Unlock instant, AI-driven research and patent intelligence for your innovation.

A Safe Positioning Method Based on Ranging in Wireless Sensor Networks

A wireless sensor and security positioning technology, applied in network topology, security devices, wireless communication and other directions, can solve the problems of interference in the ranging process, low detection accuracy, and high cost.

Active Publication Date: 2020-09-18
SUN YAT SEN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The second is to interfere with the ranging process
However, there are still some deficiencies in the existing security positioning algorithms: in some algorithms, the detection accuracy of the behavioral characteristics of malicious anchor nodes is not high, and there are cases where they cannot be detected, and the complexity of the detection method is too high, which indirectly increases the Power consumption of sensor nodes, which reduces the lifetime of the network, and some utilize additional specialized hardware, which is too costly for large-scale networks
Poor universality, usually only works on attacks in specific scenarios, and with the development of related technologies, various attack methods emerge in an endless stream, which is unpredictable, so it is hard to guard against

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Safe Positioning Method Based on Ranging in Wireless Sensor Networks
  • A Safe Positioning Method Based on Ranging in Wireless Sensor Networks
  • A Safe Positioning Method Based on Ranging in Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The present invention will be described in detail below in conjunction with specific embodiments and accompanying drawings.

[0092] Such as Figure 1a and Figure 1b In the attack model shown, the attacker's attack on the anchor node can be divided into two aspects:

[0093] One is to tamper with the location information of the anchor node. The attacker can move or isolate the anchor node, so that the unknown node receives the wrong location information of the anchor node and estimates the wrong location. Such as Figure 1a The unknown node in white and the malicious anchor node in black, the malicious anchor node changes the correct position M to the wrong position M'.

[0094] The second is to interfere with the ranging process. In TOA, the response time of the signal can be delayed, the transmission time of the signal can be increased, and the positioning process can be interfered. But in the final analysis, it can be regarded as a change in distance, such as Fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Aiming at the safe positioning problem of the wireless sensor network, the invention proposes a safe positioning method based on distance measurement. This method combines the advantages of the proposed improved density clustering algorithm and the hypothesis test of distance consistency. Through the detection of malicious anchor nodes, the influence of malicious anchor nodes on the positioning process is eliminated, and the effectiveness of positioning is guaranteed. The proposed MNDCC and EMNDCC algorithms include four stages: data collection, adaptive multiple DBSCAN (Density-Based Spatial Clustering of Applications with Noise) clustering, establishment of detection model, and sequential probability ratio test. The measurement values ​​(RSSI, TOA) have the characteristics of consistency to detect malicious anchor nodes, and further judge the detection results according to the sequential probability ratio test of statistical decision-making, which effectively reduces two types of errors ("abandoning the truth" and "taking the truth") Pseudo") occurs. The whole algorithm effectively improves the detection rate of malicious anchor nodes, thereby improving the positioning accuracy and ensuring the effectiveness of positioning.

Description

technical field [0001] This patent relates to the field of wireless sensor networks (Wireless Sensor Networks, WSNs), in particular to a safe positioning method for WSNs based on distance measurement. Background technique [0002] The Internet of Everything is a hot spot nowadays, and the wireless sensor network is the core component of the Internet of Things. It is closely related to the Internet of Things technology, and it can be said that WSNs are the technical support of the Internet of Things. WSNs mainly collect the information collected by many sensor nodes scattered in an area through wireless communication, so as to monitor and control the specific state in the area. WSNs have a wide range of applications, from environmental perception to vehicle tracking, from habitat monitoring (such as detecting and controlling the spread of wildfires) to battlefield management (such as detecting and tracking enemy vehicles), etc. In these applications, there is a common featur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/12H04W64/00H04W84/18H04L29/06G06K9/62H04W12/122H04W12/63
CPCH04L63/1416H04W12/00H04W12/12H04W64/006H04W84/18G06F18/23
Inventor 刘星成苏少花刘异橦
Owner SUN YAT SEN UNIV