首页 | 本学科首页   官方微博 | 高级检索  
     

抵抗恶意信标的安全优化DV-Hop算法
引用本文:黄晨钟,许力,叶阿勇,钟进发.抵抗恶意信标的安全优化DV-Hop算法[J].计算机系统应用,2011,20(9):131-134.
作者姓名:黄晨钟  许力  叶阿勇  钟进发
作者单位:福建师范大学网络安全与密码技术重点实验室,福州,350007
基金项目:国家自然科学基金,福建省自然科学基金
摘    要:信标节点在无线传感器网络定位算法中起着关键作用,然而信标节点的安全常常被忽视.针对恶意信标节点发送虚假位置信息这种较常见且破坏性较强的攻击方式,在DV-Hop定位算法的基础上提出了一种抵抗恶意信标的安全Dv-Hop定位算法.该算法利用信标之间的距离约束来隔离恶意信标节点,同时采用多信标校正值权衡的策略克服了信标比例下降...

关 键 词:无线传感器网络  DV-Hop  定位安全
收稿时间:2011/1/22 0:00:00
修稿时间:2011/2/25 0:00:00

Secure DV-Hop Algorithm Against Malicious Beacon Nodes
HUANG Chen-Zhong,XU Li,YE A-Yong and ZHONG Jin-Fa.Secure DV-Hop Algorithm Against Malicious Beacon Nodes[J].Computer Systems& Applications,2011,20(9):131-134.
Authors:HUANG Chen-Zhong  XU Li  YE A-Yong and ZHONG Jin-Fa
Affiliation:HUANG Chen-Zhong,XU Li,YE A-Yong,ZHONG Jin-Fa(Key Lab of Network Security and Cryptology,Fujian Normal University,Fuzhou 350007,China)
Abstract:The beacon nodes play a key role in the process of unknown nodes' localization in wireless sensor networks' localization algorithms.However,the security of beacon nodes is often overlooked.A secure and optimal DV-Hop localization algorithm is proposed against malicious beacon nodes which send false location information in this paper.The proposed algorithm isolates malicious beacon nodes by the scheme of beacon-distance constraint and overcomes negative factor which is caused by the decline of beacon nodes' ...
Keywords:wireless sensor networks  DV-Hop  secure node localization  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号