Safe positioning method of wireless sensor network based on trust level evaluation

A wireless sensor network and secure positioning technology, applied in the field of information security, can solve the problems of less research and insufficient research on node positioning

Active Publication Date: 2016-08-17
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Technical issues: Positioning has been extensively studied as a key supporting technology of wireless sensor networks. However, the research on node positioning is not per...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe positioning method of wireless sensor network based on trust level evaluation
  • Safe positioning method of wireless sensor network based on trust level evaluation
  • Safe positioning method of wireless sensor network based on trust level evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Due to the limitations of sensor nodes, the security positioning algorithm itself cannot be as complete as the attack defense methods in traditional networks. At the same time, for the diversity of attack methods, the security positioning algorithm for wireless sensor networks must have both availability and Completeness. At present, based on these characteristics, secure location algorithms are divided into three categories: (1) Secure location strategy based on robust observation calculation; (2) Secure location strategy based on isolation of malicious beacon nodes; (3) Security based on location verification Positioning strategy.

[0046] The present invention adopts the security positioning algorithm based on the tolerant attack under the first type of algorithm. Compared with other algorithms, this algorithm has the following advantages: (1) The security positioning algorithm based on the tolerant attack has a wide range of attack types and successful defense. The ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe positioning method of a wireless sensor network based on trust level evaluation. A positioning attribute set is provided for a trust entity to carry out evaluation behaviors. According to the positioning attribute set, trust levels of beacon nodes are provided in a value form by quantifying key behavior expressions in node positioning processes. Moreover, a threshold value is determined; attack nodes are filtered; and moreover, the work of normal nodes cannot be influenced. When the attack nodes invade a system, as trust relationship is established, the attack nodes are filtered and will not participate in the positioning processes of the normal nodes.

Description

Technical field [0001] The invention relates to a wireless sensor network safety positioning method based on trust evaluation, which is used to solve various types of positioning attack problems in a wireless sensor network environment and belongs to the problem of the information security field. Background technique [0002] With the rapid development and iteration of sensor technology, embedded technology, and wireless communication technology, a wireless sensor network (WSN) composed of a large number of micro sensor nodes with micro-processing capabilities makes it possible to quickly and conveniently obtain three-dimensional integrated information of land, sea and air. . The traditional sensor system has already moved towards the practical process as early as the Vietnam War. The U.S. and Vietnam were anxious during the war on the densely-forested "Ho Chi Minh Trail" during that period. The U.S. military carried out multiple rounds of bombing on the "Ho Chi Minh Trail" at t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W64/00H04W84/18H04W12/122
CPCH04W12/12H04W64/00H04W84/18
Inventor 李鹏余笑天王汝传徐鹤王晓艳董璐谢慧彭徽陈艺婷
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products