为防止在不可靠环境中传感节点被捕获,提出一种与范围无关的算法来解决节点的定位问题,即基于接收信号强度(received signal strength indication,RSSI)的安全定位算法。介绍了通过估计各个锚节点的环境参数,用加权的最小均方法计算未...为防止在不可靠环境中传感节点被捕获,提出一种与范围无关的算法来解决节点的定位问题,即基于接收信号强度(received signal strength indication,RSSI)的安全定位算法。介绍了通过估计各个锚节点的环境参数,用加权的最小均方法计算未知节点的位置,提高位置计算过程的鲁棒性和恶意攻击的防御性能。该方法既不用增加参考点的数量,也不用增加每个参考点或节点硬件的复杂性,就能够使传感器被动且高可靠地确定其自身位置。同时,在串谋和非串谋的攻击模式下,分析该算法对不同攻击模式的安全定位的性能。仿真结果表明:该算法可以得到更低的平均定位误差,同时达到恶意攻击对定位影响最小。展开更多
The different realistic propagation channels are faced frequently the multipath fading environments. The main goal of this system design (cognitive radio network) is to improve the efficiency of spectrum access on a n...The different realistic propagation channels are faced frequently the multipath fading environments. The main goal of this system design (cognitive radio network) is to improve the efficiency of spectrum access on a non-interfering basis. This system achieves high utilization for the limited spectrum in order to fulfill needs for all users’ demands which are considered as a problem in wireless communications due to rapidly increasing in wireless applications and service. This system is exposed to attack due to the vulnerabilities existence in this system. So, the main outcome of this paper is to investigate the performance of the cooperative sensing in cognitive radio networks under malicious attacks over different channel impairments, and to illustrate the most suitable individual probability of detection in real faded channel by using Nakagami model. This paper illustrates the effectiveness of the attacks and fading on the performance of spectrum sensing process.展开更多
One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate ...One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate with a stranger are tackled by two different existing trust management systems: one is a policy-based approach which verifies the decision built on logical properties and functionalities;the other approach is reputation-based approach which verifies the decision built on physical properties and functionalities of WSN. Proofless authorization, unavailability, vagueness and more complexity cause decreased detection rate and spoil the efficacy of the WSN in existing approaches. Some of the integrated approaches are utilized to improve the significance of the trust management strategies. In this paper, a Compact Trust Computation and Management (CTCM) approach is proposed to overcome the limitations of the existing approaches, also it provides a strong objective security with the calculability and the available security implications. Finally, the CTCM approach incorporates the optimum trust score for logical and physical investigation of the network resources. The simulation based experiment results show that the CTCM compact trust computation and management approach can provide an efficient defending mechanism against derailing attacks in WSN.展开更多
文摘为防止在不可靠环境中传感节点被捕获,提出一种与范围无关的算法来解决节点的定位问题,即基于接收信号强度(received signal strength indication,RSSI)的安全定位算法。介绍了通过估计各个锚节点的环境参数,用加权的最小均方法计算未知节点的位置,提高位置计算过程的鲁棒性和恶意攻击的防御性能。该方法既不用增加参考点的数量,也不用增加每个参考点或节点硬件的复杂性,就能够使传感器被动且高可靠地确定其自身位置。同时,在串谋和非串谋的攻击模式下,分析该算法对不同攻击模式的安全定位的性能。仿真结果表明:该算法可以得到更低的平均定位误差,同时达到恶意攻击对定位影响最小。
文摘The different realistic propagation channels are faced frequently the multipath fading environments. The main goal of this system design (cognitive radio network) is to improve the efficiency of spectrum access on a non-interfering basis. This system achieves high utilization for the limited spectrum in order to fulfill needs for all users’ demands which are considered as a problem in wireless communications due to rapidly increasing in wireless applications and service. This system is exposed to attack due to the vulnerabilities existence in this system. So, the main outcome of this paper is to investigate the performance of the cooperative sensing in cognitive radio networks under malicious attacks over different channel impairments, and to illustrate the most suitable individual probability of detection in real faded channel by using Nakagami model. This paper illustrates the effectiveness of the attacks and fading on the performance of spectrum sensing process.
文摘One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate with a stranger are tackled by two different existing trust management systems: one is a policy-based approach which verifies the decision built on logical properties and functionalities;the other approach is reputation-based approach which verifies the decision built on physical properties and functionalities of WSN. Proofless authorization, unavailability, vagueness and more complexity cause decreased detection rate and spoil the efficacy of the WSN in existing approaches. Some of the integrated approaches are utilized to improve the significance of the trust management strategies. In this paper, a Compact Trust Computation and Management (CTCM) approach is proposed to overcome the limitations of the existing approaches, also it provides a strong objective security with the calculability and the available security implications. Finally, the CTCM approach incorporates the optimum trust score for logical and physical investigation of the network resources. The simulation based experiment results show that the CTCM compact trust computation and management approach can provide an efficient defending mechanism against derailing attacks in WSN.