Font Size: a A A

The Study Of Malicious Beacon Node Detection-based Secure Localization Algorithm Of Underwater Sensor Networks

Posted on:2015-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2298330452959040Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As one of the most important technologies of Underwater Sensor Networks, NodeLocalization acts as the basis of many other applications. However, due to thecomplicated and open environment, beacon nodes are easy to be captured by hostileforces and turned into malicious nodes, which can cause serious threats to the securityand reliability of the system. Therefore, it’s quite necessary to achive the timelyidentification of malicious beacon nodes and the efficient, accurate node localizationin Underwater Sensor Networks.In this paper, we start from the features of Underwater Sensor Networks, thendiscuss about the vulnerabilities, attacks and some existing security measures, andpoint out the perniciousness of malicious beacon nodes. To improve the security andreliability of the localization system, this paper presents a distributed and trust-basedmachanism for malicious beacon node detection algorithm. The algorithm combinesthe localization algorithm and Beta model-based trust management system, andpresents a trust filter mechanism, by which we can recognize malicious beaconnodes’s bad-mouthing attack through the direct trust value comparison. What’s more,this paper improves the detection success rate and restrains the location error bydouble-dicision, thus enhances the attack-tolerant ability of localization algorithm.The simulation platforms include Matlab and a NS2-based simulator namedAqua-sim. Simulation results show that even with a high proportion of maliciousbeacon nodes, the presented algorithm can still achieve lower location error andhigher detection success rate. Compared with the existing secure localizationalgorithm, the presented algorithm has advantages in detection speed and accuracy.Overall, the presented algorithm has achieved the expected requirements.
Keywords/Search Tags:Underwater Sensor Networks, Secure Localization, Node Capture, Trust Management
PDF Full Text Request
Related items