

CN-122002282-A - Wireless self-organizing network routing protocol security method and system of unmanned cluster

CN122002282ACN 122002282 ACN122002282 ACN 122002282ACN-122002282-A

Abstract

The invention provides a wireless self-organizing network routing protocol safety method and system of an unmanned cluster, wherein a sender node in the wireless self-organizing network determines a trust anchor message in a routing message based on a working mechanism of a routing protocol in the wireless self-organizing network by combining communication overhead and a trust origin principle, the sender node utilizes a hash algorithm and an HMAC verification method to carry out safety field expansion on the head of the trust anchor message to construct an intensified routing message and broadcasts the intensified routing message to the wireless self-organizing network. The routing information source is authenticated with the lowest communication and calculation cost, so that the attack of external malicious nodes is effectively resisted, and the communication safety is ensured.

Inventors

  • GUO XINYU
  • YAN HONGLEI
  • LU YIQING

Assignees

  • 天津(滨海)人工智能创新中心

Dates

Publication Date
20260508
Application Date
20251217

Claims (10)

  1. 1. A wireless ad hoc network routing protocol security method for an unmanned cluster, comprising: A sender node in the wireless ad hoc network determines a trust anchor message in a routing message based on a working mechanism of a routing protocol in the wireless ad hoc network and by combining communication overhead and a trust origin principle; the sender node utilizes a hash algorithm and an HMAC verification method to carry out security field expansion on the head of the trust anchor message, constructs an enhanced routing message, and broadcasts the enhanced routing message to the wireless ad hoc network.
  2. 2. The method of claim 1, wherein the sender node uses a hashing algorithm and HMAC verification method to perform security field expansion on the header of the trust anchor message, constructing an enhanced routing message, comprising: extracting a hash value of an authentication position from a pre-generated one-way hash chain according to a sequence number and a hop count in a variable field of the trust anchor message head and combining an authentication position index calculation formula, wherein the one-way hash chain is generated based on a hash function; Performing hash calculation by utilizing an HMAC verification method based on a pre-selected key and a hash function and combining an invariable field of the message head of the trust anchor to obtain an HMAC value of the invariable field; and filling the HMAC value of the invariable field and the hash value of the authentication position into the head of the information anchor point message to carry out safety field expansion, so as to obtain the enhanced routing message.
  3. 3. The method of claim 2, wherein the authentication location index is calculated as: in the formula, Representing the authentication location in the one-way hash chain, Representing the total length of the one-way hash chain, Representing the maximum diameter in a wireless ad hoc network, Indicating a sequence number, Indicating the number of hops.
  4. 4. The method of claim 2, wherein hashing the immutable field of the trust anchor message header with the HMAC verification based on the pre-selected key and the hash function to obtain the HMAC value of the immutable field comprises: filling the key based on the input length requirement of a preselected hash function to obtain a filled key; Byte exclusive or is carried out on the filled secret key and a fixed constant, so that an inner secret key and an outer secret key are generated; splicing the inner layer key with the invariable field of the trust anchor message header to obtain an inner layer combination, and carrying out hash calculation by combining the hash function based on the inner layer combination to obtain an inner hash value; And combining the inner hash value with the outer layer key to obtain an outer layer combination, combining the outer layer combination, and carrying out hash calculation by combining the hash function to obtain the HMAC value of the invariable field.
  5. 5. The method of claim 1, wherein the determining the trust anchor message in the routing message by the sender node in the wireless ad hoc network based on the operating mechanism of the routing protocol in the wireless ad hoc network in combination with communication overhead and trust origin principles comprises: a sender node in the wireless ad hoc network analyzes a plurality of message structures which play a role in determining the route discovery and maintenance and are stable in a preset period in a route message according to a working mechanism of a route protocol in the wireless ad hoc network; screening a plurality of message structures closest to a trust root source from a plurality of message structures based on a trust origin principle to be used as a candidate structure set; and selecting a message structure with the minimum communication overhead from the candidate structure set as a trust anchor message in the routing message.
  6. 6. A wireless ad hoc network routing protocol security system for an unmanned cluster, comprising: The trust anchor point determining module is used for determining a trust anchor point message in a routing message based on a working mechanism of a routing protocol in the wireless ad hoc network and combining communication overhead and a trust origin principle; and the security expansion module is used for carrying out security field expansion on the head of the trust anchor message by the sender node by utilizing a hash algorithm and an HMAC verification method, constructing an enhanced routing message and broadcasting the enhanced routing message into the wireless ad hoc network.
  7. 7. A wireless ad hoc network routing protocol security method for an unmanned cluster, comprising: Receiving nodes in the wireless ad hoc network receive and analyze header messages of the enhanced routing messages; And the receiver node respectively calculates a hash value and an HMAC value of the header message, verifies the header message based on the hash value and the HMAC value, and decides that the enhanced routing message is adopted or discarded.
  8. 8. The method of claim 7, wherein the performing hash value and HMAC value calculations on the header message, respectively, validating the header message based on the hash value and HMAC value, and deciding whether the enhanced routing message is accepted or discarded comprises: based on the received hash value, carrying out hash operation for k times by combining a hash function to obtain a result value, and comparing the result value with the received end point value of the one-way hash chain to obtain a hash value comparison result; the value of k is obtained by converting the value of k by combining authentication position index calculation based on the sequence number and the measurement value in the header message; Performing hash calculation by using an HMAC verification method based on a pre-shared secret key and a hash function and combining an immutable field in the extracted header message to obtain a verification HMAC value, and comparing the verification HMAC value with the HMAC value of the immutable field to obtain an HMAC value comparison result; And determining that the enhanced routing message is adopted or discarded based on the hash value comparison result and the HMAC value comparison result.
  9. 9. A wireless ad hoc network routing protocol security system for an unmanned cluster, comprising: the analysis module is used for receiving nodes of the wireless ad hoc network and receiving and analyzing header messages of the enhanced routing messages; And the security verification module is used for the receiver node to respectively calculate a hash value and an HMAC value of the header message, verify the header message based on the hash value and the HMAC value and determine that the enhanced routing message is adopted or discarded.
  10. 10. A wireless self-organizing network routing protocol security system of an unmanned cluster is characterized by comprising a plurality of wireless self-organizing network nodes which are mutually connected through a wireless self-organizing network and run a routing protocol; Each wireless ad hoc network node plays a role of a sender node or a receiver node at different moments; When each wireless self-organizing network node is used as a sender node, a trust anchor point message in a routing message is determined based on a working mechanism of a routing protocol in the wireless self-organizing network and by combining communication overhead and a trust origin principle; And respectively carrying out hash value and HMAC value calculation on the header information, verifying the header information based on the hash value and the HMAC value, and determining that the enhanced routing information is adopted or discarded.

