CN102223627A - Beacon node reputation-based wireless sensor network safety locating method - Google Patents
Beacon node reputation-based wireless sensor network safety locating method Download PDFInfo
- Publication number
- CN102223627A CN102223627A CN2011101631820A CN201110163182A CN102223627A CN 102223627 A CN102223627 A CN 102223627A CN 2011101631820 A CN2011101631820 A CN 2011101631820A CN 201110163182 A CN201110163182 A CN 201110163182A CN 102223627 A CN102223627 A CN 102223627A
- Authority
- CN
- China
- Prior art keywords
- beaconing nodes
- node
- identity
- nodes
- expression
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention relates to a beacon node reputation-based wireless sensor network safety locating method belonging to the technical field of computer network safety. Aiming at the problem of the reliability judgment of information provided by a beacon node in the locating method, a locating method for reputation evaluation of a beacon node is provided, the estimation can be carried out from two aspects of identity and behavior of the beacon node respectively, a trustworthy beacon node is screened out, and the location is carried out by utilizing the reliable information provided by the beacon node. The method comprises the following steps: the beacon node transmits self position information to peripheral nodes; adjacent beacon nodes carry out the reputation evaluation to the beacon node transmitting the information; the reputation evaluation of the beacon nodes, given by the adjacent beacon nodes, are synthesized, and the beacon nodes are ranked from top to bottom according to reputation values; and an unknown node selects the position information provided by the beacon nodes with the reputation value higher than a threshold value to carry out self-position estimation. In the invention, the reputation value of the beacon node can be effectively evaluated, so as to screen out more reliable position information for the location of the unknown node and improve the reliability of a location result.
Description
Technical field
The present invention relates to a kind of wireless sensor network security localization method based on beaconing nodes prestige, specifically be a kind ofly to estimate by prestige to beaconing nodes, filter out credible beaconing nodes, the securing position information that they are provided is used for the location of unknown node, can improve the fail safe of locating in the wireless sensor network, belong to filed of network information security.
Background technology
Wireless sensor network is widely used in fields such as military and national defense, environmental monitoring, rescue and relief work, in these applications, the positional information of sensor node is very important, need together return with other information that node collects, therefore, the self poisoning of node just becomes one of the basic functions of sensor network and service, also is simultaneously the numerous central key technologies that study a question at wireless sensor network.Yet because the wireless senser locating information is by radio propagation, and node exists open deployment, characteristics such as resource-constrained, causes position fixing process very easily to be attacked, and traditional safe practice is difficult to effectively solve these safety problems.
In the wireless sensor network node location, node with the known self-position of positioning function is called beaconing nodes, they can provide positional information to finish positioning action with reference to information with the node that helps to need to locate as the location to other nodes, and ordinary node to be positioned in the network is called unknown node.
In position fixing process, the node that needs the location is by with the position relation of node and the positional information of node issue around these are estimated the position of self on every side.Therefore, the fail safe of the positional information that these receive directly has influence on the reliability of positioning result, and the attack type that the wireless sensor network location mainly faces comprises external attack and internals attack.The assailant of external attack does not need to obtain the trust of network node, and they directly adopt any special measures locating information is disturbed or to be distorted; The assailant of internaling attack may have legal identity, but beaconing nodes still may provide dummy location information to unknown node after being captured.Because the reliability of the credit value of beaconing nodes and the positional information that they provide is difficult to judge, therefore internals attack for the wireless sensor node location and have more disguise and destructiveness.
Summary of the invention
The object of the present invention is to provide a kind of wireless sensor network security localization method based on beaconing nodes prestige.Use internaling attack that this method can effectively prevent to face in the wireless sensor network location, thereby reduce the position error of wireless sensor node under unsafe conditions.For achieving the above object, the present invention has comprised beaconing nodes prestige evaluation mechanism in position fixing process.
