无线传感器网络节点位置验证框架
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Node Location Verification Framework for WSN
  • 作者:苗春雨 ; 陈丽娜 ; 吴建军 ; 周家庆 ; 冯旭杭
  • 英文作者:Miao Chunyu;Chen Lina;Wu Jianjun;Zhou Jiaqing;Feng Xuhang;Hangzhou Anheng Information Technology Co. LTD;Research Center of Network Application Security,Zhejiang Normal University;
  • 关键词:无线传感器网络 ; 节点定位 ; 可信定位 ; 节点位置验证 ; 分布式信誉模型
  • 英文关键词:wireless sensor network(WSN);;node localization;;reliable localization;;node location verification;;distributed reputation model
  • 中文刊名:JFYZ
  • 英文刊名:Journal of Computer Research and Development
  • 机构:杭州安恒信息技术股份有限公司;浙江师范大学网络应用安全研究中心;
  • 出版日期:2019-06-15
  • 出版单位:计算机研究与发展
  • 年:2019
  • 期:v.56
  • 基金:国家自然科学基金项目(61502431,61379023);; 浙江省计算机科学与技术重中之重学科(浙江师范大学)基金项目(ZC323014074);; 浙江省科技厅公益性技术应用研究计划基金项目(2015C33060)~~
  • 语种:中文;
  • 页:JFYZ201906011
  • 页数:13
  • CN:06
  • ISSN:11-1777/TP
  • 分类号:101-113
摘要
节点定位是无线传感器网络(wireless sensor network, WSN)关键支撑技术之一,传统的定位算法均假设信标节点位置是可靠的,导致其无法应用于存在信标漂移、虚假信标和恶意信标的场景.针对上述问题,提出一种分布式轻量级的节点位置验证框架(node location verification framework, NLVF),作为底层框架为传统的2类定位算法(基于测距的定位算法与非测距定位算法)提供信标位置验证服务,以过滤位置不可靠的信标扩展传统定位算法的应用范畴.节点位置验证的核心算法UNDA(unreliable node detection algorithm)是基于节点相互距离观测结果建立位置信誉模型,在定位过程中排除位置信誉较低的信标,以提高定位结果的可靠性.实验结果表明,NLVF可服务于基于2类测距技术的定位算法,且适用于存在3种不可靠信标的场景,具有普适性;UNDA算法具有较高的检测性能,平均检测成功率在95%以上,NLVF具有较高的可用性.
        Localization is one of the pivot technologies in wireless sensor networks. The traditional node localization schemes consider that the locations of anchors are reliable, which makes these schemes are invalid in some scenarios with unreliable anchors such as drifted anchors, fake anchors and malicious anchors. Aiming at solving this problem mentioned above, a distributed and lightweight node location verification framework(NLVF) is proposed. NLVF offers location verification service as an underlying technic for the traditional localization algorithms, including range-based localization algorithm and the range-free localization algorithm. NLVF can filter out these unreliable anchors by which the application area of traditional localization algorithms is enlarged. UNDA(unreliable node detection algorithm) is the key algorithm of NLVF. It constructs location reputation model based on mutual distance observation between neighbors in WSN. UNDA algorithm improves the localization reliability by filtering out these anchors with inferior location reputations. Extensive experiments are conducted to evaluate the performance of UNDA. Results show that NLVF is adapted to both of range-based and range-free localization schemes. It works better in the presence of three kinds of unreliable anchors. So, it yields general applicability. In addition, UNDA relatively has high accuracy, and the average success rate of detection is more than 95%, so NLVF yields significant practicability.
