Safe positioning method of wireless sensor network

A wireless sensor and network security technology, applied in security devices, network topology, wireless communication, etc., can solve problems such as increased hardware cost, implementation complexity, large impact, collusion attacks, etc., to extend the network life cycle and save energy Overhead, the effect of resisting collusion attacks

Active Publication Date: 2011-07-13
CHANGZHOU ANKONG ELECTRICAL INFORMATION TECH
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The design of most security positioning algorithms is only for certain specific malicious attacks, such as wormhole attacks and Sybil attacks, and cannot effectively resist more complex malicious attacks, such as collusion attacks
[0011] 2. Requires high clock accuracy or hardware support (directional antenna), which greatly increases hardware cost and implementation complexity
Relying on special location reference information (relative positions between neighbor nodes) or specific certain nodes (assuming absolutely credible nodes), greatly limits the applicability and application range of secure positioning algorithms
[0012] 3. The positioning accuracy of sensor nodes is not high, and it is greatly affected by malicious behavior. Most security positioning algorithms can effectively resist external attacks, but cannot effectively resist internal attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe positioning method of wireless sensor network
  • Safe positioning method of wireless sensor network
  • Safe positioning method of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings.

[0050] Such as figure 1 As shown, malicious nodes include intrusion nodes and compromised nodes. In the figure, the double-headed arrows represent the interaction between malicious nodes, and the one-way arrows represent the transmission of information. The intrusion node c1 can compromise the legitimate nodes d1 and f1 within its communication range, making them compromised nodes with the same malicious behavior, that is, randomly tampering with sent or forwarded data packets, or further compromising other legitimate nodes. If the compromised anchor node d1, the intrusion node c1 and the intrusion node g1 send wrong positioning information respectively, or the intrusion node c1 tampers with the positioning information from the legitimate node b1, then the sensor node a1 will not be able to complete accurate positioning. It can be seen that the collusion attack will s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe positioning method of a wireless sensor network, comprising three stages, namely a doubtful node recognition stage, a malicious node isolation stage and a node position safety calculation stage, wherein in the doubtful node recognition stage, anchor nodes are cooperated mutually, broadcast information packets in a hopping communication range, detect doubtful nodes according to whether the information packets are abnormal, and record ID (identification) information of corresponding doubtful nodes; in the malicious node isolation stage, the anchor nodes report the ID information of the doubtful nodes to a base station which is carried out safety level area division on the wireless sensor network and isolated malicious nodes; and in the node position safety calculation stage, as for the main anchor node and the auxiliary anchor nodes in areas with higher safety level preferably, the calculation of sensor nodes is finished by a passive positioning algorithmbased on time difference. In the safe positioning method, the malicious nodes are effectively detected and isolated, the influence of the malicious attack to the positioning process is reduced, the positioning accuracy is improved, the energy consumption for positioning is saved and the life cycle of the network is prolonged.

Description

technical field [0001] The invention belongs to the field of wireless multimedia sensor networks. Specifically, the invention relates to a method for safe positioning of a wireless sensor network, which gradually eliminates malicious nodes in the network and uses anchor nodes to precisely position sensor nodes. Background technique [0002] In recent years, with the development of micro-electromechanical systems, wireless communication and digital electronic technology, wireless sensor networks (WSN) have been widely used in military and civilian fields. The application of precise location information of sensor nodes to WSN has vital significance. At present, scholars have proposed many positioning algorithms for WSN, which are mainly divided into two categories: anchor node-based and non-anchor-based WSN node positioning algorithms, but in most applications, wireless sensor networks are deployed in unmanned areas. Even in harsh environments, the node positioning process is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W64/00H04W84/18H04W12/122H04W12/63
CPCY02B60/50H04W4/023H04W12/125H04W12/122
Inventor 韩光洁江金芳朱川刘同庆张娜巢佳董玉慧
Owner CHANGZHOU ANKONG ELECTRICAL INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products