Font Size: a A A

Secure Location Research In Wireless Sensor Networks

Posted on:2015-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:M W ZhouFull Text:PDF
GTID:2298330431985372Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
It’s very important to locate the node’s position or conform where the event happens inwireless sensor networks. The accurate positioning of node itself is not only the base ofproviding target position information or monitoring the events, but also the base of providingnetwork topology’s self-configuring, improving routing efficiency, reporting to deployerabout the quality of network’s coverage and providing the network namespace and othernetwork functions.As wireless sensor networks are often deployed in harsh environments, and beconstrained by their limited resource and other inherent characteristics, nodes are vulnerableto be attacked against the effectiveness of positioning system. Once the positioning systemfailed, it will bring a series of serious consequences, such as the entire network systemcrashes, network monitoring data failedand so on.Therefore, to design a safety orientationprogram against attack is especially important.This paper discusses the structural features of wireless sensor networks and the currentdevelopment of the related technologies at home and abroad. Base on the deep study on thelocation technologies and locate algorithms, study a large number of existing safetypositioning schemes, and analyze the advantages and disadvantages of them. Then wepropose two secure scheme, one is safety enhance research based on DV-Hop localizationalgorithm and the other is an improved Newton approach to secure location in WSNs. In thefirst scheme, first, use simple trigonometrical inequalities rules to check the legitimacy of thebeacon nodes, then use the RTT attribute of two adjacent nodes to check whether thewormhole links exist, through correcting the hops between the nodes to realize the securelocation of the unknown nodes. Simulation results show that our scheme’s feasibility andeffectiveness. Under the low hardware requirements, enhanced the security and robustness ofthe localization algorithm. In the second scheme, itdivided into two stages, in the first stage,the unknown node get the preliminary estimates from all the anchor nodes by the NewtonDescent algorithm. In the second stage, selective pruning of inconsistent measurements andthen achieve an accuracy result. Simulation results demonstrate that the proposed scheme iseffective, it has strong robustness and security and has the ability to withstand a variety ofattacks and more wide usability.
Keywords/Search Tags:WSNs, Secure Location, DV-hop, Newton’s method
PDF Full Text Request
Related items