引文
[1]Bellavista P,Cardone G,Corradi A,et al.Convergence of MANET and WSN in IoT urban scenarios[J].IEEE Sensors Journal,2013,13(10):3558-3567
    [2]Yang Zheng,Zhou Zimu,Liu Yunhao.From RSSI to CSI:Indoor localization via channel response[J].ACM Computing Surveys,2013,46(2):1-32
    [3]Xu Ning,Huang Aiping,Hou Tingwei,et al.Coverage and connectivity guaranteed topology control algorithm for cluster-based wireless sensor networks[J].Wireless Communications and Mobile Computing,2012,12(1):23-32
    [4]Jin Miao,Rong Guodong,Wu Hongyi.Optimal surface deployment problem in wireless sensor networks[C]Proc of INFOCOM 2012.Piscataway,NJ:IEEE,2012:2345-2353
    [5]Ghosh R K,Das S K.A survey on sensor localization[J].Control Theory and Technology,2010,8(1):2-11
    [6]Han Guanjie,Xu Huiui,Duong T Q,et al.Localization algorithms of wireless sensor networks:A survey[J].Telecommunication Systems,2013,52(4):2419-2436
    [7]Han Yunfeng,Zheng Cui'e,Sun Dajun.Localization of large scale underwater sensor networks based on recursive position estimation[C]Proc of OCEANS 2015.Piscataway,NJ:IEEE,2015:1-4
    [8]Perazzo P,Taponecco L,D'amico A A,et al.Secure positioning in wireless sensor networks through enlargement miscontrol detection[J].ACM Transactions on Sensor Networks,2016,12(4):Article ID:27
    [9]Zhong Sheng,Jadliwala M,Upadhyaya S,et al.Towards a theory of robust localization against malicious beacon nodes[C]Proc of IEEE INFOCOM 2008.Piscataway,NJ:IEEE,2008:2065-2073
    [10]Hwang J,He Tian,Kim Y.Detecting phantom nodes in wireless sensor networks[C]Proc of IEEE INFOCOM2007.Piscataway,NJ:IEEE,2007:2391-2395
    [11]Liu Dawei,Lee M C,Wu Dan.A node-to-node location verification method[J].IEEE Transactions on Industrial Electronics,2010,57(5):1526-1537
    [12]Wu Di,Zhao Dongmei,Feng Weimiao,et al.SPIN:An active location verification scheme for wireless sensor networks[C]Proc of 2016 Military Communications.Piscataway,NJ:IEEE,2016:120-125
    [13]Wang Dexin,Yang Liuqing,Cheng Xiang.A low-complexity cooperative algorithm for robust localization in wireless sensor networks[C]Proc of IEEE ICNC 2016.Piscataway,NJ:IEEE,2016:1-5
    [14]He Daojing,Lin Cui,Huang Hejiao,et al.Design and verification of enhanced secure localization scheme in wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2009,20(7):1050-1058
    [15]Xiao Bin,Chen Lin,Xiao Qingjun,et al.Reliable anchorbased sensor localization in irregular areas[J].IEEETransactions on Mobile Computing,2010,9(1):60-72
    [16]Kuo S P,Kuo H J,Tseng Y C.The beacon movement detection problem in wireless sensor networks for localization applications[J].IEEE Transactions on Mobile Computing,2009,8(10):1326-1338
    [17]Miao Chunyu,Dai Guoyong,Ying Kezhen,et al.Collaborative localization and location verification in WSNs[J].Sensors,2015,15(5):10631-10649
    [18]Yang Zheng,Jian Lirong,Wu Chenshu,et al.Beyond triangle inequality:Sifting noisy and outlier distance measurements for localization[J].ACM Transactions on Sensor Networks,2013,9(2):1-20
    [19]Yang Zheng,Wu Chenshu,Chen Tao,et al.Detecting outlier measurements based on graph rigidity for wireless sensor network localization[J].IEEE Transactions on Vehicular Technology,2013,62(1):374-383
    [20]Garg R,Varna A L,Wu Ming.An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2012,7(2):717-730
    [21]Ansari Z,Ghazizadeh R,Shokhmzan Z.Gradient descent approach to secure localization for underwater wireless sensor networks[C]Proc of ICEE 2016.Piscataway,NJ:IEEE,2016:103-107
