期刊文献+

卫星传感器网络中基于可信节点的安全定位算法

Secure Localization Protocol Based on Validation Node in Wireless Sensor Network
下载PDF
导出
摘要 安全性作为评估无线传感器网络定位算法性能的主要指标.虽然近年几个安全定位算法从不同程度上解决这一问题,但都存在着不足。针对恶意攻击存在环境下,卫星传感器网络中节点的自定位问题,基于验证点思想提出既能使用不同定位算法,又不需要增加甚至不用锚点的高质量安全定位协议—SLPVN-LA。SLPVN-LA利用各节点的定位误差服从相同概率分布且相互独立的性质,结合验证点思想和某种定位算法实现节点安全定位。基于MMSE定位算法的协议性能仿真表明,算法可以有效克服恶意锚点的影响。 Security as mostly index of evaluating performance of localization arithmetic for wireless sensor networks, although several secure localization algorithms resolve this problem to different degree there still exists some shortage. For solving the self-positioning of nodes in sensor network (SN) on the environment with malicious at- tacks, one protocols is presented which do not increase the number of beacon as well as perfect hardware based on the thought of validation node--SLPVN-LA. SLPVN-LA realizes the localization by using dynamic validation node combining some kind of localization algorithm mechanism. Secure analysis and simulation of protocol performance based on MMSE localization algorithm show that the protocol not only overcomes the infection of vicious beacon but also has good resistance ability against some known attacks.
作者 刘元芳 彭保
出处 《科学技术与工程》 2008年第21期5863-5866,5871,共5页 Science Technology and Engineering
基金 国家自然科学基金(60532030)资助
关键词 无线传感器网络 安全定位 可信节点 wireless sensor network secure localization validation node
  • 相关文献

参考文献7

  • 1[1]Hill J L.System architecture for wireless sensor networks.Berkeley:UC Berkeley,2003
  • 2[2]Li Z,Trappe W,Zhang Y,et al.Robust statistical methods for securing wireless localization in sensor networks.//Proc.of Proceedings of the Fourth International Conference on Information Processing in Sensor Networks(IPSN 05).UCLA:IEEE Signal Processing Society and ACM SIGBED,2005:91-98
  • 3[3]Du W L,Deng J,Han Y.S,et al.A key predistribution scheme for sensor networks using deployment knowledge.IEEE Tran on Dependable and Secure Computing,2006;3(2):62-77
  • 4[4]Wang Q,Zhu Y,Cheng L.Reprogramming wireless sensor networks:challenges and approaches.IEEE Network,2006;20(3):48-55
  • 5[5]Shi E,Perrig A.Designing secure sensor networks.IEEE Wireless Communications,2004;11(6):38-43
  • 6[6]Du W,Fang L,Peng N.LAD:localization anomaly detection for wireless sensor networks.Elsevier Journal of Parallel and Distributed Computing,2005; 66(4):874-886
  • 7[7]Lazos L,Poovend ran R.H:RLov:high resolution robust localization for wireless sensor networks.IEEE Journal on Selected Areas in Communications,2006;24(2):233-246

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部