期刊文献+

基于信任机制的水下传感器网络节点安全定位算法 被引量:3

Node secure localization algorithm in underwater sensor network based on trust mechanism
下载PDF
导出
摘要 为了及时检测出水下传感器网络(UWSN)定位系统中的恶意锚节点,提出一种基于信任机制的节点安全定位算法。算法结合簇结构和信任机制,根据锚节点提供的位置信息采用Beta分布作出初步信任评价,并可根据需要调整信任更新权重。为了降低了水声信道的不稳定性对信任评价过程的影响,同时识别恶意锚节点的信任欺骗行为,提出信任过滤机制(TFM),对直接信任值进行差异量化,由簇头节点决定各锚节点是否可信。仿真结果表明所提算法适用于水下传感器网络,并且能够及时识别恶意锚节点,在定位系统的精确度和安全性方面都有很大提升。 A new security localization algorithm based on trust mechanism was proposed to recognize the malicious beacon nodes timely in UnderWater Sensor Network (UWSN). According to the location information offered by the beacon 'nodes and combining cluster structure with trust mechanism, this algorithm used Beta distribution to form the initial trust value and the trust update weight could he set as required. In order to reduce the influence of the instability of underwater acoustic channel on the trust evaluation process, meanwhile, recognize the trust cheating of malicious beacon nodes, this algorithm proposed a mechanism named TFM (Trust Filter Mechanism), which calculated and quantized the trust value, and let the cluster head node decide whether each beacon node was credible or not. The results of simulation prove that the proposed algorithm is suitable for UWSNs and it can recognize malicious beacon nodes timely, and the accuracy and security of localization system are greatly improved.
出处 《计算机应用》 CSCD 北大核心 2013年第5期1208-1211,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61162003 61202379) 青海省科技项目(2012-Z-902)
关键词 水下传感器网络 安全定位 节点捕获 入侵检测 信任机制 UnderWater Sensor Network (UWSN) secure localization node capture intrusion detection trust mechanism
  • 相关文献

参考文献16

  • 1李淑秋,李启虎,张春华.第六讲 水下声学传感器网络的发展和应用[J].物理,2006,35(11):945-952. 被引量:35
  • 2黎作鹏,蔡绍滨,张菁,高振国,赵靖.水声传感器网络节点定位技术综述[J].小型微型计算机系统,2012,33(3):442-447. 被引量:7
  • 3CHENG X Z, SHU H N, LIANG Q L, et al. Silent positioning in un- derwater acoustic sensor networks[ J]. IEEE Transactions on Vehicu- lar Technology, 2008, 57(3) : 1756 - 1766.
  • 4KIM E, LEE S, KIM C, et al. Long-range beacons on sea surface based 3D-localization for underwater sensor networks[ C] // Pro- ceedings of the 5th International Conference on Mobile Ad-Hoc and Sensor Networks. Piscataway: IEEE, 2009:102 -107.
  • 5EROL M, VIERA L F M, GERLA M. Localization with Dive'N'rise (DNR) beacons for underwater acoustic sensor networks [ C] // WuWNet '07: The Second ACM International Workshop on Under- water Networks. New York: ACM, 2007:97 - 100.
  • 6EROL M, VIEIRA L F, GERLA M. AUV-aided localization for un- derwater sensor networks[ C] //Proceedings of International Confer- ence on Wireless Algorithms, Systems and Applications. Piscataway: IEEE, 2007:44 - 54.
  • 7LUO H-J, ZHAO Y-Y, GUO Z-W. UDB: using directional beacons for localization in underwater sensor network[ C] // Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems. Piscataway: IEEE, 2008:551 -556.
  • 8曹晓梅,俞波,陈贵海,任丰原.传感器网络节点定位系统安全性分析[J].软件学报,2008,19(4):879-887. 被引量:15
  • 9BAO F Y, CHEN I-R, CHANG M J. Trust-based intrusion detection in wireless sensor networks[ C] // Proceedings of 2011 IEEE Interna- tional Conference on Communications. Piscataway: IEEE, 2011 : 1 - 6.
  • 10康松林,王彦东,李慧.信任模型在无线传感器网络入侵检测中的应用[J].计算机工程与应用,2012,48(5):89-92. 被引量:3