In position fixing process, for resisting internaling attack in the location, the positional information that need to guarantee to be used for location Calculation is that the beaconing nodes that sends these information is credible reliably, and the present invention introduces a kind of mechanism that the prestige of beaconing nodes that positional information is provided is assessed.In this mechanism, the positional information that the identity and the beaconing nodes of beaconing nodes sends is assessed respectively.In the process that the beaconing nodes identity is assessed, utilize the one-way of hash function to help beaconing nodes to authenticate mutually, simultaneously the positional information that sends is protected.In the process that behavior is assessed to beaconing nodes, beaconing nodes is estimated its neighbours' beaconing nodes, and also comprehensive simultaneously other neighbours' beaconing nodes make evaluation result more reliable to its evaluation.But this mechanism effective evaluation goes out the credit value of beaconing nodes, and carrying out position calculation for unknown node provides reliable information, thus reduce effectively that captive beaconing nodes initiates internal attack influence to positioning result.
Wireless sensor network security localization method based on beaconing nodes prestige evaluation mechanism has four-stage, is respectively: 1. beaconing nodes towards periphery node send self positional information; 2. neighbours' beaconing nodes carries out the prestige assessment to the beaconing nodes that sends information; 3. the credit rating that provides of each neighbours' beaconing nodes of the comprehensive beaconing nodes of unknown node; 4. unknown node is estimated self-position.
The concrete steps of this four-stage are described below:
Stage 1: the netinit stage is that each legal beaconing nodes distributes a shared key k, and beaconing nodes i is with message { ID
i|| (x
i, y
i) || H (ID
i|| (x
i, y
i) || H (ID
i))
kBroadcasting is gone out, ID
iID number of expression beaconing nodes i, (x
i, y
i) two-dimensional coordinate of expression beaconing nodes i, H () expression is carried out Hash operation, { } with the information in the bracket
kExpression is encrypted the information in the bracket with key k.
Stage 2: neighbours' beaconing nodes is verified the identity of i, with they the information { ID of cipher key shared k to receiving after receiving the message that beaconing nodes i sends
i|| (x
i, y
i) || H (ID
i|| (x
i, y
i) || H (ID
i))
kBe decrypted the ID that deciphering is obtained
i, (x
i, y
i) and known H (ID
i) carry out Hash operation, obtain H ' (ID
i|| (x
i, y
i) || H (ID
i)), with the H (ID that obtains of deciphering from receive information
i|| (x
i, y
i) || H (ID
i)) compare, if identical, the identity that this beaconing nodes is described is legal, then these neighbours are 1 to the identity assessed value of i, otherwise these neighbours are 0 to the identity assessed value of i, neighbours' beaconing nodes j uses the identity assessed value of beaconing nodes i
Expression.
After beaconing nodes i is assessed as the legal node of identity, promptly
The time, the distance, delta d between the actual position of its neighbours' beaconing nodes j calculating i and the position that i oneself claims
Ji, draw behavior assessed value to beaconing nodes i
And send,
Neighbours' beaconing nodes j self of expression beaconing nodes i is to the behavior assessed value of i, Δ d
JiDistance between the actual position of the i that expression j calculates and the position that i oneself claims, R represents the communication radius of beaconing nodes.
Comprehensive other beaconing nodes of beaconing nodes j draw the behavior assessed value to the behavior evaluation of i
Represent the behavior assessed value of j to i,
Other beaconing nodes that expression j can receive are to the behavior assessed value of i, and α is the weight that j self estimates in assessed value, 0.5<α<1, and n represents that j can receive the beaconing nodes number about the evaluation of i.
The assessment result of comprehensive identity of the neighbor node of i and behavior two aspects draws the credit value for i
T
JiThe credit value that expression j estimates i,
Expression j is to the identity assessed value of i, and the identity assessed value equals 0 or 1, because i has passed through the identity assessment of j, therefore
Expression j is to the behavior assessed value of i.
Stage 3: unknown node u is according to formula
The beaconing nodes that calculating u can receive is to the credit value evaluation of i, T
ZiExpression beaconing nodes z is to the credit value evaluation of i, and what m represented that u can receive sends the number of the beaconing nodes of evaluation to i.
Unknown node u arranges beaconing nodes on every side from high to low according to the size of credit value.
Stage 4: unknown node utilizes the maximum likelihood estimation technique to calculate the coordinate of self, and unknown node need obtain the distance between the position of beaconing nodes and self and these beaconing nodes in calculating, and unknown node is chosen credit value greater than threshold value T
tBeaconing nodes, adopt the positional information that they provide, and utilize based on signal strength signal intensity, arrive angle, the time of advent or the time of advent difference one of distance-finding method obtain and these beaconing nodes between distance, 0<T wherein
t<1, T
tValue high relatively more, the reliability of the beaconing nodes that obtains is also big more.
