无线传感器网络定位技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
作为一门在民用与军事等应用领域迅猛发展的关键技术,无线传感器网络的研究工作对国家和社会的发展意义重大。无线传感器网络由大量低成本、微型化、随机分布的无线通信传感器节点通过自组织的方式构成。无线传感器网络中各节点间数据的感知与处理,都必须绑定节点的位置信息。因此,节点的定位技术是传感器网络的支撑技术之一。然而,鉴于无线传感器网络开放性的无线环境与受制约的应用环境的特点,大部分节点无人看护,节点在定位的过程中的安全性也是定位技术必须解决的一个关键问题。
     本文旨在研究无线传感网络节点定位与抗攻击的安全定位机制。
     首先以无线传感器网络为基础,介绍了节点位置估算的基本原理,对其中的三边测量法进行了简单的阐述。重点针对DV-Hop算法存在的问题,利用RSSI测距特性从节点通信量和定位精度两方面对算法进行优化。
     其次,本文针对恶意信标节点的位置欺骗的内部攻击方式,分析了发布虚假信息的恶意信标对DV-Hop定位算法的安全威胁,并在此基础上提出了一种抵抗恶意信标节点的安全优化的定位算法。仿真实验表明,该安全定位算法有效提高了可定位节点的比例,减小了恶意攻击对DV-Hop算法定位精度的影响。
     最后,阐述了虫洞攻击的原理,建立信标节点间的隐藏信道虫洞的外部攻击模型并分析该模型的对DV-Hop定位算法的影响,进而提出一种容忍虫洞攻击的信标校验机制。通过防御信标间隐藏信道的虫洞攻击方式虚增平均单跳校正值,提高定位算法容忍攻击的能力。
As a key technology with rapid development in civil and military application field, the research of wireless sensor network is of great significance to the nation and society. Wireless sensor network is consisted of vast low-cost, tiny wireless sensor nodes with random distribution in the form of self-organization. The perception and processing between nodes should bind with the location information of node in wireless sensor network. Therefore, localization technology is part of the supportive technology of sensor network. However, due to the open wireless environment of the wireless sensor network and the restriction of application environment, most of the nodes are free of being monitored. Therefore, the safety of node in the process of locating is also a crucial issue to the positional technologies which need to be solved.
     This paper aims at researching the mechanism of localization in wireless sensor network node and that of secure localization.
     Firstly, it is based on wireless sensor network, and introduces the basic principles of node location estimation, then briefly describes the method of trilateral survey. It mainly focuses on the problem that exits in DV-Hop algorithm, and uses the characteristic of RSSI ranging to optimize the algorithm in the aspects of total network communication's cost and positional accuracy.
     Secondly, this paper aims at the internal attack mode of malicious beacon node's location deception, and analyzes the security threat to DV-Hop localization algorithm caused by distributing the false information of malicious beacon, on the basis of which a secure optimal algorithm for malicious beacon node defending is putted forward. Simulation results show that, the secure localization algorithm can effectively improve the ratio of the locating node, and reduce the influence of positional accuracy of DV-Hop algorithm caused by malicious attack.
     Finally, this paper explains the principle of wormhole attack, and establishes the external wormhole attack model of hidden channels between beacon nodes, then analyzes the influence of DV-Hop localization algorithm caused by this model. Whereafter, it puts forward a kind of beacon verification mechanism to bear the wormhole attack. By virtually increasing the average correction value in a way of defending the hidden channel wormhole attacks between the defensive beacons, the ability of bearing attack of localization algorithm is improved.
引文
[1]G.O. A. Wayne W.Manges and S.F.Smith, "It's time for sensors to go wirelsss, " Sensor Magazine,1999.
    [2]R.Wade,W.M.Mitehel,F.Petter.Ten emerging technologies that will change the world.Technology Review,2003,106(1):33-49.
    [3]臧劲松.物联网安全性能分析[J].计算机安全.2010,06:51-53.
