期刊文献+

一种基于RSSI的无线传感网络安全定位算法 被引量:5

A Security Localization Algorithm Based on RSSI in Wireless Sensor Networks
下载PDF
导出
摘要 为防止在不可靠环境中传感节点被捕获,提出一种与范围无关的算法来解决节点的定位问题,即基于接收信号强度(received signal strength indication,RSSI)的安全定位算法。介绍了通过估计各个锚节点的环境参数,用加权的最小均方法计算未知节点的位置,提高位置计算过程的鲁棒性和恶意攻击的防御性能。该方法既不用增加参考点的数量,也不用增加每个参考点或节点硬件的复杂性,就能够使传感器被动且高可靠地确定其自身位置。同时,在串谋和非串谋的攻击模式下,分析该算法对不同攻击模式的安全定位的性能。仿真结果表明:该算法可以得到更低的平均定位误差,同时达到恶意攻击对定位影响最小。 For sensing nodes not to be captured in unreliable environment,put forward a range-independent algorithm to solve node location problem,that is received signal strength indication(RSSI) security location algorithm.Through estimating anchor node environment parameters,use weighted minimum equal partition method to calculate the unknown node positions,improve the position calculation process robust and anti-attack defense ability.The method allows sensors to passively determine their location with high reliability,without increasing the number of reference points,or the complexity of the hardware of each reference point or node.At the same time,in the joint and non-joint attack modes,analyze the algorithm security location performances under different attack modes.The simulation result shows that the algorithm can get lower average location error,meanwhile reduces attacks influence have little side effects to location performance.
作者 马梁 彭保
出处 《兵工自动化》 2012年第3期44-46,共3页 Ordnance Industry Automation
基金 基于语义的物联网信息标引 计算及智能管理机制研究(10zg2116)
关键词 RSSI 安全定位 恶意攻击 RSSI security localization malicious attacks
  • 相关文献

参考文献11

  • 1Fredric Newberg. Wireless sensor networks design and implementation[D]. Los Angeles: University of California, Los Angeles, 2002. 被引量:1
  • 2C.-Y. Chong, Kumar S. Sensor networks: evolution, opportunities, and challenges[J]. Proceedings of the IEEE 2003, 91(8): 1247-1256. 被引量:1
  • 3Donggang Liu. Security Mechanisms for Wireless Sensor Networks[D]. Raleigh: North Carolina State University PHD Thesis, 2005. 被引量:1
  • 4Lazos L, Poovendran R. HiRLoc: High resolution Robust Localization for Wireless Sensor Networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 233-246. 被引量:1
  • 5Li Z, Trappe W, Y. Zhang, et al. Robust Statistical Methods for Securing Wireless Localization in Sensor Networks[C]//Proc. of Proceedings of the Fourth International Conference on Information Processing in Sensor Networks(IPSN 05). UCLA: IEEE Signal Processing Society and ACM SIGBED, 2005: 91-98. 被引量:1
  • 6孙晓磊,颜培玉,解志斌,李诠娜.网络安全技术中的量子密码通信[J].四川兵工学报,2010,31(8):97-99. 被引量:8
  • 7Q. Wang, Y. Zhu, L. Cheng. Reprogramming Wireless Sensor Networks: Challenges and Approaches[J]. IEEE Network, 2006, 20(3): 48-55. 被引量:1
  • 8Ayong Ye. Secure node positioning in Wireless sensor networks[D]. Xian: Xidian University PHD Thesis, 2009. 被引量:1
  • 9Yang Feng. Research on the technique of countering malicious node in wireless sensor networks[D]. Hefei: University of science and technology of china PHD Thesis, 2009. 被引量:1
  • 10Meiling Sun. Research on GA based self-localization algorithm in wireless sensor networks[D]. Dongying: China University of Petroleum Master Degree Thesis,2009. 被引量:1

二级参考文献3

共引文献7

同被引文献36

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2郑中立.我国铁路大型养路机械发展回顾(连载之五)[J].铁道建筑,2004,44(7):3-5. 被引量:21
  • 3高守伟,吴灿阳.ZigBee技术实践教程[M].北京:北京航空航天大学出版社,2009. 被引量:3
  • 4王小强,欧阳骏.ZigBee无线传感器网络设计与实现[M].北京:化学工业出版社,2012. 被引量:84
  • 5KAHN J M, KATZ R H, PISER K S J. Next century challenges : mobile networking for smart dust [ C ]//Proc of the 5th Annual ACM/IEEE and Networking. New York : ACM Press, 1999 : 263- 270. 被引量:1
  • 6LI Zang,TRAPPE W,ZHANG Y,et al. Robust statistical methods for securing wireless localization in sensor networks [ C ]//Proc of Interna- tonal Symposium on Information Processing in Sensor Networks. Washington DC :IEEE Computer Society,2005:91-98. 被引量:1
  • 7DU Wen-liang, DENG Jing, HAN Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [ J]. IEEE Yrans on Dependable and Secure Computing, 2006,3 (2) : 62- 77. 被引量:1
  • 8DU Wen-liang, FANG Lei, PENG Ning. LAD : location anomaly detec- tion for wireless sensor networks [ J ]. Elsevier Journal of Parallal and Distributed Computing,2005,66 (4) : 874- 886. 被引量:1
  • 9CAPKUN S, RASMUSSEN K, CAGALI M. SecNav : secure broadcast localization and time synchronization in wireless networks [ C ]//Proc of the 13th Aunual ACM International Conference on Mobile Compu- ting and Networking. New York : ACM Press,2007:310- 313. 被引量:1
  • 10SUPRAKASH D, CHR]S K, MASOOMEH R. Distributed localization in static and mobile sensor networks[ C]//Proc of IEEE International Conference on Wireless and Mobile Computing, Networking and Com- munications. 2006 : 69- 76. 被引量:1

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部