With existing node security localization method contrast, the present invention has following feature:
(1) the present invention is not the safe positioning method that proposes at a certain attack form, but consider from the reliability of beaconing nodes that locating information is provided, from identity and two aspects of behavior the prestige of beaconing nodes is estimated, thereby filtered out reliable beaconing nodes and the positional information that provides is used for the location.
(2) the present invention is applicable to multiple localization method.
(3) the present invention does not have specific (special) requirements for the hardware of sensor node.
Description of drawings
Fig. 1 is a flow chart of the present invention
Fig. 2 is for lacking the unknown node position error simulation result figure relatively of beaconing nodes prestige evaluation mechanism in the present invention and the location
Embodiment
In conjunction with above-mentioned explanation and accompanying drawing, describe embodiments of the present invention below in detail.Enforcement of the present invention is supposed based on following precondition and network:
A. each node all has and distinguishes identity unique ID number in the network; B. the legal beaconing nodes of each identity all has the shared key k of the overall situation; C. the cryptographic Hash H (ID) of each beaconing nodes ID correspondence is disclosed to the legal beaconing nodes in the network.
Beaconing nodes towards periphery node send the implementation in the positional information stage of self
The netinit stage is disposed 20 sensor nodes unknown node and 15 beaconing nodes as the needs location at random in the rectangular area of 650m*600m, for each legal beaconing nodes distributes a shared key k, the communication radius of beaconing nodes and unknown node is made as 200m, and the concrete steps in this stage are described below:
Beaconing nodes i is with message { ID
i|| (x
i, y
i) || H (ID
i|| (x
i, y
i) || H (ID
i))
kBroadcasting is gone out, ID
iID number of expression beaconing nodes i, (x
i, y
i) two-dimensional coordinate of expression beaconing nodes i, H () expression is carried out Hash operation, { } with the information in the bracket
kExpression is encrypted the information in the bracket with key k.
2. neighbours' beaconing nodes carries out the prestige implementation of evaluation stage to the beaconing nodes that sends information
This stage is assessed from identity and two aspects of behavior for the prestige of beaconing nodes, and concrete steps are described below:
(1) after neighbours' beaconing nodes is received the message that beaconing nodes i sends, the identity of i is verified, with they the information { ID of cipher key shared k to receiving
i|| (x
i, y
i) || H (ID
i|| (x
i, y
i) || H (ID
i))
kBe decrypted the ID that deciphering is obtained
i, (x
i, y
i) and known H (ID
i) carry out Hash operation, obtain H ' (ID
i|| (x
i, y
i) || H (ID
i)), with the H (ID that obtains of deciphering from receive information
i|| (x
i, y
i) || H (ID
i)) compare, if identical, the identity that this beaconing nodes is described is legal, then these neighbours are 1 to the identity assessed value of i, otherwise these neighbours are 0 to the identity assessed value of i, neighbours' beaconing nodes j uses the identity assessed value of beaconing nodes i
Expression.
(2) after beaconing nodes i is assessed as the legal node of identity, promptly
The time, the distance, delta d between the actual position of its neighbours' beaconing nodes j calculating i and the position that i oneself claims
Ji, draw behavior assessed value to beaconing nodes i
And send,
Neighbours' beaconing nodes j self of expression beaconing nodes i is to the behavior assessed value of i, Δ d
JiDistance between the actual position of the i that expression j calculates and the position that i oneself claims, R represents the communication radius of beaconing nodes.J will draw and need consider that to the behavior assessed value of i self is to the evaluation to i of the evaluation of i and other beaconing nodes.
(3) comprehensive other beaconing nodes of beaconing nodes j draw the behavior assessed value to the behavior evaluation of i
Represent the behavior assessed value of j to i,
Other beaconing nodes that expression j can receive are to the behavior assessed value of i, and α is the weight that j self estimates in assessed value, and α=0.8 is established in 0.5<α<1.
(4) assessment result of comprehensive identity of the neighbor node of i and behavior two aspects draws the credit value for i
T
JiThe credit value that expression j estimates i,
Expression j is to the identity assessed value of i, and the identity assessed value equals 0 or 1, because i has passed through the identity assessment of j, therefore
Expression j is to the behavior assessed value of i.