    [4]Savvidea A, Han CC, Srivastava M.Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensor.7th ACM Int. Conf. on Mobile Computing and Networking(Mobicom), Rome,Italy,2001:16-179.
    [5]孙庭波,屈玉贵,赵宝华.一种无线传感器网络的安全定位的新方法[J].小型微型计算机系统.2009,30(9):1738-1741.
    [6]S. Brands, D. Chaum. Distance-bounding protocols, In:Proc. of Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, LNCS 765:Springer-Verlag,1994,344-359.
    [7]王福豹,史龙,任丰原.无线传感器网络中的自定位系统和算法[J].软件学报.2005,16(5):857-868.
    [8]Kaplan E D.GPS原理与应用.丘至,王万义译.北京:电子工业出版社,2002.
    [9]周一飞,施惠昌,过文亮.无线传感器网络中移动节点的自适应定位算法[J].传感器与微系统.2008,27(8):109-122.
    [10]Richard A. Poisel.电子战目标定位方法.屈晓旭,罗勇等译.北京电子工业出版社.2008.pp.17-22.
    [11]Hightower J, Boriello G. Location systems for ubiquitous computing. Computer, 2001,34(8):57-66.
    [12]Bulusu N. Self-Configuring localization systems [D]. Los Angeles:University of California,2002.
    [13]Want R, Hopper A, Falcao V, Gibbons J. The active badge location system. ACM Trans, on Information Systems,1992,10(1):91102.
    [14]He T, Huang CD, Blum BM, Stankovic JA, Abdelzaher T. Range-Free localization schemes in large scale sensor networks. In:Proc. of the 9th Annual Int'l Conf. on Mobile Computing and Networking. San Diego:ACM Press,2003.81-95. http://www.cs.virginia. edu/-th7c/paper/APIT_CS-2003-06.pdf.
    [15]Harter A, Hopper A, Steggles P, Ward A, Webster P. The anatomy of a context-aware application. In:Proc. of the 5th Annual ACM/IEEE Int'l Conf. on Mobile Computing and Networking. Seattle:ACM Press,1999.5968. http://www-lce.eng.cam.ac.uk/lce-pub/public/files/tr.2002.2.pdf.
    [16]Girod L, Estrin D. Robust range estimation using acoustic and multimodal sensing. In:Proc. of the IEEE/RSJ Int'l Conf. on Intelligent Robots and Systems (IROS 01). Vol.3, Maui:IEEE Robotics and Automation Society,2001.13121320. http://www. lecs.cs.ucla.edu/-girod/papers/IROS-2001.pdf.
    [17]Priyantha NB, Miu AKL, Balakrishnan H, Teller S. The cricket compass for context-aware mobile applications. In:Proc. of the 7th Annual Int'l Conf. on Mobile Computing and Networking. Rome:ACM Press,2001.114. http://nms.lcs.mit.edu/papers/Cricket Compass.pdf.
    [18]Rappaport T S. Wireless Communications:Principles and Practice[M].2nd ed. [S. I]:Prentice Hall lnc.2002.
    [19]Bulusu N, Heidemann J, Estrin D. GPS-Less low cost outdoor localization for very mall devices. IEEE Personal Communications,2000,7(5):28-34.
    [20]Niculescu D, Nath B. DV based positioning in ad hoc networks [J]. Journal of Telecommunication Systems,2003,22(1/4):267-280.
    [21]Nicolescu D, Nath B. Ad-Hoc positioning systems (APS). In:Proc. of the 2001 IEEE Global Telecommunications Conf. Vol.5, San [22]Antonio:IEEE Communications Society,2001.29262931. http://paul.rutgers.edu/-dnicules/research/aps/aoa-infocom.pdf
    [22]Niculescu D, Nath B. DV based positioning in ad hoc networks. Journal of Telecommunication Systems,2003,22(1/4):267280.
    [23]Doherty L. Algorithms for position and data recovery in wireless sensor networks [MS.Thesis]. Berkeley:University of California,2000.
