Font Size: a A A

The Research On WSN Secure Localization Method Cater To The Spoofing Attack

Posted on:2018-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y TengFull Text:PDF
GTID:2348330542969901Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks(WSNs)are network consisting of a large number of sensor nodes with low-cost,limited storage and limited computing power characteristics.WSNs are the new network developed on the basis of the computer technology,wireless communication technology,modern sensing technology,embedded technology and intelligent system technology,which with some advantage traits,like high speed data propagation velocity,low power consumption,fast networking and etc.Its advantages make it widely used in many fields,like smart home,intelligent medical,military survey,intelligent transportation and etc.The location information of sensor nodes plays a very important role in the application of WSNs.Therefore,node positioning technology is significant in WSNs,which is one of the technologies that support some other key technologies.In the practical application of WSN,sensor nodes often need to be deployed in unattended areas,or even malicious and dangerous environment,therefore the sensor nodes are susceptible to attacks from the positioning system.These attacks often compromise the positioning process through the signal interference or node capture,which resulting in seriously issues,such as nodes cannot be accurately positioned,nodes failing to monitor the data or even the entire network cannot work normally.This paper analyzes the characteristics of spoofing attacks and its influence on the positioning process of nodes in detail,and puts forward two kinds of security localization algorithms to resist spoofing attack encountered in nodes positioning process.The first one is the security localization algorithm based on quasi-Newton iteration,and the second one is the filtration security localization algorithm based on residual analysis.For the security localization algorithm based on quasi-Newton iteration,utilize the quasi-Newton iteration algorithm to coordinate the network nodes.The gradient model value in the process of iterative operation is used as the reference index to detect whether the anchor node is legal or malicious.Finally,malicious data are filtered by filtration algorithm,in order to against the negative impact of spoofing attacks on network node localization.The filtration security localization algorithm based on residual analysis combines the gradient descent method and the residual analysis filtration algorithm.In the residual analysis filtration algorithm,the residuals generated in the iterative process of objective function are used as the analysis objects,and the malicious information in the positioning process is filtered by the filtration method through comprehensive analysis of the residual value and the residual deviation value,intending to improve the ability to against spoofing attack.Simulation and experimental results show that those two security localization algorithms not only can resist the impact of spoofing attacks on the positioning of WSNs,but also have a high degree of robustness.
Keywords/Search Tags:Wireless Sensor Network, Security Localization, Spoofing Attack, Quasi-Newton Iteration, Gradient Value, Residual Analysis, Filtration
PDF Full Text Request
Related items