3. the implementation in credit rating stage of providing of each neighbor node of the comprehensive beaconing nodes of unknown node
The concrete steps in this stage are described below:
(1) unknown node u is according to formula
The beaconing nodes that calculating u can receive is to the credit value evaluation of i, T
ZiExpression beaconing nodes z is to the credit value evaluation of i, and what m represented that u can receive sends the number of the beaconing nodes of evaluation to i.
(2) unknown node u arranges beaconing nodes on every side from high to low according to the size of credit value.
4. unknown node is estimated the implementation in self-position stage
Unknown node utilizes the maximum likelihood estimation technique to calculate the coordinate of self, and unknown node need obtain the distance between the position of beaconing nodes and self and these beaconing nodes in calculating, and unknown node is chosen credit value greater than threshold value T
tBeaconing nodes, adopt the positional information that they provide, and utilize based on signal strength signal intensity, arrive angle, the time of advent or the time of advent difference one of distance-finding method obtain and these beaconing nodes between distance.The credible threshold value of beaconing nodes credit value is made as T
t=0.75, the final credit value that is about to obtain is considered as believable greater than 0.75 beaconing nodes, and the positional information that they are provided is applied in the position estimation of unknown node.
In order to verify that the present invention is used for the effect of wireless sensor node location under beaconing nodes is captured situation, need to calculate the position error of unknown node.The computational methods of position error such as formula
(x wherein
u, y
u) expression unknown node u according to around the elements of a fix that estimate of the positional information that provides of beaconing nodes, (x '
u, y '
u) true coordinate of expression unknown node u, the communication radius of R ' expression unknown node.Can obtain the position error (as Fig. 2) of 20 unknown node according to the position error formula, by the invention enables the position error in most of unknown node position estimation to reduce among Fig. 2 as can be seen than having had significantly under the situation about beaconing nodes not being assessed.
In concrete exemplifying embodiment, safe position fixing process is by four-stage, effectively reduces positional information that insecure beaconing nodes provides to location influence.By The simulation experiment result as can be seen, because the present invention has added the prestige evaluation mechanism of beaconing nodes in position fixing process, make unknown node when the estimation self-position, can filter out credible positional information, the present invention can effectively reduce the average position error of wireless sensor network node under the captive situation of inner marker node, and the present invention has favorable applicability in wireless sensor network.
Claims (1)
1. wireless sensor network security localization method based on beaconing nodes prestige, the credit value by the assessment beaconing nodes filters out credible positional information, thereby improves the reliability of navigation system, it is characterized in that carrying out under following precondition:
A. each node all has and distinguishes identity unique ID number in the network;
B. the legal beaconing nodes of each identity all has the shared key k of the overall situation;
C. the cryptographic Hash H (ID) of each beaconing nodes ID correspondence is disclosed to the legal beaconing nodes in the network;
The step based on the safe positioning method of beaconing nodes prestige among the present invention is as follows:
Step 1: the positional information of beaconing nodes node transmission towards periphery self;
The netinit stage is that each legal beaconing nodes distributes a shared key k, and the concrete steps in this stage are described below:
Beaconing nodes i is with message { ID
i|| (x
i, y
i) || H (ID
i|| (x
i, y
i) || H (ID
i))
kBroadcasting is gone out, ID
iID number of expression beaconing nodes i, (x
i, y
i) two-dimensional coordinate of expression beaconing nodes i, H () expression is carried out Hash operation, { } with the information in the bracket
kExpression is encrypted the information in the bracket with key k;
Step 2: neighbours' beaconing nodes carries out the prestige assessment to the beaconing nodes that sends information;
The concrete steps in this stage are described below:
Step 2.1: neighbours' beaconing nodes is verified the identity of i, with they the information { ID of cipher key shared k to receiving after receiving the message that beaconing nodes i sends
