摘要
无线传感网络通常部署在无人值守的敌对环境中,网络中节点的定位过程容易受到攻击节点的破坏,导致整个无线传感器网络瘫痪。论文针对传统定位算法DV-Hop定位精度低且易受虫洞攻击等缺点,提出了一种PS-DV-Hop定位算法。在防御攻击方面,提出了基于安全邻居发现策略的虫洞攻击检测和滤除方法,该方法基于虫洞攻击时网络节点间通信跳数出现的异常,依据节点间路径跳数差异来检测虫洞,通过搜索发现、滤除各种虚假链路,抑制虫洞攻击对DV-Hop算法定位过程的影响。此外还从平均跳距计算和未知节点坐标计算两个阶段入手,改进了传统DV-Hop算法,提出了基于RSSI加权修正的平均跳距和最小二乘法修正的未知节点坐标计算方法,通过定位精度和抵御虫洞攻击影响的定位实验,结果表明:PS-DV-Hop安全定位算法能有效地抵御虫洞攻击的影响,且保持了较高的定位精度。
Wireless sensor networks are usually deployed in the hostile environment, the location of the nodes in the network is vulnerable to the destruction of the nodes, which leads to the paralysis of the entire wireless sensor network. In this paper, a new PS-DV-Hop positioning algorithm is proposed to overcome the shortcomings of the traditional positioning algorithm, such as low po- sitioning accuracy and vulnerable to wormhole attack. DV-Hop. In the defensive attack, secure neighbor discovery wormhole attack detection and filtering method are proposed based on policy and the abnormal wormhole attack network node communication be- tween the number of hops between nodes, based on the path hop difference to detect wormhole, discovelT, eliminate all kinds of false link through the search, the inhibitory effect of wormhole attacks on DV-Hop localization algorithm in the process of. In addi- tion, the average hop distance calculation and unknown node coordinate calculation of two stages of starting, improve the traditional DV-Hop algorithm, put forward the calculation method of average hop distance and the least squares method modified RSSI weight- ed coordinates of unknown nodes based on the positioning experiment, through the positioning accuracy and the effect against worm- hole attacks. The results show that the effect of PS-DV-Hop secure localization algorithm it can effectively resist the wormhole at- tack, and maintaining high positioning accuracy.
作者
吴海波
魏丽君
WU Haibo;WEI Lijun(Hunan Railway Professional Technology College,Zhuzhou 412001)
出处
《计算机与数字工程》
2018年第10期2073-2077,共5页
Computer & Digital Engineering
关键词
无线传感网络
定位算法
虫洞攻击
网络安全
wireless sensor network
localization algorithm
wormhole attack
network security