期刊文献+

一种新的RSSI安全定位协议 被引量:1

New and secure location protocol based on RSSI
下载PDF
导出
摘要 在分析现有安全定位方法及其特点的基础上,提出一种基于簇头检测、结合对称加密和非对称加密的安全定位协议,引入质心法对定位结果进行校正。仿真结果表明该定位协议具有较高的定位精度,并能有效地抵御恶意节点的攻击。 Based on the analysis of known secure positioning methods and their shortcomings, this paper proposed a new and secure location protocol by cluster head detection as well as using the asymmetric encryption and symmetric one. Furthermore, it used centroid method to calibrate the positioning data. The simulation results show that the proposed locating protocol experiences a high precision of location and it can defense the attack of malicious nodes very well.
出处 《计算机应用研究》 CSCD 北大核心 2013年第8期2503-2505,2519,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170219)
关键词 接收信号强度指示 恶意节点 安全定位 质心法 定位精度 RSSI malicious nodes secure location centroid method location precision
  • 相关文献

参考文献12

  • 1KAHN J M, KATZ R H, PISER K S J. Next century challenges : mobile networking for smart dust [ C ]//Proc of the 5th Annual ACM/IEEE and Networking. New York : ACM Press, 1999 : 263- 270.
  • 2LI Zang,TRAPPE W,ZHANG Y,et al. Robust statistical methods for securing wireless localization in sensor networks [ C ]//Proc of Interna- tonal Symposium on Information Processing in Sensor Networks. Washington DC :IEEE Computer Society,2005:91-98.
  • 3DU Wen-liang, DENG Jing, HAN Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [ J]. IEEE Yrans on Dependable and Secure Computing, 2006,3 (2) : 62- 77.
  • 4DU Wen-liang, FANG Lei, PENG Ning. LAD : location anomaly detec- tion for wireless sensor networks [ J ]. Elsevier Journal of Parallal and Distributed Computing,2005,66 (4) : 874- 886.
  • 5王伟,王华奎.基于RSSI无线传感网络的Sybil攻击检测技术研究[J].太原理工大学学报,2011,42(1):25-29. 被引量:3
  • 6彭保,顾学迈.无线传感器网络中基于验证点的安全定位协议[J].吉林大学学报(工学版),2008,38(5):1186-1190. 被引量:1
  • 7马梁,彭保.一种基于RSSI的无线传感网络安全定位算法[J].兵工自动化,2012,31(3):44-46. 被引量:5
  • 8CAPKUN S, RASMUSSEN K, CAGALI M. SecNav : secure broadcast localization and time synchronization in wireless networks [ C ]//Proc of the 13th Aunual ACM International Conference on Mobile Compu- ting and Networking. New York : ACM Press,2007:310- 313.
  • 9SUPRAKASH D, CHR]S K, MASOOMEH R. Distributed localization in static and mobile sensor networks[ C]//Proc of IEEE International Conference on Wireless and Mobile Computing, Networking and Com- munications. 2006 : 69- 76.
  • 10GIROD L, ESTRIN D. Robust range estimation using acoustic and multimodal sensing [ C ]//Proc of IEEE/RSJ International Conference on Intelligent Robots and Systems. Mani:IEEE Robotics and Automa- tion Society,2001 : 1312-1320.

二级参考文献61

  • 1Nicolescu D, Nath B. Ad2Hoc positioning systems (APS)[C]//Proceedings of 2001 IEEE Global Telecommunications Conference (IEEE GLOBECOM 01). San Antonio: IEEE Communications Society, 2001:2926-2931.
  • 2Niculescu D, Nath B. DV based positioning in ad hoc networks[J]. Journal of Telecommunication S ystems, 2003,22( 1/2/3/ 4) :267-280.
  • 3Patil M M, Shaha U, Desai U B, et al. Localization in wireless sensor networks using three masters[C]//Personal Wireless Communications, ICPWC 2005. New Delh : IEEE, 2005 : 384-388.
  • 4Philippe Golle, Dan Greene, Jessiea Staddon. Detecting and correcting malicious data in vanets[C] ffVANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. USA..New York, 2004:29-37.
  • 5Newsome J,Shi E, Song D,et al. The sybil attack in sensor networks : analysis & defenses[C]//MSWiM' 04 : Proceedings of the third international symposium on Information processing in sensor networks, 2004::259-268.
  • 6Kotz D, Newport C,Gray R S, et al. Exerimental evaluation of wireless simulation assumptions[C]//MSWiM' 04 : Proceedings of the 7th ACM international symposium on Modeling,analysis and simulation of wireless and mobile systems, 2004:78- 82.
  • 7Zhou G, He T,Krishnamurthy S, et al. Impact of rado irregularity on wireless sensor networks[C] ff MobiSys ' 04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004 : 125-138.
  • 8Capkun S, Cagalj M, Srivastava M. Secure Localization with Hidden and Mobile Base Stations[C],//Proc of the 25th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'06). Barcelona, Spain, 2006:23-29.
  • 9Hu Yih-Chun, Perrig A, Johnson DB. Wormhole attacks in wire-less networks. Selected Areas in Communications[J]. IEEE Journal, 2006,24(2) :370-380.
  • 10Fredric Newberg. Wireless sensor networks design and implementation[D]. Los Angeles: University of California, Los Angeles, 2002.

共引文献18

同被引文献6

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部