    [24]He T, Huang CD, Blum BM, et al. Range-Free localization schemes in large scale sensor networks. In:Proc. of the 9th Annual Int'l Conf. on Mobile Computing and Networking. San Diego:ACM Press,2003.81-95.
    [25]Shang Y, Ruml W, Zhang Y, Fromherz MPJ. Localization from mere connectivity. In: Proc. of the 4th ACM Int'l Symp. on Mobile Ad Hoc Networking & Computing. Annapolis, US:ACM Press,2003.201-212.
    [26]Sameer Tilak,Viny Kolar Nael B.Abu-Ghazaleh and Kyoung-Don Kang.Dynamic Localization Control for Mobile Sensor Networks.2005.
    [27]赵方,马严,罗海勇,林权,林琳.一种基于网络密度分簇的移动信标辅助定位算法.[J].电子与信息学报.2009.31(12):2988-2992.
    [28]靖刚,吴俊敏,徐宏力,黄刘生。基于对称密码的无线传感器网络安全定位[J].计算机工程.2009,35(12):117-119.
    [29]S. Brands, D. Chaum. Distance-bounding protocols, In:Proc. of Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, LNCS 765:Springer-Verlag,1994,344-359.
    [30]S. Capkun, and J.P. Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications,2006,24(2):221-232.
    [31]赵军,裴庆祺,徐展琦.无线传感器网络近视三角形内点测试定位算法[J].计算机工程.2009,33(5):109-111.
    [32]F. Anjum, S. Pandey, P. Agrawal. Secure localization in sensor networks using transmission range variation. In:Proc. of 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems. Washington:IEEE Computer Society,2005,195-203
    [33]Liu, D., P. Ning, and W. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In:Proc. of International Conference on Distributed Computing Systems[C]. Columbus:IEEE,2005,609-619
    [34]叶阿勇.无线传感器网络节点安全定位[D].西安电子科技大学.2009.
    [35]He T, Huang CD, Blum BM, Stankovic JA, Abdelzaher T. Range-Free localization schemes in large scale sensor networks. In:Proc. of the 9th Annual Int'l Conf. on Mobile Computing and Networking. San Diego:ACM Press,2003.8195. http://www.cs.virginia. edu/-th7c/paper/APIT_CS-2003-06.pdf
    [36]钟进发,许力,叶阿勇.基于邻节点空间顺序序列优化的DV-Hop算法.计算机系统应用,2010.19(2):62-66.
    [37]张晓龙,解慧英,赵小建等。无线传感器网络中一种改进的DV-Hop定位算法[J]。计算机应用。Nov.2007,27(11):2672-2674.
    [38]Savvidea A, Han CC, Srivastava M.Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensor.7th ACM Int. Conf. on Mobile Computing and Networking(Mobicom), Rome,Italy,2001:16-179.
    [39]安葳鹏,沈志广,潘亚锋等.基于ZigBee井下人员定位系统关键问题研究。煤矿安全。May.2009,40(5):71-73.
    [40]王珊珊,殷建平,张国敏,蔡志平等.线传感器网络定位问题中的分簇算法[J]。计算机科学,2008,35(8):29-32.
    [41]Basagni S. Distributed clustering for ad hoc networks[C]//Proc IEEE I-SPAN 99. WA,USA:Perth/Fremantle,1999:310-315.
    [42]Rappaport T S. Wireless Communications:Principles and Practice[M].2nd ed. [S. I]:Prentice Hall lnc.2002.
    [43]朱剑,赵海,孙佩刚,等.基于RSSI均值的等边三角形定位算法[J]。东北大学学报:自然科学版,2007,28(8):10941097.
    [44]NICULESCU D, NATH B. Ad hoc positioning system (APS) using AoA. In:Proc. of the IEEE INFOCOM 2003. Vol.3, San Francisco:IEEE Computer and Communications Societies,2003:1734-1743.
    [45]Homayoun N, Homayoun H. Phase Modeling of Indoor Radio Propagation Channels [J]. IEEE Transactions on VehicularTechnology,2000,49(2):220-231.
