Secure DV-Hop Algorithm Against Malicious Beacon Nodes
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The beacon nodes play a key role in the process of unknown nodes' localization in wireless sensor networks' localization algorithms. However, the security of beacon nodes is often overlooked. A secure and optimal DV-Hop localization algorithm is proposed against malicious beacon nodes which send false location information in this paper. The proposed algorithm isolates malicious beacon nodes by the scheme of beacon-distance constraint and overcomes negative factor which is caused by the decline of beacon nodes' ratio and remaining malicious beacon nodes by the scheme of multi-correction balance. It improves the correction and security performance of localization algorithm.

    Reference
    Related
    Cited by
Get Citation

黄晨钟,许力,叶阿勇,钟进发.抵抗恶意信标的安全优化DV-Hop 算法.计算机系统应用,2011,20(9):131-134

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:January 22,2011
  • Revised:February 25,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063