期刊文献+

基于背景感知的异常节点定位检测算法 被引量:2

Location Detection Algorithm for Abnormal Nodes Based on Background Perception
下载PDF
导出
摘要 针对现有室内节点异常定位不精确等问题,提出一种基于背景感知的异常节点定位检测算法。根据节点所处环境,将节点运动过程模拟为有限状态的转换,以检测无线网络环境中的异常节点,并以周围轨迹的感知背景来衡量节点的异常度。同时在节点状态转换间插入丢失状态,重建节点轨迹过程,利用迭代策略估计转换概率,有效降低节点状态转换序列中的不确定性,从而提高异常节点位置估计的准确性和可恢复性。仿真结果表明,所提算法能在复杂的现实环境中准确定位室内异常节点位置。与两种不同的基准算法相比,所提算法不仅定位精度高,还有较高的召回率。 Aiming at the inaccuracy of existing anomaly location for indoor nodes and other problems,an abnormal node location detection algorithm based on background perception is proposed in this paper.According to the environment of the node,the node motion process is simulated as a finite state transition to detect the abnormal nodes in the wireless network environment,and the node anomaly is measured by the perceptual background of the surrounding trajectories.At the same time,the missing state is inserted between the node state transitions to reconstruct the node trajectory process,and the iterative strategy is used to estimate the transition probability,which effectively reduces the uncertainty in the node state transition sequence,thereby improving the accuracy and recoverability of the abnormal node position estimation.The simulation results show that the algorithm proposed in this paper can accurately locate the indoor abnormal nodes in the complex real environment.Compared with the two different benchmark algorithms,the proposed algorithm not only has high location accuracy,but also has high recall rate.
作者 唐卫斌 TANG Wei-bin(College of Electronic Information and Electrical Engineering,Shangluo University,Shangluo 726000,Qiina)
出处 《控制工程》 CSCD 北大核心 2021年第8期1621-1627,共7页 Control Engineering of China
基金 陕西省自然科学基础研究计划资助项目(2017JQ6011)。
关键词 异常检测 背景感知 节点定位 密度聚类 转换概率 Anomaly detection background perception node location density clustering transition probability
  • 相关文献

参考文献12

二级参考文献81

  • 1张明华,张申生,曹健.无线局域网中基于信号强度的室内定位[J].计算机科学,2007,34(6):68-71. 被引量:66
  • 2Samarati P. Protecting respondent's identities in microdata release [J]. IEEE Trans on Knowledge and Data Engineering, 2001, 13(6): 1010-1027.
  • 3Sweeney L. K-anonymity: A model for protecting privacy [J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5) : 557-570.
  • 4Michael B, Tom Z J. A face is exposed for aol searcher no. 4417749 IN]. New York Times, 2006-08-09(8).
  • 5Abul O, Bonchi F, Nanni M. Never walk alone: Trajectory anonymity via clustering, ISTI-007/2007 [R]. Pisa: Institute of Information Science and Technologies (ISTI), Italian National Research Council (CNR), 2007.
  • 6Abul O, Bonchi F, Nanni M. Never walk alone: Uncertainty for anonymity in moving objects databases [C]//Proc of IEEE ICDE'08. Piscataway, NJ: IEEE, 2008:3.76-385.
  • 7Saygin Y, Nergiz E, Atzori M. Towards trajectory anonymization: A generalization-based approach [C]//Proc of the SIGSPATIAL ACM GIS 2008 Int Workshop on Security and Privacy in GIS and LBS. New York: ACM, 2008: 52-61.
  • 8Yarovoy R, Bonchi F, Lakshmanan V S, et al. Anonymizing moving objects: How to hide a MOB in a crowd? [C]//Proc of the 12th Int Conf on Extending Database Technology:Advances in Database Technology. New York: ACM, 2009:23-26.
  • 9Lin Dan, Gurung S, Jiang Wei, et al. Privacy-preserving location pub].ishing under road-network constraints [G] // LNCS 5982: Proc of the 15th Int Conf on Database Systems for Advanced Applications. Berlin: Springer, 2010:17-31.
  • 10Abul O, Bonchi F, Nanni M. Anonymization of moving objects databases by clustering and perturbation [J]. Information Systems, 2010, 35(8): 884-910.

共引文献238

同被引文献28

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部