Font Size: a A A

Research On Secure Positioning In WSN Based On TDOA

Posted on:2013-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:R H ZhangFull Text:PDF
GTID:2248330395463144Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Node localization is the prerequisite and basis for wireless sensor networks to achieve high-level applications. However, the localization algorithms lack of consrderation of security issues early in the design. Node in the positioning process is vulnerable to attacks from the network of internal or external. The wrong location may cause the basic functions of network can not be achieved and even cause adverse consequences. Therefore, the study on the security mechanisms of location algorithm is very necessary.This paper aims to study the security of localization algorithm based on TDOA ranging in the wireless sensor network. On the basis of tracking progress at home and abroad, theoretical analysis and simulation experiments are combined to study respectively from the two aspects of active and passive. The main work is as follows:(1)The domestic and international positioning of the existing security algorithm has been analyzed and compared. The impact of attack on the positioning has been summarized.(2)A secure localization algorithm called S-TDOA based on an identity-based public key encryption scheme has been proposed and theoretically proved to be superior in the presence of spoofing attacks.(3)A secure localization algorithm called AR-TDOA which can tolerate a certain attack has been proposed. Consistency test has been raised as the basis of the information packet to isolate the false positioning data.(4)Simulation has been provided to evaluate the theoretical research based on programming techniques. The simulation results show that in the presence of malicious attacks positioning environment, compared to the traditional location algorithm based on TDOA ranging, the proposed secure localization algorithm has more advantages in all aspects of performance.
Keywords/Search Tags:TDOA ranging, Maximum likelihood estimate, identity-based encryption, information packet
PDF Full Text Request
Related items