Anti-attack reliable wireless sensor network node positioning method

A wireless sensor and positioning method technology, applied in the field of network information security, can solve the problems of increasing node positioning errors, etc., achieve the effects of reducing impact, simple steps, and reducing the possibility of missed or false detections

Active Publication Date: 2011-09-14
北京涵鑫盛科技有限公司
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

from figure 1 It can be seen that A and B represent two beacon nodes. When estimating the minimum hops between them, the normal path should be A-C-D-E-H-B. Under the attack of wormhole nodes M and N, the minimum hop path becomes A-C-M-N-B, which will increase Final Node Positioning Error

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack reliable wireless sensor network node positioning method
  • Anti-attack reliable wireless sensor network node positioning method
  • Anti-attack reliable wireless sensor network node positioning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention will be described in detail below with reference to the above description and accompanying drawings. The implementation of the present invention is based on the following prerequisites and network assumptions:

[0024] a. All legal nodes have a global symmetric key; b. Each node in the network has a unique ID number to distinguish its identity; c. The hash value H(ID) corresponding to the ID number of each beacon node All nodes are public; d. All nodes in the network have synchronous clocks, which provide conditions for calculating the propagation time of signals when detecting the distance between nodes.

[0025] 1. Implementation instructions for the minimum hop count phase between beacon nodes and other beacon nodes

[0026] At this stage, a symmetric key encryption system is introduced when calculating the minimum number of hops between beacon nodes, so that the location information sent by the beacon nodes can only be used by l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network security, and relates to an anti-attack reliable wireless sensor network node positioning method. In ordinary positioning methods, nodes to be positioned are easy to attack by malicious nodes, so the positioning effects of the nodes are influenced. By the reliable positioning method provided by the invention, Sybil attacks and wormhole attacks can be resisted at the same time. The method comprises that: a beacon node estimates the smallest hop number between the beacon node and other beacon nodes; the beacon node estimates an average hop distance among the nodes; the nodes cooperate with one another to detect attack nodes in a network; and unknown nodes estimate own coordinates. Compared with the prior art, the invention improves the attack resistance of the wireless sensor nodes in a positioning process, reduces positioning errors in an environment with the malicious nodes, and reduces the communication cost and calculation cost of the nodes as much as possible in the positioning method by fully combining the characteristic that the energy of the wireless sensor nodes is finite.

Description

technical field [0001] The invention relates to a reliable wireless sensor network node positioning method, in particular to a reliable wireless sensor network node positioning method that can resist witch attacks and wormhole attacks at the same time, can be used for position calculation of unknown nodes in wireless sensor networks, and belongs to Network information security field. Background technique [0002] Wireless sensor network has become a hot field in network research, and its wide application has also attracted people's attention. In most applications of wireless sensor networks, it is only meaningful to link the data collected by sensor nodes with the location information of the nodes. Therefore, node localization is a key technology among many research problems in wireless sensor networks. [0003] The positioning methods of wireless sensor networks are mainly divided into ranging-based positioning algorithms and non-ranging-based positioning methods. Compar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W64/00H04W12/03H04W12/0431H04W12/122
CPCY02D30/70
Inventor 何泾沙张婷张旸
Owner 北京涵鑫盛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products