二级参考文献85

  • 1王珊珊,殷建平,蔡志平,张国敏.基于RSSI的无线传感器网络节点自身定位算法[J].计算机研究与发展,2008,45(z1):385-388. 被引量:30
  • 2程伟明,周新运.一个用于Ad Hoc网络的分簇方法[J].计算机学报,2005,28(5):864-869. 被引量:18
  • 3王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 4LIU DONGGANG. Secur/ty mechanisms for wireless sensor networks [D]. Raleigh, NC: North Carolina State University, 2005.
  • 5ZENG YINGPEI, CAO JIANNONG, HONG JUE, et al. Secure localization and location verification in wireless sensor networks [ C]// IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems. Washington, DC: IEEE Computer Society, 2009: 864- 869.
  • 6GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks [J]. ACM Transactions on Sensor Networks, 2007, 4(3): 1 -36.
  • 7Ganeriwal S, Srivastava M B.Reputation-based framework for high integrity sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN' 04) ,Washington DC,USA,2004:66-77.
  • 8Jcsang A.A subjective metric of authentication[C]//Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS), Louvain-la-Neuve, Belgium, 1998: 329-344.
  • 9Krasniewski M,Varadharajan P,Hu Y C,et al.TIBFIT:Trust Index Based Fault Tolerance for arbitrary data faults in sensor networks[C]//Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN' 05), Yokohama, Japan, 2005 : 672-681.
  • 10Badal C.Saha.; Hemicellulose bioconversion[J]. J Ind Microbiol Biotechnol,2003,30:279-291.

共引文献121

同被引文献27

  • 1王良民,廖闻剑.无线传感器网络可生存理论与技术研究[M].北京:人民邮电出版社,2011.
  • 2Sedjelmaci H, Senouci S M. Efficient and lightweight intrusion de- tection based on nodes' behaviors in wireless sensor networks[C]// Proc. of the IEEE International Conference on Global Information Infrastructure Symposium, 2013:1 - 6.
  • 3Bao F, Chen R, Chang M J, et al. Trust-based intrusion detec- tion in wireless sensor networks[C]//Proc, of the IEEE Inter- national Conference on Communications, 2011 : 1 - 6.
  • 4Estiri M, Khademzadeh A. A game-theoretical model for intru- sion detection in wireless sensor networks [C]//Proc. of the 23rd Canadian Conference on Electrical and Computer Engi- neering, 2010 : 1 - 5.
  • 5Tian J W, Gao M J, Zhou S R. Wireless sensor network for community intrusion detection system based on classify support vector machine[C]//Proc, of the IEEE International Confe- rence on Information and Automation, 2009 : 1217 - 1221. . of the 19th Wireless and Optical Communications Conference, 2010 : 1 - 7.
  • 6Ponomarchuk Y, Seo D W. Intrusion detection based on traffic analysis in wireless sensor networks [C]//Proc.
  • 7Lopez J, Roman R, Agudo I,et al. Trust management system for wireless sensor networks: best practices[J]. Computer Commu- nication, 2010, 33(9): 1086 - 1093.
  • 8Liu C, Liu Y, Zhang Z. Improved reliable trust-based and ener gy efficient data aggregation for wireless sensor networks [J].International Journal of Distributed Sensor Networks, 2013 (2013):1 -11.
  • 9Gerrigagoitia K, Uribeetxeberria R, Zurutuza U, et al. Repu ration based intrusion detection system for wireless sensor net- works[C]//Proc, of the IEEE International Conference on Complexity in Engineering, 2012 : 1 - 5.
  • 10Jsang A, Ismail R. The beta reputation system[C]//Proc, of the 15th Bled Electronic Commerce Conference, 2002 : 41 - 55.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部