期刊文献+

一种容忍恶意锚节点独立攻击的安全定位算法 被引量:3

A Secure Localization Algorithm Against Non-Coordinated Attack of Malicious Node
下载PDF
导出
摘要 无线传感器网络中节点定位的准确性是网络能否得到合理应用的关键。在恶意危险的环境中,一些定位节点可能会受到攻击者的影响,以至于不能精确定位。文章提出了一种高效的无线传感器网络安全定位算法,该算法结合梯度下降法和异常检测技术,通过过滤掉恶意的数据,实现了高精度的定位。仿真结果表明,在受到独立攻击时,该算法能达到预期的效果,利用较少的计算资源达到了比现有算法更优的性能。 The accurate position of nodes is the key to reasonable application of the wireless sensor networks. Some nodes may be influenced by attackers under malicious and dangerous environment so that they can not locate their position accurately. The article presents an efficient and effective algorithm for secure localization. Combining the gradient descent method and outher detection technology,the algorithm filters out malicious measurement data then it can achieve high-precision localization. Results show that the algorithm can achieve the desired effect under non- coordinated attack, and perform better than existing algorithms with less computing resources.
出处 《传感技术学报》 CAS CSCD 北大核心 2013年第12期1724-1727,共4页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61172089) 湖南省科技厅项目(2012FJ4119)
关键词 无线传感器网络 安全定位 梯度下降法 异常检测 独立攻击 wireless sensor networks (WSNs) secure localization gradient descent method outlier detection non-coordinated attack
  • 相关文献

参考文献14

二级参考文献53

共引文献252

同被引文献32

  • 1Dong B,Mahdy A M.Underwater wireless sensor networks:Efficient schemes using semidefinite programming[J].International Journal on Advances in Networks and Services,2010,3(1):186-195.
  • 2Adel G A E,Hussein A E,Salwa E R,et al.An energy aware WSNs geographic routing protocol[J].Universal Journal of Computer Science and Engineering Technology,2010,1(2):105-111.
  • 3He D,Cui L,Huang H,et al.Design and verification of enhanced secure localization scheme in wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2009,20(7):1050-1058.
  • 4Jian L,Yang Z,Liu Y.Beyond triangle inequality:Sifting noisy and outlier distance measurements for localization[C]∥IEEE Proceedings of INFOCOM,2010:1-9.
  • 5Misra S,Xue G,Bhardwaj S.Secure and robust localization in a wireless Ad Hoc environment[J].IEEE Transactions on Vehicular Technology,2009,58(3):1480-1489.
  • 6Zeng Y,Cao J,Hong J,et al.Secure localization and location verification in wireless sensor networks:A survey[J].The Journal of Supercomputing,2013,64(3):685-701.
  • 7Zeng Y,Cao J,Hong J,et al.SecM CL:A secure Monte Carlo localization algorithm for mobile sensor networks[C]∥IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems,2009:1054-1059.
  • 8Zeng Y,Cao J,Zhang S,et al.Pollution attack:A new attack against localization in wireless sensor networks[C]∥IEEE Wireless Communications and Networking Conference,2009:1-6.
  • 9Amitangshu P.Localization algorithm in wireless sensor networks:Current approaches and future challenges[J].Network Protocol and Algorithm,2010,2(1):45-74.
  • 10Mao G, Fidan B, Anderson BDO. Wireless Sensor Network Local- ization Techniques[J].Computer Networks, 2007,51 (10) : 2529-2553.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部