共查询到19条相似文献,搜索用时 46 毫秒
1.
2.
3.
4.
5.
牛昆;杜秀娟;李同峰;马小璐 《电子技术与软件工程》2014,(20):36-37
随着科学技术的不断发展,无线传感器网络应用到了生活中的各个领域,近年来,世界各国对海洋资源的重视程度日益加深,水下无线传感器网络逐渐走入研究人员的视线,而对水下无线传感器网络的节点定位成为研究的重点。本文主要对水下无线传感器网络及其节点定位技术进行分析,并对无线传感器网络定位算法进行分类,同时提出水下无线传感器网络定位中遇到的问题。 相似文献
6.
7.
8.
9.
无线传感器网络(WSN)的许多应用都是基于节点的位置信息.本文从WSN的基于测距的定位算法和无需测距的定位算法对其定位算法进行详细的说明.并分析比较各定位算法的优缺点.最后还指出了WSN的自身定位问题的研究方向. 相似文献
10.
研究无线传感器网络节点定位的方法。首先介绍了节点定位的基本原理,在总结节点定位原理的基础上,对节点定位方法的分类依据进行了归纳。在对无线传感器网络节点定位方法的研究中,主要对是否基于测距的节点定位方法进行具体分析,介绍了2种类型的定位方法的基本原理,并对2种类型的定位方法中的典型算法做了具体说明,最后介绍了定位算法的评价标准。 相似文献
11.
Jun-Won HoAuthor Vitae Matthew WrightAuthor VitaeSajal K. DasAuthor Vitae 《Ad hoc Networks》2012,10(3):512-523
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to use location to find the source of attacks. In performing DDoS and false data injection attacks, he takes advantage of diversifying the attack paths with mobile malicious nodes to prevent network-level defenses. For attacks that disrupt or undermine network protocols like routing and clustering, moving the misbehaving nodes prevents them from being easily identified and blocked. Thus, mobile malicious node attacks are very dangerous and need to be detected as soon as possible to minimize the damage they can cause. In this paper, we are the first to identify the problem of mobile malicious node attacks, and we describe the limitations of various naive measures that might be used to stop them. To overcome these limitations, we propose a scheme for distributed detection of mobile malicious node attacks in static sensor networks. The key idea of this scheme is to apply sequential hypothesis testing to discover nodes that are silent for unusually many time periods—such nodes are likely to be moving—and block them from communicating. By performing all detection and blocking locally, we keep energy consumption overhead to a minimum and keep the cost of false positives low. Through analysis and simulation, we show that our proposed scheme achieves fast, effective, and robust mobile malicious node detection capability with reasonable overhead. 相似文献
12.
13.
14.
This article deals with the impact of malicious servers over different trust and reputation models in wireless sensor networks. First, we analysed the five trust and reputation models, namely BTRM-WSN, Eigen trust, peer trust, power trust, linguistic fuzzy trust model. Further, we proposed wireless sensor network design for optimisation of these models. Finally, influence of malicious servers on the behaviour of above mentioned trust and reputation models is discussed. Statistical analysis has been carried out to prove the validity of our proposal. 相似文献
15.
16.
Ad Hoc网络与无线传感器网络在电信中的应用 总被引:1,自引:0,他引:1
重点介绍Ad Hoc网络与其它传统通信网络相比具有的显著特点,这些特点使得Ad Hoc组网成为无线网络和移动计算领域最集中研究的热点,以及Ad Hoc网络在电信业的应用,除本身具有的重要价值外, 还具有大规模电信级服务.同时介绍无线传感器网络,介绍其特点,对WSN在电信中的应用前景进行分析. 相似文献
17.
Wireless Networks - Localization is one of the most important challenges of wireless sensor networks because the location information is typically used in other domains such as coverage,... 相似文献
18.
19.
随着P2P网络的迅速发展,它在各个领域被广泛应用,但由于P2P网络自身开放性、匿名性等特点,使网络中存在许多欺骗性、合谋性以及策略性的恶意节点,影响其有效性和可用性.目前存在许多信任模型都分别给出了抑制各种恶意节点的方法,文中从恶意节点出发,总结了典型信任模型中抑制恶意节点的主要方法. 相似文献