i|| (x
i, y
i) || H (ID
i|| (x
i, y
i) || H (ID
i))
kBe decrypted the ID that deciphering is obtained
i, (x
i, y
i) and known H (ID
i) carry out Hash operation, obtain H ' (ID
i|| (x
i, y
i) || H (ID
i)), with the H (ID that obtains of deciphering from receive information
i|| (x
i, y
i) || H (ID
i)) compare, if identical, the identity that this beaconing nodes is described is legal, then these neighbours are 1 to the identity assessed value of i, otherwise these neighbours are 0 to the identity assessed value of i, neighbours' beaconing nodes j uses the identity assessed value of beaconing nodes i
Expression;
Step 2.2: when beaconing nodes i is evaluated as the legal node of identity by j after, promptly
The time, the distance, delta d between the actual position of its neighbours' beaconing nodes j calculating i and the position that i oneself claims
Ji, draw behavior assessed value to beaconing nodes i
And send,
Neighbours' beaconing nodes j self of expression beaconing nodes i is to the behavior assessed value of i, Δ d
JiDistance between the actual position of the i that expression j calculates and the position that i oneself claims, R represents the communication radius of beaconing nodes;
Step 2.3: comprehensive other beaconing nodes of beaconing nodes j draw the behavior assessed value to the behavior evaluation of i
Represent the behavior assessed value of j to i,
Other beaconing nodes that expression j can receive are to the behavior assessed value of i, and α is the weight that j self estimates in assessed value, 0.5<α<1, and n represents that j can receive the beaconing nodes number about the evaluation of i;
The assessment result of comprehensive identity of the neighbor node of step 2.4:i and behavior two aspects draws the credit value for i
T
JiThe credit value that expression j estimates i,
Expression j is to the identity assessed value of i, and the identity assessed value equals 0 or 1, because i has passed through the identity assessment of j, therefore
Step 3: the credit rating that each neighbor node of the comprehensive beaconing nodes of unknown node provides; The concrete steps in this stage are described below:
Step 3.1: unknown node u is according to formula
The beaconing nodes that calculating u can receive is to the credit value evaluation of i, T
ZiExpression beaconing nodes z is to the credit value evaluation of i, and what m represented that u can receive sends the number of the beaconing nodes of evaluation to i;
Step 3.2: unknown node u arranges beaconing nodes on every side from high to low according to the size of credit value;
Step 4: unknown node utilizes the maximum likelihood estimation technique to calculate the coordinate of self, and unknown node need obtain the distance between the position of beaconing nodes and self and these beaconing nodes in calculating, and unknown node is chosen credit value greater than threshold value T
tBeaconing nodes, adopt the positional information that they provide, and utilize based on signal strength signal intensity, arrive angle, the time of advent or the time of advent difference one of distance-finding method obtain and these beaconing nodes between distance, 0<T wherein
t<1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110163182.0A CN102223627B (en) | 2011-06-17 | 2011-06-17 | Beacon node reputation-based wireless sensor network safety locating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110163182.0A CN102223627B (en) | 2011-06-17 | 2011-06-17 | Beacon node reputation-based wireless sensor network safety locating method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102223627A true CN102223627A (en) | 2011-10-19 |
CN102223627B CN102223627B (en) | 2013-10-23 |
Family
ID=44780026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110163182.0A Expired - Fee Related CN102223627B (en) | 2011-06-17 | 2011-06-17 | Beacon node reputation-based wireless sensor network safety locating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102223627B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378217A (en) * | 2011-11-01 | 2012-03-14 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
CN102573055A (en) * | 2011-12-02 | 2012-07-11 | 上海电机学院 | Method for locating nodes in wireless sensor network |
CN103812696A (en) * | 2014-01-28 | 2014-05-21 | 河南科技大学 | Shuffled frog leaping algorithm based internet of things node reputation evaluation method |
CN104202295A (en) * | 2014-07-25 | 2014-12-10 | 苏州寻息电子科技有限公司 | Beacon node based safeguard system and implementation method thereof |
CN105873065A (en) * | 2016-03-28 | 2016-08-17 | 南京邮电大学 | Safe positioning method of wireless sensor network based on trust level evaluation |
