期刊文献+

PS-DV-Hop算法对虫洞攻击防御的安全性能研究 被引量:2

Research on Security of Wormhole Attack Defense Based on PS-DV-Hop Algorithm
下载PDF
导出
摘要 无线传感网络通常部署在无人值守的敌对环境中,网络中节点的定位过程容易受到攻击节点的破坏,导致整个无线传感器网络瘫痪。论文针对传统定位算法DV-Hop定位精度低且易受虫洞攻击等缺点,提出了一种PS-DV-Hop定位算法。在防御攻击方面,提出了基于安全邻居发现策略的虫洞攻击检测和滤除方法,该方法基于虫洞攻击时网络节点间通信跳数出现的异常,依据节点间路径跳数差异来检测虫洞,通过搜索发现、滤除各种虚假链路,抑制虫洞攻击对DV-Hop算法定位过程的影响。此外还从平均跳距计算和未知节点坐标计算两个阶段入手,改进了传统DV-Hop算法,提出了基于RSSI加权修正的平均跳距和最小二乘法修正的未知节点坐标计算方法,通过定位精度和抵御虫洞攻击影响的定位实验,结果表明:PS-DV-Hop安全定位算法能有效地抵御虫洞攻击的影响,且保持了较高的定位精度。 Wireless sensor networks are usually deployed in the hostile environment, the location of the nodes in the network is vulnerable to the destruction of the nodes, which leads to the paralysis of the entire wireless sensor network. In this paper, a new PS-DV-Hop positioning algorithm is proposed to overcome the shortcomings of the traditional positioning algorithm, such as low po- sitioning accuracy and vulnerable to wormhole attack. DV-Hop. In the defensive attack, secure neighbor discovery wormhole attack detection and filtering method are proposed based on policy and the abnormal wormhole attack network node communication be- tween the number of hops between nodes, based on the path hop difference to detect wormhole, discovelT, eliminate all kinds of false link through the search, the inhibitory effect of wormhole attacks on DV-Hop localization algorithm in the process of. In addi- tion, the average hop distance calculation and unknown node coordinate calculation of two stages of starting, improve the traditional DV-Hop algorithm, put forward the calculation method of average hop distance and the least squares method modified RSSI weight- ed coordinates of unknown nodes based on the positioning experiment, through the positioning accuracy and the effect against worm- hole attacks. The results show that the effect of PS-DV-Hop secure localization algorithm it can effectively resist the wormhole at- tack, and maintaining high positioning accuracy.
作者 吴海波 魏丽君 WU Haibo;WEI Lijun(Hunan Railway Professional Technology College,Zhuzhou 412001)
出处 《计算机与数字工程》 2018年第10期2073-2077,共5页 Computer & Digital Engineering
关键词 无线传感网络 定位算法 虫洞攻击 网络安全 wireless sensor network localization algorithm wormhole attack network security
  • 相关文献

参考文献3

二级参考文献34

  • 1杨冕,秦前清.对传感器网络定位技术现状的研究[J].微机发展,2005,15(3):26-28. 被引量:15
  • 2王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4SHAREEF A,ZHU Y F,MUSAVI M.Localization using neural networks in wireless sensor networks[C].Mobilware'08,2008. 被引量:1
  • 5SHAIFU R,MOHAMMAD R,YOUNGIL P,et al.Localization of wireless sensor network using artificial neural network[C].ISCIT 2009,2009:639-642. 被引量:1
  • 6Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:Analysis & defenses[A].Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks[C].New York:ACM,2004.259-268. 被引量:1
  • 7Manjula V,Chellappan C.The replication attacks in wireless sensor networks:Analysis and defenses[A].Proceedings of the 1st International Conference on Computer Science and Information Technology[C].Heidelberg:Springer Verlag,2011.169-178. 被引量:1
  • 8Zhu W T,Zhou J Y,Deng R H,et al.Detecting node replication attacks in wireless sensor networks:A survey[J].Journal of Network and Computer Applications,2012,35(3):1022-1034. 被引量:1
  • 9Parno B,Perrig A,Gligor V.Distributed detection of node replication attacks in sensor networks[A].Proceedings of the 2005 IEEE Symposium on Security and Privacy[C].New Jersey:IEEE,2005.49-63. 被引量:1
  • 10Ho J W,Liu D G,Wright M,et al.Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks[J].Ad hoc Networks,2009,7(8):1476-1488. 被引量:1

共引文献262

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部