Font Size: a A A

Research Of Secuirty Localization In Wireless Sensor Networks

Posted on:2013-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:X S LiuFull Text:PDF
GTID:2248330395453991Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
As a new network technology originated from the military field, wireless sensornetworks has a wide range of applications. So the node localization technology plays animportant role in wireless sensor networks. At present, most of the positioning systems orlocalization algorithms are limited in a safe and reliable environment of wireless sensornetworks, which ignore the security of the network in the positioning process. To a certaindegree, we study the secure localization mechanisms in the paper, which can overcome theshortages of some mechanisms.According to secure threats of the process of localization (wormhole attacks, nodecaptured attack, node-tampering attack), we study the secure localization mechanism thatresist to the attacks in this paper. Based on having considered the relevant domain knowledgesof home and abroad carefully, we use the methods which combine theoretical analysis andexperimental simulation. This paper discusses from the malicious node detection and the errorestimates etc. respectively. According to the mutual informations between the nodes,encryption and authentication mechanism, with no considering the impact of illegal nodes(including the node unable to locate) on the localization process in DV-Hop localizationalgorithm, this paper presented a secure localization mechanism based on DV-Hop. At thesame time, by analyzing the impact of wormhole attacks on the range-based localization inwireless sensor networks, a range-based secure localization scheme-node labeling scheme isproposed in this paper. Based on the two secure localization mechanisms, the correspondingmathematical models were established.Simulation results show that, two new security mechanisms in this paper have a goodsafety, while improve the precision of the localization. So they are more suitable to apply innode localization process of wireless sensor networks.
Keywords/Search Tags:wireless sensor networks, secure location, wormhole attacks, node-tamperingattack
PDF Full Text Request
Related items