期刊文献+

用于无线传感器网络的抗攻击节点定位算法 被引量:5

Attack-resistant node localization algorithm for wireless sensor networks
原文传递
导出
摘要 为了提高无线传感器网络在存在恶意攻击时的节点定位精度,该文分析了2种典型的攻击模型对节点定位精度的影响,并提出了一种抗攻击的节点定位算法。抗攻击的节点定位算法首先从全部锚节点集合中选择出尽可能不包含恶意锚节点的锚节点子集,然后利用该子集中的锚节点实现定位。仿真结果表明,当存在恶意攻击时,已有的大多数定位算法节点定位精度将显著降低;与已有的大多数的定位算法相比,抗攻击的定位算法可将定位精度提高约22%~31%。 The accuracy of location discovery for wireless sensor networks in hostile environments is improved by analyses of the effects of two attacks that are unique to localization algorithms and an attack-resistant localization algorithm. The attack-resistant localization algorithm can he divided to two steps. First, an appropriate anchor node subset is found that removes the malicious anchor nodes out. Then, the accurate locations of the sensors are calculated using the anchor node subset. Simulations show that the location discovery accuracy deteriorates in hostile environments for most existing localization algorithm, which the attack-resistant localization algorithm improves the location discovery accuracy by 22% to 31%.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第10期1606-1608,共3页 Journal of Tsinghua University(Science and Technology)
关键词 无线传感器网络 定位算法 锚节点 抗攻击 wireless sensor networks localization algorithm anchor node attack-resistant
  • 相关文献

参考文献10

  • 1Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor network: A survey [J]. Computer Networks, 2002, 38(4): 393- 422.
  • 2Qi Hairong, Kuruganti P T, XU Yingyue. The development of localized algorithms in wireless sensor networks [J]. Sensors, 2002, 2(7) : 286 - 293.
  • 3Bahl P, Padmanabhan V N. RADAR: An in-building RF-based user location and tracking system [EB/OL]. (2000). http: //research. microsoft.com/ - padmanab/ papers/infocom2000, pdf.
  • 4Niculescu D, Nath B. Ad hoc positioning system(APS) using AOA[C]// INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, CA: IEEE Press, 2003: 1734- 1743.
  • 5Bulusu N, Heidemann J, Estrin D. GPS-less low cost outdoor localization for very small devices [J]. IEEE Personal Communications, 2000, 7(5):28 - 34.
  • 6Niculeseu D, Nath B. Ad hoe Positioning System[C]// GLOBECOM 2001. San Antonio, TX: IEEE Press, 2001: 2926 - 2931.
  • 7HE Tian, HUANG Chengdu, Blum B M, et al. Range-free localization schemes in large scale sensor networks [C]// MobiCom 2003. the Ninth Annual International Conference on Mobile Computing and Networking. San Diego, CA: ACM Press, 2003 : 81 - 95.
  • 8FANG Lei, DU Wenliang, Ning Peng. A beacon-less location discovery scheme for wireless sensor networks[C]// INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami, FL: IEEE Press, 2005: 161-171.
  • 9SUN Guolin, GUO Wei. Comparison of distributed localization algorithms for sensor network with a mobile beacon[C]// Proe the 2004 IEEE International Conference on Networking, Sensing and Control. Taibei: IEEE Press, 2004 :536 - 540.
  • 10Galstyan A, Krishnamachari B, Lerman K, et al. Distributed online localization in sensor networks using a mobile target[C]// Proc the International Symp on Information Processing Sensor Networks. Barkeley, CA, 2004:61 - 70.

同被引文献34

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2江正川.多AGV群控调度的蚁群算法研究[J].科技信息,2013,0(36):63-64. 被引量:1
  • 3陈永光,李修和.基于信号强度的室内定位技术[J].电子学报,2004,32(9):1456-1458. 被引量:48
  • 4王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:673
  • 5邓强,黄顺吉.最大似然估计在GPS定位中的应用研究[J].电子科技大学学报,1996,25(1):11-15. 被引量:5
  • 6Douceur J. The Sybil Attack[ C]//Proceedings of Internation- al Workshop on Peer - To - Peer Systems. Cambridge: Springer, 2002: 251 - 260.
  • 7Levine B N, Rwiter M K, Wang C. Timing attacks in low- latency mix - based systems[ C]//Proceedings of the 8th In- ternational Conference on Financial Cryptography. Key West: Springer, 2004: 251 - 265.
  • 8Haifeng Yu, Michael Kaminsky, Phillip B Gibbons. Sybil- Guard: Defending Against Sybil Attacks via Social Networks [C]//Proceedings of the ACM SIGCOMM Conference on Computer Communications. Pisa: ACM, 2006: 267 - 278.
  • 9Demirbas M, Song Y. An RSSI - based Scheme for Sybil At- tack Detection in Wireless Sensor Networks[CJ//Proceedings of 2006 International Symposium on Wireless, Mobile and Multimedia Networks. Buffalo: IEEE, 2006:564 - 570.
  • 10Mohd Nazri Ismail, Abdullah Mohd Zin. Network Analyzer Development: Independent Data OPNET Simulation Tool and Real Network Comparison[ J]. Management and Tech- nology, 2010,1(1) :97 - 105.

引证文献5

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部