###
DOI:
计算机系统应用英文版:2011,20(9):131-134
本文二维码信息
码上扫一扫!
抵抗恶意信标的安全优化DV-Hop 算法
(福建师范大学 网络安全与密码技术重点实验室,福州 350007)
Secure DV-Hop Algorithm Against Malicious Beacon Nodes
(Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou 350007, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1368次   下载 2718
Received:January 22, 2011    Revised:February 25, 2011
中文摘要: 信标节点在无线传感器网络定位算法中起着关键作用,然而信标节点的安全常常被忽视.针对恶意信标节点发送虚假位置信息这种较常见且破坏性较强的攻击方式,在DV-Hop 定位算法的基础上提出了一种抵抗恶意信标的安全DV-Hop 定位算法.该算法利用信标之间的距离约束来隔离恶意信标节点,同时采用多信标校正值权衡的策略克服了信标比例下降与残余恶意信标对定位结果带来的不利影响,提高定位的准确性和安全性.
中文关键词: 无线传感器网络  DV-Hop  定位安全
Abstract:The beacon nodes play a key role in the process of unknown nodes' localization in wireless sensor networks' localization algorithms. However, the security of beacon nodes is often overlooked. A secure and optimal DV-Hop localization algorithm is proposed against malicious beacon nodes which send false location information in this paper. The proposed algorithm isolates malicious beacon nodes by the scheme of beacon-distance constraint and overcomes negative factor which is caused by the decline of beacon nodes' ratio and remaining malicious beacon nodes by the scheme of multi-correction balance. It improves the correction and security performance of localization algorithm.
文章编号:     中图分类号:    文献标志码:
基金项目:国家自然科学基金(61072080);福建省自然科学基金(2009J01274)
引用文本:
黄晨钟,许力,叶阿勇,钟进发.抵抗恶意信标的安全优化DV-Hop 算法.计算机系统应用,2011,20(9):131-134
HUANG Chen-Zhong,XU Li,YE A-Yong,ZHONG Jin-Fa.Secure DV-Hop Algorithm Against Malicious Beacon Nodes.COMPUTER SYSTEMS APPLICATIONS,2011,20(9):131-134