Anti-attack encrypting positioning method and device of wireless sensor network

A wireless sensor and positioning method technology, applied in the field of communication, can solve the problems of performance degradation, positioning system impact, and inability to meet wireless sensor networks, etc., and achieve the effects of low power consumption, integrity protection, high confidentiality and independence

Active Publication Date: 2016-04-13
ZHONGBEI UNIV
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the Sybil node launches an attack, if it cannot be effectively detected and prevented, the falsely reported node position and the wrong number of nodes will have a serious impact on the positioning system of the WSN, and the performance of many basic network functions such as routing, elections and security mechanisms will be drastically reduced. decline
[0006] Therefore, the current existing research cannot meet the practical application requirements of low-power and low-cost wireless sensor networks in complex environments, so it is necessary to study a low-power, confidentiality-based, independent wireless sensor network based on RSSI technology from the actual situation. Strong, scalable, and attack-resistant positioning algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack encrypting positioning method and device of wireless sensor network
  • Anti-attack encrypting positioning method and device of wireless sensor network
  • Anti-attack encrypting positioning method and device of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] The following describes the wireless sensor network anti-attack encrypted positioning method according to Embodiment 1 of the present invention.

[0057] (1) Encryption method

[0058] The beacon node BN (beaconnode) generates a ranging message, which contains the ID of the beacon node and the transmission power Pi. Assuming that the binary ranging message that the beacon node BN needs to transmit is k, the encoding process of the transmitter for:

[0059] 1) Carry out Manchester encoding on the ranging message k, that is, m=Manchester(k), to obtain the code word m. The rule is that 1 corresponds to "01" and 0 corresponds to "10". For example, if k="1010", m="01100110" can be obtained.

[0060] 2) Using a pseudo-random modulation method to perform pseudo-random processing on the code word m to obtain a pseudo-random signal, that is, a signal code b, where b=PR(m).

[0061] 3) During the information sending process, the message code b is continuously sent in the form ...

Embodiment 2

[0076] Such as figure 2 As shown, it is a block flow diagram of the wireless sensor network anti-attack encrypted positioning method according to the second embodiment of the present invention.

[0077] (1) Encryption method

[0078] The beacon node BN (beaconnode) generates a ranging message, which contains the ID of the beacon node and the transmission power Pi. Assuming that the binary ranging message that the beacon node BN needs to transmit is k, the encoding process of the transmitter for:

[0079] 1) Perform Manchester coding on k, that is, m=Manchester(k). The rule is that 1 corresponds to "01" and 0 corresponds to "10", such as k="1010", m="01100110" can be obtained.

[0080] 2) Using a pseudo-random modulation method to perform pseudo-random processing on m to obtain a pseudo-random signal, that is, a signal code b, where b=PR(m).

[0081] 3) In the process of sending information, a delimiter is inserted into the signal code b and then sent out at regular interv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-attack encrypting positioning method and device of a wireless sensor network. The method comprises: a process of sending the codes of a distance measuring message by a beacon node: carrying out Manchester coding to the distance measuring message k, obtaining a code word m; carrying out pseudorandom coding to data m, outputting a code b, sending out the code b through broadcast; and a process of receiving and decoding information by an unknown node: receiving the broadcast information, measuring the signal power Ri of the broadcast at the unknown node, carrying out amplitude limited filtering to the received information, obtaining a code b1; carrying out pseudorandom decoding processing to the code b1 according to a pseudorandom parameter, obtaining a code word m1; carrying out Manchester decoding to the code word m1, obtaining the distance measuring message k1; carrying out self positioning according to the distance measuring message k1 and receiving power R. According to the invention, completeness of the information is protected independent of the information encrypting technique; the anti-attack ability and information processing speed of the system are improved; and the energy consumption of the hardware is reduced.

Description

technical field [0001] The invention relates to a wireless sensor network encrypted positioning method and device, belonging to the technical field of communication. Background technique [0002] A wireless sensor network (WSN) is composed of a large number of intelligent sensor nodes. These nodes have the ability of computing, communication, storage, etc., and can cooperate with each other in the form of wireless communication to jointly achieve related tasks. The wireless sensor network combines sensor technology, modern network, embedded computing technology and distributed information processing. It can perceive, monitor and collect monitoring objects and environmental information in the network coverage area in real time, and then process the data through multi-hop, The self-organized network uploads to users who need this information. At present, wireless sensor networks have been widely used in many fields such as environmental science, medical health, traffic manage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W64/00H04W84/18
CPCH04W12/02H04W64/00H04W84/18Y02D30/70
Inventor 王伟
Owner ZHONGBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products