一种基于拟牛顿迭代的安全定位算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A secure localization algorithm based on quasi-Newton interation
  • 作者:滕云 ; 刘宏立 ; 徐琨
  • 英文作者:TENG Yun;LIU Hongli;XU Kun;College of Electrical and Information Engineering,Hunan University;
  • 关键词:无线传感网络 ; 安全定位 ; 拟牛顿迭代 ; 过滤 ; 梯度
  • 英文关键词:wireless sensor networks;;secure localization;;quasi-Newton interation;;filtering;;gradient
  • 中文刊名:XBDZ
  • 英文刊名:Journal of Northwest University(Natural Science Edition)
  • 机构:湖南大学电气与信息工程学院;
  • 出版日期:2017-06-25
  • 出版单位:西北大学学报(自然科学版)
  • 年:2017
  • 期:v.47;No.228
  • 基金:国家自然科学基金资助项目(61172089);; 中央国有资本经营预算基金资助项目(财企[2013]470号);; 中央高校基本科研基金资助项目(2014-004);; 中国博士后科研基金资助项目(2014M562100)
  • 语种:中文;
  • 页:XBDZ201703007
  • 页数:6
  • CN:03
  • ISSN:61-1072/N
  • 分类号:49-54
摘要
由于无线传感网络通常需要部署在无人看管的环境中,网络中节点的位置信息很容易受到各种恶意攻击,导致大部分节点不能准确地确定自身位置,进而破坏整个网络后续工作的进行。针对无线传感网络安全定位问题,提出了一种基于拟牛顿迭代的安全定位算法。基于定位过程中遭受的恶意攻击特点,建立了对应的距离测量攻击模型,利用拟牛顿迭代算法对所有定位数据进行迭代运算,根据梯度的数学特性找出并过滤恶意锚节点,实现节点的安全定位。仿真结果表明,提出的安全定位算法能够很好地抵御恶意攻击对节点定位的影响,具有较好的定位性能,并且有很强的鲁棒性。
        Wireless sensor networks usually deployed in the unattended environment where some of the nodes are vulnerable to malicious attacks,which preventing accurate localization of the remaining sensor nodes,and further undermining the performance of follow-up work in the whole network.A security localization algorithm based on quasi-Newton method was proposed,against the problem of the security localization in wireless sensor network.Based on the characteristics of malicious attacks suffered during positioning,a corresponding model of distance measurement attack was established.The quasi-Newton interation algorithm is applied to the iterative operation of all the location data,meanwhile identifying and filtering malicious anchor node based on the mathematical properties of the gradient in order to achieve more accuracy localization of the sensor nodes.Simulation result shows that the proposed algorithm can withstand such malicious attacks efficiently,and with better positioning performance and strong robustness.
引文
[1]彭宇,王丹.无线传感器网络定位技术综述[J].电子测量与仪器学报,2011,25(5):389-399.
    [2]李君茹,冯玉涵.无线传感器网络在森林防火方面的应用[J].农业网络信息,2013(2):95-97.
    [3]孙启永,张文,李海波,等.基于微电极阵列和无线传感器网络的水环境重金属检测系统研究[J].传感技术学报,2013,26(7):907-911.
    [4]DEMIGHA O,HIDOUCI W K,AHMED T.On energy efficiency in collaborative target tracking in wireless sensor network:A review[J].Communications Surveys&Tutorials,IEEE,2013,15(3):1210-1222.
    [5]余攀,邹承俊,张玲,等.基于无线传感网络的农田远程监测系统设计[J].中国农机化学报,2016(5):223-226.
    [6]VAGHEFI R M,SCHIOEMANN J,BUEHRER R M.NLOS mitigation in TOA-based localization using semidefinite programming[C]∥2013 10th Workshop on Positioning Navigation and Communication(WPNC).IEEE,2013:1-6.
    [7]LIN L,SO H C,CHAN F K W,et al.A new constrained weighted least squares algorithm for TDOAbased localization[J].Signal Processing,2013,93(11):2872-2878.
    [8]LIVINSA Z M,JAYASHRI S.Performance analysis of diverse environment based on RSSI localization algorithms in wsns[C]∥2013 IEEE Conference on Information&Communication Technologies(ICT).IEEE,2013:572-576.
    [9]PAL A.Localization algorithms in wireless sensor networks:Current approaches and future challenges[J].Network Protocols and Algorithms,2010,2(1):45-73.
    [10]VELUMANI P S,MURUGAPPAN S.Secure authentication technique for localization in wireless sensor networks[J].International Review on Computers and Software,2013,8(9):2239-2246.
    [11]CHO K,JO M,KWON T,et al.Classification and experimental analysis for clone detection approaches in wireless sensor networks[J].IEEE Systems Journal,2013,7(1):26-35.
    [12]BOUKERCHE A,OLIVEIRA H A B F,NAKAMURA E F,et al.Secure localization algorithms for wireless sensor networks[J].IEEE Communications Magazine,2008,46(4):96-101.
    [13]LIU D,NING P,DU W K.Attack-resistant location estimation in sensor networks[C]∥Proceedings of the4th International Symposium on Information Processing in Sensor Networks.IEEE Press,2005:13.
    [14]PERAZZO P,TAPONECCO L,D'AMICO A A,et al.Secure positioning in wireless sensor networks through enlargement miscontrol detection[J].ACM Transactions on Sensor Networks(TOSN),2016,12(4):27.
    [15]GARG R,VARNA A L,WU M.An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2012,7(2):717-730.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700