CN109639582A (en) * | 2018-12-07 | 2019-04-16 | 大科数据(深圳)有限公司 | A kind of network node treatment method and device based on distributed hashtable |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159748A (en) * | 2007-11-14 | 2008-04-09 | 北京科技大学 | Entity authentication method in wireless sensor network |
CN101801011A (en) * | 2010-01-27 | 2010-08-11 | 哈尔滨工程大学 | WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism |
CN102006663A (en) * | 2010-12-03 | 2011-04-06 | 北京工业大学 | Safe positioning method in wireless sensor network |
-
2011
- 2011-06-17 CN CN201110163182.0A patent/CN102223627B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159748A (en) * | 2007-11-14 | 2008-04-09 | 北京科技大学 | Entity authentication method in wireless sensor network |
CN101801011A (en) * | 2010-01-27 | 2010-08-11 | 哈尔滨工程大学 | WSN (Wireless Sensor Network) safety routing method based on credit evaluating mechanism |
CN102006663A (en) * | 2010-12-03 | 2011-04-06 | 北京工业大学 | Safe positioning method in wireless sensor network |
Non-Patent Citations (1)
Title |
---|
杨光等: "WSNs基于信誉机制的恶意节点识别模型", 《哈尔滨工业大学学报》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378217A (en) * | 2011-11-01 | 2012-03-14 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
CN102378217B (en) * | 2011-11-01 | 2014-05-28 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
CN102573055A (en) * | 2011-12-02 | 2012-07-11 | 上海电机学院 | Method for locating nodes in wireless sensor network |
CN102573055B (en) * | 2011-12-02 | 2014-04-09 | 上海电机学院 | Method for locating nodes in wireless sensor network |
CN103812696A (en) * | 2014-01-28 | 2014-05-21 | 河南科技大学 | Shuffled frog leaping algorithm based internet of things node reputation evaluation method |
CN103812696B (en) * | 2014-01-28 | 2017-07-28 | 河南科技大学 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
CN104202295A (en) * | 2014-07-25 | 2014-12-10 | 苏州寻息电子科技有限公司 | Beacon node based safeguard system and implementation method thereof |
CN104202295B (en) * | 2014-07-25 | 2018-05-01 | 苏州寻息电子科技有限公司 | Security protection system and its implementation based on beaconing nodes |
CN105873065A (en) * | 2016-03-28 | 2016-08-17 | 南京邮电大学 | Safe positioning method of wireless sensor network based on trust level evaluation |
CN105873065B (en) * | 2016-03-28 | 2019-02-19 | 南京邮电大学 | Wireless sense network safe positioning method based on Trust Values Asses |
CN109639582A (en) * | 2018-12-07 | 2019-04-16 | 大科数据(深圳)有限公司 | A kind of network node treatment method and device based on distributed hashtable |
Also Published As
Publication number | Publication date |
---|---|
CN102223627B (en) | 2013-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102223627B (en) | Beacon node reputation-based wireless sensor network safety locating method | |
Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
AU2011329272B2 (en) | Spot beam based authentication of a satellite receiver | |
US9515826B2 (en) | Network topology aided by smart agent download | |
Larcom et al. | Modeling and characterization of GPS spoofing | |
Grover et al. | A novel defense mechanism against sybil attacks in VANET | |
Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
CN102123389B (en) | Safe positioning method of wireless sensor network | |
Kushwaha et al. | A survey on sybil attack in vehicular ad-hoc network | |
CN102186171A (en) | Anti-attack reliable wireless sensor network node positioning method | |
Boeira et al. | Vouch: A secure proof-of-location scheme for vanets | |
Hamdi et al. | A review on various security attacks in vehicular ad hoc networks | |
Davydov et al. | Accident detection in internet of vehicles using blockchain technology | |
Jin et al. | A traffic flow theory aided physical measurement-based sybil nodes detection mechanism in vehicular ad-hoc networks | |
CN103227793A (en) | RFID equipment layer information security transfer method and device based on random sequence | |
CN102378217B (en) | Beacon node credit assessment method in localization in wireless sensor networks | |
Chhatwal et al. | Detection of impersonation attack in VANETs using BUCK Filter and VANET Content Fragile Watermarking (VCFW) | |
US10389751B2 (en) | Wireless data security between vehicle components | |
CN102983979B (en) | Based on the Quick RFID authentication method of shared secret information between label | |
JP6556976B2 (en) | Geocentration based on network ranging | |
Kamel et al. | Feasibility study of misbehavior detection mechanisms in cooperative intelligent transport systems (C-ITS) | |
EP2573998B1 (en) | Method and system for smart agent download | |
Tian et al. | A novel sybil attack detection scheme for wireless sensor network | |
Zhang et al. | Trust based secure localization in wireless sensor networks | |
Su et al. | A privacy-preserving and vessel authentication scheme using automatic identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20131023 Termination date: 20160617 |
|
CF01 | Termination of patent right due to non-payment of annual fee |