节点网络参数掩盖安全定位算法
DOI:
作者:
作者单位:

北京智慧城市网络有限公司

作者简介:

通讯作者:

中图分类号:

TP393

基金项目:


Secure Localization Algorithm with Parameter Masking for Note Network
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    对无线传感器网络的安全定位服务问题进行了研究,采用了无线传感器网络的参数掩盖安全定位算法。该方法将网络定位区域划分均匀分布的网格相位,对存在恶意节点参与定位的多跳节点网络设计参数掩盖通信信号,该信号中包含跳数和位置信息;将网络中每跳参数掩盖信号沿多跳路径叠加,产生多跳路径叠加信号的索引相位,通过逐跳解算掩盖信号的相角,并将其与相位索引矩阵匹配,恶意节点转发叠加的多跳掩盖信号使得估计的位置和跳数信息难以与相位索引矩阵匹配,从而筛选出恶意节点攻击的多跳路径;利用网络中节点的身份信息提取恶意节点,并对合法节点重新定位。经实验测试实现了多跳叠加的参数掩盖信号消除恶意节点对网络的攻击,有效抑制了恶意节点对合法节点定位精度的影响。

    Abstract:

    The parameter masking secure localization algorithm for wireless sensor networks is used for the issue of secure localization service in wireless sensor network (WSN). The parameter masking secure localization algorithm for wireless sensor network is proposed. The network localization area is divided into evenly distributed grids with phases, and the parameter masking communication signal is designed for the multi-hop node network with malicious nodes participating in the localization, which contains the number of hops and position information. Each hop parameter masking signal in the network is superimposed along the multi-hop path to generate the superimposed signal index phase with the multi-hop path. The phase angle of the parameter masking signal is solved hop by hop and matched with the phase index matrix. The malicious node forwards the superimposed multi-hop marsking signal, which makes the estimated position and hop information difficult to match with the phase index matrix, so as to screen out the multi-hop path attacked by the malicious node. The identity information of nodes in the network can be used to extract malicious nodes, and legitimate nodes are relocated. Through experimental testing, the parameter masking signal with multi-hop superposition eliminates the attack of malicious nodes on the network and effectively suppresses the influence of malicious nodes on the positioning accuracy of legitimate nodes.

    参考文献
    相似文献
    引证文献
引用本文

王子豪,胥玲.节点网络参数掩盖安全定位算法计算机测量与控制[J].,2024,32(12):178-183.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2023-09-19
  • 最后修改日期:2023-11-30
  • 录用日期:2023-12-01
  • 在线发布日期: 2024-12-24
  • 出版日期:
文章二维码