    [22]Srinivasan A,Teitelbaum J,Wu Jie.DRBTS:Distributed reputation-based beacon trust system[C]Proc of 2006Dependable,Autonomic and Secure Computing.Piscataway,NJ:IEEE,2006:277-283
    [23]Wei Yawen,Guan Yong.Lightweight location verification algorithms for wireless sensor networks[J].IEEETransactions on Parallel and Distributed Systems,2013,24(5):938-950
    [24]Xia Ming,Sun Peiliang,Wang Xiaoyan,et al.Distributed beacon drifting detection for localization in unstable environments[J].Mathematical Problems in Engineering,2013(7):707-724
    [25]Ren Ping,Liu Wu,Sun Donghong,et al.Node localization based on convex optimization in wireless sensor networks[C]Proc of 2016 Fuzzy Systems and Knowledge Discovery.Piscataway,NJ:IEEE,2016:2169-2173
    [26]Boukerche A,Oliveira H A B F,Nakamura E F,et al.Secure localization algorithms for wireless sensor networks[J].IEEE Communications Magazine,2008,46(4):96-101
    [27]Sharma K,Ghose M K.Wireless sensor networks:An overview on its security threats[J].International Journal of Computer Applications:Special Issue on MANETs,2010,manets(1):42-45
    [28]Zeng Yingpei,Cao Jiannong,Hong Jue,et al.Secure localization and location verification in wireless sensor networks:A survey[J].Journal of Supercomputing,2013,64(3):685-701
    [29]Lazos L,Poovendran R.Secure localization for wireless sensor networks using range-independent methods[M]Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.New York:Springer,2007:185-214
    [30]Liu Donggang,Ning Peng,Du Wenliang.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C]Proc of IEEE ICDCS 2005.Piscataway,NJ:IEEE,2005:609-619
    [31]Dong Dezun,Li Mo,Liu Yunhao,et al.Topological detection on wormholes in wireless ad hoc and sensor networks[J].IEEE/ACM Transactions on Networking,2011,19(6):1787-1796
    [32]Dimitriou T,Giannetsos A.Wormholes no more?Localized wormhole detection and prevention in wirelessnetworks[C]Proc of IEEE DCOSS 2010.Piscataway,NJ:IEEE,2010:334-347
    [33]Chen Honglong,Lou Wei,Sun Xice,et al.A secure localization approach against wormhole attacks using distance consistency[J].EURASIP Journal on Wireless Communications and Networking,2010:Article ID:627039
    [34]Chen Honglong,Lou Wei,Wang Zhi.On providing wormhole-attack-resistant localization using conflicting sets[J].Wireless Communications&Mobile Computing,2015,15(15):1865-1881
    [35]Chen Honglong,Lou Wei,Wang Zhi,et al.Securing DV-Hop localization against wormhole attacks in wireless sensor networks[J].Pervasive and Mobile Computing,2015,16(PA):22-35
    [36]Bao Tianyue,Wan Jiangwen,Yi Kefu,et al.A game-based secure localization algorithm for mobile wireless sensor networks[J].International Journal of Distributed Sensor Networks,2015:Article ID:642107
    [37]Dong Dezun,Li Mo,Liu Yunhao,et al.Topological detection on wormholes in wireless ad hoc and sensor networks[J].IEEE/ACM Transactions on Networking,2011,19(6):1787-1796
    [38]Jiang J,Zheng Xiangyao,Chen Yufan,et al.A distributed RSS-based localization using a dynamic circle expanding mechanism[J].IEEE Sensors Journal,2013,13(10):3754-3766
    [39]Zhong Ziguo,He Tian.RSD:A metric for achieving rangefree localization beyond connectivity[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(11):1943-1951
    [40]Tian Chunqi,Yang Baijiang,Zhong Jidong,et al.Trustbased incentive mechanism to motivate cooperation in hybrid P2Pnetworks[J].Computer Networks,2014,73(c):244-255

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700