    [46]刘艳文,王福豹,段渭军,于超等.基于DV-Hop定位算法和RSSI测距技术的定位系统[J]。计算机应用,2007,27(3):517-527.
    [47]叶阿勇.无线传感器网络节点安全定位[D].西安电子科技大学.2009.
    [48]Liu, D, P. Ning, and W. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In:Proc. of International Conference on Distributed Computing Systems[C]. Columbus:IEEE,2005,609-619.
    [49]许金红.无线传感器网络中恶意节点的检测和定位策略的研究[D].中南大学.2009.
    [50]Liu, D., P. Ning, and W.K. Du. Attack-resistant location estimation in sensor networks[A]. In:Proc. of IPSN 2005[C], Los Angeles:IEEE Computer Society,2005, 99-106.
    [51]Srinivasan A, Teitelbaum J, Wu J. Distributed Reputation-based Beacon Trust System[C]//Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.[S.1.]:IEEE Press,2006:277-283.
    [52]钟进发.无线传感器网络节点定位算法的研究[D].福建师范大学.2010.
    [53]汪金鹏,胡国华.物联网安全性能分析与应用[J].科技信息.2010,33:99-100.
    [54]Hill Jason Lester. System architecture for wireless sensor networks[D]. Berkeley: UC Berkeley,2003.
    [55]Sastry N,Shankar U,Wagner D. Secure verification of location claims [C] //Proc. of the 2003 ACM Workshop on Wireless Security (WISE'03). San diego,California,September 2003:1-10.
    [56]DENG Hongmei, LI Wei, AGRAWAL D P. Routing security in wireless Ad hoc networks[J]. IEEE Communication Magazine,2002,40(10):70-75.
    [57]L.Lazos,R.Poovendran.SeRLoc:Secure range independent localization for wireless sensor networks[C].Proceedings of ACM workshop on Wireless security(ACM WiSe'04),Philadelphia,PA, October 1,2004.
    [58]I.Khalil,S.Bagchi,N.B.Shroff,LiteWorp:a lightweight countermeasure for the wormhole attack in multihop wireless networks, in:International Conference on Dependable Systems and Networks(DSN),2005:612-621.
    [59]Y.Yu,R.Govindan,D.Estrin, Geographical and energy aware routing:A recursive data disssemination protocol for wireless sensor networks,University of California at Los Angeles Computer Science Department,Tech.Rep.UCLA/CSD-TR-01-0023,May 2001.
    [60]J.Zhen and S.Srinivas.Preventing replay attacks for secure routing in ad hoc networks,Proc.of 2nd Ad Hoc Networks & Wireless(ADHOCNOW'03),pp.140-150,2003.
    [61]Buttyan L, Dora L, Vajda I. Statistical Wormhole Detection in Sensor Networks[C]//Proc. of the 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks. VisegrAd, Hungary:[s. n.],2005.
    [62]Hu L,Evans D.Using directional antennas to prevent wormhole attacks. In:Proceedings of Network and Distributed System Security Symposium(NDSS),2004.
    [63]Wu Changhua, Sheng Wei Hua, Zhang Ying. Mobile sensor networks self localization based on multi-dimensional scaling[C]//Robotics and Automation 2007 IEEE International Conference,2007:4238-4237.
    [64]J.Douceur. The Sybil Attack.In Proc. International Workshop on Peer-to-Peer Systems(IPTPS),2002.
    [65]J.Newsome,R.Shi,D.Song, and A.Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proc. International Symposium on Information Processing in Sensor Networks(IPSN),2004.
    [66]Qinghua Zhang,Pan Wang,Douglas S.Reeves,Peng Ning.Defending against Sybil Attacks in Sensor Networks.In Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems(SDCS),June 2005.
    [67]郎为民,杨宗凯,吴世忠,谭运猛.无线传感器网络安全研究.计算机科学.2005,32(5):54-58.
    [68]Jeffrey Hightower, Gaetano Borriello. Location systems for ubiquitous computing. IEEE Computer, August 2001,34(8):57-66.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700