CN102186171B - Anti-attack reliable wireless sensor network node positioning method - Google Patents
Anti-attack reliable wireless sensor network node positioning method Download PDFInfo
- Publication number
- CN102186171B CN102186171B CN2011100592123A CN201110059212A CN102186171B CN 102186171 B CN102186171 B CN 102186171B CN 2011100592123 A CN2011100592123 A CN 2011100592123A CN 201110059212 A CN201110059212 A CN 201110059212A CN 102186171 B CN102186171 B CN 102186171B
- Authority
- CN
- China
- Prior art keywords
- node
- nodes
- beaconing nodes
- attack
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000004891 communication Methods 0.000 claims abstract description 17
- 230000009191 jumping Effects 0.000 claims description 26
- 230000007246 mechanism Effects 0.000 claims description 15
- 230000004807 localization Effects 0.000 claims description 14
- 235000008694 Humulus lupulus Nutrition 0.000 claims description 12
- 238000012360 testing method Methods 0.000 claims description 5
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 238000007476 Maximum Likelihood Methods 0.000 claims description 2
- 230000000644 propagated effect Effects 0.000 claims description 2
- 230000008054 signal transmission Effects 0.000 claims description 2
- 230000008685 targeting Effects 0.000 claims 1
- 238000004364 calculation method Methods 0.000 abstract description 7
- 230000000694 effects Effects 0.000 abstract description 4
- 238000004088 simulation Methods 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000002474 experimental method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
Description
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100592123A CN102186171B (en) | 2011-03-11 | 2011-03-11 | Anti-attack reliable wireless sensor network node positioning method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100592123A CN102186171B (en) | 2011-03-11 | 2011-03-11 | Anti-attack reliable wireless sensor network node positioning method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102186171A CN102186171A (en) | 2011-09-14 |
CN102186171B true CN102186171B (en) | 2013-07-10 |
Family
ID=44572229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100592123A Expired - Fee Related CN102186171B (en) | 2011-03-11 | 2011-03-11 | Anti-attack reliable wireless sensor network node positioning method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102186171B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378217B (en) * | 2011-11-01 | 2014-05-28 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
CN103200568A (en) * | 2012-01-06 | 2013-07-10 | 西门子公司 | Method and device for node location in wireless sensor network and sensor nodes |
CN103237332B (en) * | 2013-03-29 | 2015-07-01 | 天津大学 | Energy-saving routing method for underwater sensor network on basis of vector forwarding |
CN103167609A (en) * | 2013-04-01 | 2013-06-19 | 苏州大学 | Hop-based wireless sensor network node positioning method and system |
CN103297973B (en) * | 2013-06-04 | 2016-09-07 | 河海大学常州校区 | Witch's intrusion detection method in underwater sensor network |
CN103812864B (en) * | 2014-01-26 | 2016-09-14 | 中国人民解放军国防科学技术大学 | Sybil attack detection method in online community network |
CN103957526B (en) * | 2014-05-20 | 2017-08-08 | 电子科技大学 | Worm-hole attack localization method |
CN104038547B (en) * | 2014-06-17 | 2017-04-12 | 中国人民解放军国防科学技术大学 | Method for effectively resolving multi-Sybil node penetration conflict in P2P network |
CN104507079A (en) * | 2014-12-16 | 2015-04-08 | 南京邮电大学 | Sensor network positioning defense method on basis of multiple false identities |
CN105721467B (en) * | 2016-02-16 | 2019-01-11 | 上海交通大学 | Social networks Sybil crowd surveillance method |
CN105873065B (en) * | 2016-03-28 | 2019-02-19 | 南京邮电大学 | Wireless sense network safe positioning method based on Trust Values Asses |
CN106781187B (en) * | 2016-12-02 | 2019-04-09 | 武汉科技大学 | Scene of fire fire source area positioning method based on multidimentional system FM model |
CN109819397B (en) * | 2019-01-31 | 2020-11-24 | 南京邮电大学 | Approximate triangle interior point test positioning algorithm for resisting Sybil attack |
CN113726802B (en) * | 2021-09-02 | 2023-02-03 | 中国人民解放军国防科技大学 | Network virus propagation analysis method, device, computer equipment and medium |
