A secure multi-hop positioning method for wireless sensor networks

A wireless sensor and positioning method technology, applied in wireless communication, network topology, security devices, etc., can solve problems such as false location information, wrong location information, and unreliability

Inactive Publication Date: 2011-12-28
BEIHANG UNIV
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in actual positioning, the location information provided by some anchor nodes may be wrong or unreliable (called untrusted anchor nodes)
For example, in a sensor network used for forest fire monitoring or wild animal ecological behavior research, some artificially deployed anchor nodes may be moved by wild animals or hurricanes, and there may be a large gap between the broadcast coordinates and the actual position during the positioning process ; In a typical underwater sensor network, the anchor node obtains its own coordinates by communicating with the buoy with the GPS module, and then assists the positioning of the unknown node. Due to the error of the GPS module and the influence of non-line-of-sight, the anchor node broadcasts There may be great uncertainty in the location coordinates of the sensor network; in harsh environments, the sensor network is vulnerable to various external or internal attacks, and some malicious or compromised anchor nodes will send false location information, thereby disrupting the positioning of sensor network nodes process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure multi-hop positioning method for wireless sensor networks
  • A secure multi-hop positioning method for wireless sensor networks
  • A secure multi-hop positioning method for wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0079] The present invention proposes a secure multi-hop positioning method for wireless sensor network, such as figure 1 As shown, it specifically includes the following steps:

[0080] Step 1: All nodes obtain the multi-hop distance and the number of multi-hop distances from themselves to all anchor nodes within their multi-hop communication range;

[0081] All anchor nodes broadcast a position information frame containing their own ID and their own position coordinates. Through the position information frame in the wireless sensor network in a multi-hop manner and distance measurement between neighboring nodes, all nodes obtain their multi-hop communication range The position coordinates of all anchor nodes and the multi-hop distance and the number of multi-hop distance hops from itself to the corresponding anchor node; the multi-hop communication range refers t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, which belongs to the wireless sensor network positioning technology field, discloses a wireless sensor network safety multi-hop positioning method. The method comprises the following steps that: step 1. all nodes acquire multi-hop distances and multi-hop distance hop counts of all anchor nodes in a ranged of from the nodes to a multi-hop communication scope; step 2. the anchor nodecarries out assessment to a trust degree of other anchor node broadcast coordinates in the multi-hop communication scope; step 3. the anchor nodes use a multi-hop mode to broadcast an obtained trust degree assessment value; step 4. an unknown node solves a comprehensive trust value of the anchor nodes in the multi-hop communication scope; step 5. the unknown node establishes a coordinate estimateequation set which includes anchor node reliability; step 6. the unknown node solves the position coordinate of its own. In the invention, through the mutual trust assessment and comprehensive trust value calculation of the nodes in the multi-hop communication scope, negative influence of non-trusted anchor nodes to wireless sensor network multi-hop positioning can be reduced; system security andreliability can be enhanced; positioning precision of the wireless sensor network can be raised.

Description

Technical field [0001] The invention belongs to the technical field of wireless sensor network positioning, in particular to multi-hop self-positioning of wireless sensor network nodes under the interference condition of non-trusted anchor nodes, and is specifically a wireless sensor network safe multi-hop positioning method. Background technique [0002] The wireless sensor network (referred to as the sensor network) is a multi-hop self-organizing network system composed of a large number of sensor nodes with data collection and processing functions through wireless communication. As a bridge connecting the real physical world and virtual information world, wireless sensor networks have a wide range of applications in many aspects such as environmental monitoring, military security, logistics and transportation, industrial control, precision agriculture, smart homes, and medical care. [0003] In practical applications, sensor nodes can complete the perception of various environme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W64/00H04W84/18
Inventor 万江文郭晓雷于宁吴银锋冯仁剑
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products