无线传感器网络安全定位技术分析-analysis of wireless sensor network security positioning technology.docxVIP

  • 6
  • 0
  • 约7.94万字
  • 约 100页
  • 2018-08-10 发布于上海
  • 举报

无线传感器网络安全定位技术分析-analysis of wireless sensor network security positioning technology.docx

无线传感器网络安全定位技术分析-analysis of wireless sensor network security positioning technology

II ABSTRACT Positioning technology is a supporting technology in wireless sensor network (WSN). With the development of science and technology, the application of wireless sensor network in life and industry is more and more widely, the demand of positioning technology of wireless sensor network is higher and higher. Since the wireless sensor network is mainly used in unattended hostile environment, the network node in the process of positioning is vulnerable to hostile attackers interference and invasion, this vulnerability determines the security problem of the positioning technology is extremely important. So the research of wireless sensor network node security localization algorithm (i.e., secure localization) is an urgent need to solve and own widely application prospect. Dissertation compares and analyses the performance of currently main positioning algorithm, analysis of the offensive and defensive mechanism of the wireless sensor network protocol layers stack in the positioning process, in-depth study DV-HOP localization algorithm of own broad application prospects and range-based. For DV-HOP algorithms working principle, positioning accuracy, error sources and security hidden danger detailed analysis. To improve the defense of DV-HOP algorithm performance and positioning accuracy, dissertation proposes the DA-DV-HOP and DS -DV-HOP secure localization algorithm, and obtained the following results: Aim at DV-HOP localization algorithm is vulnerable to compromise attack, wormhole attack and block the attack, dissertation puts forward DA-DV-HOP security localization algorithm. The algorithm firstly encrypt and authenticate the routing node vector exchange protocol which in vulnerable to compromise attack, then through use entire network of average correction replace network correction value of beacon nodes which positioning error within a certain range, and eliminating network correction value which positioning error is greater than a certain limit, ma

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档