CN116319095B (en) * | 2023-05-19 | 2023-07-28 | 天津工业大学 | Beacon implantation detection method in high-flux network environment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309151A (en) * | 2008-07-11 | 2008-11-19 | 西安电子科技大学 | Safe positioning method for wireless sensor |
CN101772013A (en) * | 2010-01-26 | 2010-07-07 | 哈尔滨工程大学 | Voting mechanism based WSN anti-attack node positioning method |
CN101820618A (en) * | 2010-04-13 | 2010-09-01 | 中国科学技术大学 | Wireless sensor safe positioning method and device for resisting most collusion attacks |
CN101873691A (en) * | 2010-06-09 | 2010-10-27 | 中国人民解放军海军航空工程学院 | Method for positioning wireless sensor network node without ranging based on connectedness |
-
2011
- 2011-03-11 CN CN2011100592123A patent/CN102186171B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309151A (en) * | 2008-07-11 | 2008-11-19 | 西安电子科技大学 | Safe positioning method for wireless sensor |
CN101772013A (en) * | 2010-01-26 | 2010-07-07 | 哈尔滨工程大学 | Voting mechanism based WSN anti-attack node positioning method |
CN101820618A (en) * | 2010-04-13 | 2010-09-01 | 中国科学技术大学 | Wireless sensor safe positioning method and device for resisting most collusion attacks |
CN101873691A (en) * | 2010-06-09 | 2010-10-27 | 中国人民解放军海军航空工程学院 | Method for positioning wireless sensor network node without ranging based on connectedness |
Also Published As
Publication number | Publication date |
---|---|
CN102186171A (en) | 2011-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102186171B (en) | Anti-attack reliable wireless sensor network node positioning method | |
Meghdadi et al. | A survey of wormhole-based attacks and their countermeasures in wireless sensor networks | |
Liu et al. | Attack-resistant location estimation in wireless sensor networks | |
Li et al. | Security and privacy in localization for underwater sensor networks | |
Chen et al. | Securing DV-Hop localization against wormhole attacks in wireless sensor networks | |
Bouassida et al. | Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. | |
Lv et al. | Detecting the sybil attack cooperatively in wireless sensor networks | |
Grover et al. | A novel defense mechanism against sybil attacks in VANET | |
Labraoui et al. | Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks | |
Kushwaha et al. | A survey on sybil attack in vehicular ad-hoc network | |
CN102006663B (en) | Safe positioning method in wireless sensor network | |
CN104160673A (en) | Secure routing based on degree of trust | |
Alheeti et al. | An intelligent intrusion detection scheme for self-driving vehicles based on magnetometer sensors | |
CN102223627B (en) | Beacon node reputation-based wireless sensor network safety locating method | |
Won et al. | Robust sensor localization against known sensor position attacks | |
Mekliche et al. | L-P2DSA: Location-based privacy-preserving detection of Sybil attacks | |
Chen et al. | Securing emerging wireless systems: lower-layer approaches | |
Zhang et al. | Trust based secure localization in wireless sensor networks | |
Tian et al. | A novel sybil attack detection scheme for wireless sensor network | |
Zhang et al. | A robust localization algorithm for wireless sensor networks | |
Wang et al. | Research on improved DV-HOP algorithm against wormhole attacks in WSN | |
Yuan et al. | PrSLoc: Sybil attack detection for localization with private observers using differential privacy | |
Iqbal et al. | Attack-resistant sensor localization under realistic wireless signal fading | |
Yu et al. | A novel D–S based secure localization algorithm for wireless sensor networks | |
Sharma et al. | Proficient techniques and protocols for the identification of attacks in WSN: A review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210602 Address after: 102600 room 2212, 2 tower, Pope center 3, 2 Xinghua street, Daxing District, Beijing. Patentee after: BEIJING YONGBO TECHNOLOGY Co.,Ltd. Address before: 100124 No. 100 Chaoyang District Ping Tian Park, Beijing Patentee before: Beijing University of Technology |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220329 Address after: 100020 499, floor 04, 101, floor 1-14, building 4, yard 59, Chemical Road, Chaoyang District, Beijing Patentee after: Beijing hanxinsheng Technology Co.,Ltd. Address before: 102600 room 2212, 2 tower, Pope center 3, 2 Xinghua street, Daxing District, Beijing. Patentee before: BEIJING YONGBO TECHNOLOGY CO.,LTD. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130710 |