期刊文献+

无线传感器网络中DPC安全定位算法研究 被引量:6

Research on secure DPC localization algorithm of WSN
下载PDF
导出
摘要 在资源受限的无线传感器网络中,如何安全、有效地获取节点位置信息是一个极具挑战性的问题,通过对多种安全定位算法分析,提出了一种分散式的基于RSSI测距的DPC安全定位算法,算法应用测量一致性以及测量与计算一致性原理检测并滤除多种恶意攻击生成的虚节点,而且算法没有设计中心节点,所有的正常节点都参与安全定位算法,对算法性能的讨论以及实验结果表明,在噪声环境和虚节点较多的情况下,DPC算法仍然有很高的效率,并能应对多种恶意攻击。 In resource-constrained sensor networks, how to locate the sensor's coordinates securely and effectively is one of the most challenging problems. A lot of algorithms of the security localization were analyzed, and a distributed RSSI-based DPC (distance and position consistent) security location algorithm was brought forth. The algorithm can detect and filter out the false nodes that are generated by malicious attacks applying the consistency of measure and computing; meanwhile all the nodes are involved in the activation without a central node. The performance of the algorithm is studied, and the experimental results show that DPC still has very high efficiency and good robustness in noisy conditions with a number of false nodes.
出处 《通信学报》 EI CSCD 北大核心 2011年第12期8-17,共10页 Journal on Communications
基金 国家自然科学基金资助项目(50807011) 湖南省科技厅资助计划(2010FJ4068) 中国科学院红外物理国家实验室资助项目(201021)~~
关键词 定位攻击 安全定位 测量一致性 DPC算法 position attack security localization measure consistency distance and position consistent algorithm
  • 相关文献

参考文献23

  • 1任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1708
  • 2SHAIKH R A. Securing distributed wireless sensor networks: issues and guidelines[A]. Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006 IEEE International Conference[C]. Taichung, Taiwan.2006.226-231.
  • 3SRINIVASAN A,TEITELBAUM J,WU J. DRBTS: distributed reputation-based beacon trust system[A].Proc of 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing[C]. Indianapolis: IEEE,2006.277-283.
  • 4Thomson JA. Molecular biology of xylan degradation[J]. FEMS Microbiol Rev, 1993,104:65-92.
  • 5黄晓,程宏兵,杨庚.基于身份的无线传感器网络定位认证方案[J].通信学报,2010,31(3):115-122. 被引量:4
  • 6LIU D,NING P, DU W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[A].The 25th ICDCS[C] Columbus ,Ohio ,USA. 2005:609-619.
  • 7DU W, FANG L, NING P. Lad: localization anomaly detection forwireless sensor networks[A]. The 19th IPDPS[C]. 2005.41.
  • 8RITESH M, GAO J, DAS S R. Detecting wormhole attacks in wireless networks using connectivity information[A]. Proc of the 26th Annual IEEE Conference on Computer Communications(INFOCOM '07)[C].Anchorage, Alaska, 2007.107-115.
  • 9靖刚,吴俊敏,徐宏力,黄刘生.基于对称密码的无线传感器网络安全定位[J].计算机工程,2009,35(12):117-119. 被引量:4
  • 10MEADOWS C,POOVENDRAN R,PAVLOVIC D, et al, Distance bounding protocols: Authentication logic analysis and collusion attacks[A]. Poovendran R,et al,eds.Secure Localization and Time Synchronization for Wireless Sensor and Ad Networks Springer-Verlag[C] 2007.

二级参考文献70

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2Adi Shamir.无线电传播简介:专用术语,室内传播和路径损耗计算及实例[J].今日电子,2002(z1):26-30. 被引量:15
  • 3常戎,吕善伟,张江林.提高NLOS环境下定位精度的TOA数据处理方法[J].北京航空航天大学学报,2006,32(8):946-949. 被引量:3
  • 4Bulusu N, Heidemann J, Estrin D. GPS-less Low Cost Outdoor Localization for Very Small Devices[J]. IEEE Personal Communications Magazine, 2000, 7(5): 28-34.
  • 5Shen Xingfa, Wang Zhi, Jiang Peng, et al. Connectivity and RSSI Based Localization Scheme for Wireless Sensor Networks[C]//Proc. of IEEE 2005 International Conference on Intelligent Computing. Berlin, Germany: Springer-Verlag, 2005: 578-587.
  • 6Liu Donggang, Ning Peng, Du Wenliang. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks[C]//Proc. of the 25th Int'l Conf. on Distributed Computing Systems. Washington, USA: IEEE Computer Society Press, 2005.
  • 7Stallings W. Cryptography and Network Security Principles and Practices[M]. 4th ed. [S.l.]: Prentice Hall, 2005-11.
  • 8Wang Haodong, Sheng Bo, Li Qun. Elliptic Curve Cryptography Based Access Control in Sensor Networks[J]. International Journal of Security and Networks, 2006, 1(3/4): 127-137.
  • 9Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks[C]//Proceedings of ACM SenSys'04. Maryland, USA: [s. n.], 2004.
  • 10AKYILDIZ F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey[J]. Computer Networks, 2002, 38(4): 393-422.

共引文献1765

同被引文献32

  • 1Martusevicius V, Kazanavicius E. Self-localization system for wireless sensor network. Elektronika Ix Elektrothchnika, 2010, 16(10): 17-20.
  • 2Feng WJ, Bi XW, Jiang R. A novel adaptive cooperative location algorithm for wireless sensor networks. International Journal of Automation and Computing, 2012, 9(5): 539-544.
  • 3Lin C, Xiong N, Park JH, et al. Dynamic power management in new architecture of wireless sensor networks. International Journal of Communication Systems, 2009, 22(6): 671-693.
  • 4Yedavalli K, Krislmamachari B. Sequence-based localization in wireless sensor networks. IEEE Transactions on Mobile Computing, 2008, 7(1): 81-94.
  • 5Karaboga D, Okdem S, Ozturk C. Cluster based wireless sensor network routing using artificial bee colony algorithm. Wireless Networks, 2012, 18(7): 847-860.
  • 6Wang A, Yang D, Sun D. A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks. Computers & Electrical Engineering, 2012, 38(3): 662-671.
  • 7Okdem S, Ozturk C, Karaboga D. A comparative study on Differential Evolution based routing implementations for wireless sensor networks. Innovations-in Intelligent Systems and Applications (INISTA), 2012 International Symposium on. IEEE. 2012. 1-5.
  • 8Murthy JK, Kumar S, Srinivas A. Energy efficient scheduling in cross layer optimized clustered wireless sensor networks. Int'l Journal of Computer Science and Communication, 2012, 3(1): 149-153.
  • 9SHAIKH R A. Securing distributed wireless sensor networks:issues and guidelines[A].Taichung,Taiwan:IEEE Inc,2006.226-231.
  • 10BOUKERCHE A,OLIVEIRA HAB,NAKAMURA E F,LOUREIRO A A F. Secure localization algorithms for wireless sensor networks[J].IEEE Communications Magazine,2008.96-101.

引证文献6

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部