Description

Wireless self-organizing network routing protocol security method and system of unmanned cluster Technical Field The invention relates to the technical field of information transmission, in particular to a wireless ad hoc network routing protocol security method and system of an unmanned cluster. Background Along with the continuous development of cooperative control technology and cluster intelligence, the application of large-scale unmanned clusters for cooperatively executing tasks is also becoming wider and wider. When the large-scale cluster task is actually applied, a large amount of frequent data transmission and interaction are often needed to achieve an ideal task execution effect. For unmanned clusters, a task application may include multiple platforms of various unmanned devices, such as unmanned aerial vehicles, unmanned boats, unmanned vehicles, and the like, and the platforms need to be connected to a unified communication network. And unmanned platform application is often carried out outdoors, and the required network environment is a wireless ad hoc network. The wireless ad hoc network has the characteristics of no center and dynamic networking, and has higher flexibility. However, the radio signal is easy to be scanned by the spectrometer, if the same-frequency receiving equipment is used, the signal of the message sent by each node in the network can be received, and the node message can be obtained and tampered by being accessed to the network as an illegal node, so that the security of the network is damaged. The existing wireless ad hoc network security system schemes are mainly applicable to clusters with fixed configuration service centers and stable network conditions, such as hidden SSID (SERVICESETIDENTIFIER, wireless user name) and the like. Wireless ad hoc networks, which fixedly configure service centers and robust networks, although also belonging to ad hoc networks, typically operate in a controlled or semi-controlled environment and are not arbitrarily dynamic. The position and the number of the nodes are planned and authorized, the network has an invisible center to maintain the identity of the network, and the scheme is simple and effective in the scene of member fixation and no need of frequent dynamic networking, but the scheme cannot be suitable for the pure Ad-hoc environment (namely, the self-organizing network environment which is completely decentralised, has no infrastructure support and has dynamic change of the nodes) that the nodes leave at any time and are mutually different from each other. And the method for safely expanding the routing protocol of the unmanned cluster in the wireless ad hoc network environment is less involved. In recent years, unmanned cluster technology has developed rapidly and is increasingly widely used. Therefore, a routing protocol security extension method for protecting network nodes from being interfered by external malicious nodes is designed aiming at unmanned clusters in a wireless ad hoc network environment, and is a problem to be solved urgently. Disclosure of Invention In order to overcome the defects in the prior art, the invention provides a wireless ad hoc network routing protocol security method of an unmanned cluster, which comprises the following steps: A sender node in the wireless ad hoc network determines a trust anchor message in a routing message based on a working mechanism of a routing protocol in the wireless ad hoc network and by combining communication overhead and a trust origin principle; the sender node utilizes a hash algorithm and an HMAC verification method to carry out security field expansion on the head of the trust anchor message, constructs an enhanced routing message, and broadcasts the enhanced routing message to the wireless ad hoc network. Optionally, the sender node performs security field expansion on the header of the trust anchor message by using a hash algorithm and an HMAC verification method, and constructs an enhanced routing message, including: extracting a hash value of an authentication position from a pre-generated one-way hash chain according to a sequence number and a hop count in a variable field of the trust anchor message head and combining an authentication position index calculation formula, wherein the one-way hash chain is generated based on a hash function; Performing hash calculation by utilizing an HMAC verification method based on a pre-selected key and a hash function and combining an invariable field of the message head of the trust anchor to obtain an HMAC value of the invariable field; and filling the HMAC value of the invariable field and the hash value of the authentication position into the head of the information anchor point message to carry out safety field expansion, so as to obtain the enhanced routing message. Optionally, the authentication location index calculation formula is: in the formula, Representing the authentication location in the one-way hash cha