期刊文献+

基于权重的差值化多轮投票车载自组织网络位置验证机制

Multi-round vote location verification mechanism based on weight and difference value in vehicular Ad Hoc network
下载PDF
导出
摘要 针对车载自组织网络(VANET)位置验证的共谋攻击问题,提出了一种基于权重的差值化多轮投票位置验证机制。该机制通过引入静态帧以及重新设计信标帧(Beacon)消息格式缓解位置验证延时,并设置恶意车辆过滤环节,使得具有不同信任度的邻居对特定区域中的位置进行基于权重的多轮投票,以获得可信的位置验证。实验结果表明,在位置验证算法的正确率方面,多个恶意车辆发起合谋攻击时该机制算法的正确率仍能达到93.4%,与基于最小均方误差(MMSE)的位置验证方案相比,能获得更高的检测率。 To solve the problem of location verification caused by collusion attack in Vehicular Ad Hoc NETworks (VANET), a multi-round vote location verification based on weight and difference was proposed. In the mechanism, a static frame was introduced and the Beacon message's format was redesigned to alleviate the time delay of location verification. By setting malicious vehicles filtering process, the position of the specific region was voted by the neighbors with different degrees of trust, which could obtain credible position verification. The experimental results illustrate that in the case of collusion attack, the scheme achieves a higher accuracy of 93.4% compared to Minimum Mean Square Estimation (MMSE) based location verification mechanism.
出处 《计算机应用》 CSCD 北大核心 2014年第10期2771-2776,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(60972036)
关键词 权重 差值 多轮投票 位置验证 weight difference multi-round vote location verification
  • 相关文献

参考文献13

  • 1熊飚,张小桥.VANET网络中小尺度衰落信道仿真[J].通信技术,2010,43(12):56-57. 被引量:10
  • 2SONG J H, WONG V W S, LEUNG V C M. Secure location verifi- cation for vehicle Ad Hoc networks [ C]// Proceedings of the 2008 Global Telecommunications Conference. Piscataway: IEEE Press, 2008:1 - 5.
  • 3ZHANG P, ZHANG Z, BOUKERCHE A. Cooperative loeation veri- fication for vehicular Ad Hoe networks [ C]// International Confer- cnce on Communications. Piseataway: IEEE Press, 2012:37 -41.
  • 4LAURENDEAU C, BARBEAU M. Prnbabilistic loealization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks[ J]. Journal on Wireless Communications and Networking, 2009, 2(4) : 1 - 13.
  • 5XUE X, LIU M, LIN N, et al. TSLV: time-slice-based location verification for VANET [ J]. China Communieations, 2011, 8 (5): 130 - 143.
  • 6FOGUE M, MARTINEZ F J, GARRIDO P, et al. On the use of a cooperative neighbor position verification scheme to secure warning message dissemination in VANETs [ C]// Proceedings of the 38th IEEE Conference on Local Computer Networks. Piscataway: IEEE Press, 2013:276 -279.
  • 7杨跃,王福豹,段渭军.无线传感器网络安全定位研究[J].信息安全与通信保密,2008,30(9):56-60. 被引量:10
  • 8ABU-ELKHEIR M, HASSANEIN H S, ELHENAWY I M, et al. Map-guided trajectory-based position verification for vehicular net- works [ C]// Proceedings of the 2012 IEEE Wireless Communica- tions and Networking Conference. Piscataway: IEEE Press, 2012: 2538 - 2542.
  • 9ABU-ELKHEIR M, HAMID S A, HASSANEIN H S, et al. Posi- tion verification for vehicular networks via analyzing two-hop neigh- bors information [ C]// Proceedings of the 2011 IEEE 36th Confer- ence on Local Computer Networks. Piscataway: IEEE Press, 2011: 805 - 812.
  • 10WEERASINGHE H D, TACKETF R, FU H. Verifying position and velocity for vehicular Ad-Hoc networks [ J]. Security and Com- munication Networks, 2011,4(7) : 785 - 791.

二级参考文献17

  • 1[1]Ren Feng-Yuan,Huang Hai-Ning,Lin Chuang.Wireless sensor networks[J].Journal of Software,2003.7,4(2)1148-1157.
  • 2[2]Loukas Lazos,Radha P00vendran.Secure Localization for Wireless Sensor Networks using Range-Independent Methods[J].IEEE Journal on Selected Areas in Communications,2006,24:233-246.
  • 3[3]Lazos L,Poovendran R.SeRLoc:Secure range independent localization for wireless sensor networks[C]Philadelphia,PA:In ACM workshop on Wireless security(ACM WiSe、04),2004:21-30.
  • 4[4]Liu D,Ning P,Du W.Attack-Resistant Location Estimation in Sensor Networks[C].Los Angeles,California:In PrOceedings of The Fourth InternatiOnal Conference on Information Processing in Sensor Networks(IPSN、05).2005:99-106.
  • 5[5]Li Z,Trappe W,Zhang Y,et al.Robust statistical methods for securing wireless localization in sensor networks[C].Los Angeles,C alifornia:In Proceedings of IPSN、05,2005:91-98.
  • 6[6]Capkun S,Hubaux P J.Secure positioning of wireless devices with application to sensor networks[C].Miami,Florida,USA:In Proceedingsof IEEE INFOCOM、05.2005:1917-1928.
  • 7[7]Lazos L,Poovendran R,Capkun S.ROPE:Robust Position Estimation in Wireless Sensor Networks[C].Los Angeles,California:In the Proceedings of the 4th internatiOnal symposium on Information processing in sensor networks,IPSN、05.2005:324-331.
  • 8[8]Liu D,Ning P,Du W.Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks[C].Columbus,Ohio,USA 25th IEEE International Conference on Distributed Computing Systems(ICDCS、05),2005:609-619.
  • 9[9]Srinivasan A,Teitelbaum J,Wu J.DRBTS:Distributed Reputation-based Beacon Trust System[C].Indianapolis,Indiana,USA:2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing(DASC、06),2006:277-283.
  • 10[10]Lazos L,Poovendran R.HiRLoc:HighResolution RObust LOcalization for Wireless Sensot Networks[J].IEEE Journal on Selected Areas in Communications,February 2006,24(2)233-246.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部