一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

ZigBee網(wǎng)絡(luò)容忍惡意攻擊的安全定位算法

郁濱 劉子清

郁濱, 劉子清. ZigBee網(wǎng)絡(luò)容忍惡意攻擊的安全定位算法[J]. 電子與信息學(xué)報(bào), 2018, 40(7): 1676-1683. doi: 10.11999/JEIT170962
引用本文: 郁濱, 劉子清. ZigBee網(wǎng)絡(luò)容忍惡意攻擊的安全定位算法[J]. 電子與信息學(xué)報(bào), 2018, 40(7): 1676-1683. doi: 10.11999/JEIT170962
YU Bin, LIU Ziqing. Malicious Attack-resistant Secure Localization Algorithm for ZigBee Network[J]. Journal of Electronics & Information Technology, 2018, 40(7): 1676-1683. doi: 10.11999/JEIT170962
Citation: YU Bin, LIU Ziqing. Malicious Attack-resistant Secure Localization Algorithm for ZigBee Network[J]. Journal of Electronics & Information Technology, 2018, 40(7): 1676-1683. doi: 10.11999/JEIT170962

ZigBee網(wǎng)絡(luò)容忍惡意攻擊的安全定位算法

doi: 10.11999/JEIT170962 cstr: 32379.14.JEIT170962
基金項(xiàng)目: 

信息保障技術(shù)重點(diǎn)實(shí)驗(yàn)室開放基金(KJ-15-104)

詳細(xì)信息
    作者簡介:

    郁濱:郁 濱: 男,1964年生,教授,博士生導(dǎo)師,研究方向?yàn)闊o線網(wǎng)絡(luò)安全和視覺密碼. 劉子清: 男,1993年生,碩士生,研究方向?yàn)閆igBee和信息安全技術(shù).

  • 中圖分類號: TP393

Malicious Attack-resistant Secure Localization Algorithm for ZigBee Network

Funds: 

The Key Laboratory of Information Assurance Technology Open Fund (KJ-15-104)

  • 摘要: 該文提出一種基于進(jìn)化思想的容忍惡意攻擊安全定位算法(ELAMP)。依據(jù)最大似然估計(jì)概率模型,結(jié)合接收信號強(qiáng)度(RSS)標(biāo)準(zhǔn)差與距離的分布關(guān)系,建立ZigBee網(wǎng)絡(luò)安全定位模型。進(jìn)一步,設(shè)計(jì)進(jìn)化算法對模型進(jìn)行求解,并分析了算法的收斂性和時(shí)間復(fù)雜度。實(shí)驗(yàn)結(jié)果表明,當(dāng)惡意節(jié)點(diǎn)比例不超過50%的情況下,所提算法的定位精度明顯優(yōu)于已有定位算法。
  • KRISHNA K L, MADHURI J, and ANRADHA K. A ZigBee based energy efficient environmental monitoring alerting and controlling system[C]. IEEE International Conference on Information Communication and Embedded Systems, Chennai, India, 2016: 1-7. doi: 10.1109/ICICES.2016. 7518849.
    [2] SHALABY M, SHOKAIR M, and MESSIHA N W. Performance enhancement of TOA localized wireless sensor networks[J]. Wireless Personal Communications, 2017, 95(4): 4667-4679. doi: 10.1007/s11277-017-4112-8.
    [3] MENG Wei, XIE Lihua, and XIAO Wendong. Optimal TDOA sensor-pair placement with uncertainty in source location[J]. IEEE Transactions on Vehicular Technology, 2016, 65(11): 9260-9271.
    [4] TOMIC S, BEKO M, and RUI D. Distributed RSS-AoA based localization with unknown transmit powers[J]. IEEE Wireless Communications Letters, 2016, 5(4): 392-395.
    [5] YIU S, DASHTI M, and CLAUSSEN H, et al. Wireless RSSI fingerprinting localization[J]. Signal Processing, 2017, 131: 235-244. doi: 10.1016/j.sigpro.2016.07.005.
    YE Ayong, XU Li, and LIN Hui. Secure RSSI-based node positioning mechanism for wireless sensor networks[J]. Journal on Communications, 2012, 33(7): 135-142.
    [7] ZEYTINCI M B, SARI V, HARMANCI F K, et al. Location estimation using RSS measurements with unknown path loss exponents[J]. Eurasip Journal on Wireless Communications & Networking, 2013, 12(1): 178-192. doi: 10.1186/1687-1499- 2013-178.
    [8] SO Hingcheung and LIN Lanxin. Linear least squares approach for accurate received signal strength based source localization[J]. IEEE Transactions on Signal Processing, 2011, 59(8): 4035-4040. doi: 10.1109/TSP.2011.2152400.
    [9] WANG Chang, QI Fei, SHI Guangming, et al. A linear combination-based weighted least square approach for target localization with noisy range measurements[J]. Signal Processing, 2014, 94(1): 202-211. doi: 10.1016/j.sigpro.2013. 06.005.
    ZHOU Mu, PU Qiaolin, and TIAN Zengshan. Location fingerprint optimization based access point deployment in indoor WLAN localization[J]. Journal on Communications, 2015, 36(sl): 30-41. doi: 10.11959/j.issn.1000-436x.2015279.
    [11] LI Zang, TRAPPE W, ZHANG Yanyong, et al. Robust statistical methods for securing wireless localization in sensor networks[C]. IEEE International Symposium on Information Processing in Sensor Networks, Los Angeles, USA, 2005: 12. doi: 10.1109/IPSN.2005.1440903.
    [12] GARG R, VARNA A L, and WU M. An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(2): 717-730. doi: 10.1109/TIFS.2012.2184094.
    ZHAN Jie, LIU Hongli, LIU Dawei, et al. Research on secure DPC localization algorithm of WSN[J]. Journal on Communications, 2011, 32(12): 8-17. doi: 10.3969/j.issn. 1000-436X.2011.12.002.
    [14] NIRMALA M B and MANMJUNATHA A S. Enhanced voting based secure localization for wireless sensor networks [J]. International Journal of Computer Network and Information Security, 2015, 7(12): 52-59. doi: 10.5815/ijcnis. 2015.12.06.
    XU Kun, LIU Hongli, ZHAN Jie, et al. Malicious attack- resistant secure localization algorithm for wireless sensor network[J]. Journal on Communications, 2016, 37(12): 95-102. doi: 10.11959/j.issn.1000-436x.2016276.
    YE Miao and WANG Yuping. Location estimation in wireless networks based on probabilistic model with variant variance and evolutionary algorithm[J]. Journal of Software, 2013, 24(4): 859-872. doi: 10.3724/SP.J.1001.2013.04255.
    [17] CHANG C H and LIAO W. A probabilistic model for relative location estimation in wireless sensor networks[J]. IEEE Communications Letters, 2009, 13(12): 893-895.
    [18] JOHN Galletly. Evolutionary algorithms in theory and practice[J]. Complexity, 1996, 2(8): 26-27.
    [19] RUDOLPH G. Finite Markov chain results in evolutionary computation: A tour d’horizon[J]. Fundamenta Informaticae, 1998, 35(1/4): 67-89.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1211
  • HTML全文瀏覽量:  164
  • PDF下載量:  48
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-10-19
  • 修回日期:  2018-03-22
  • 刊出日期:  2018-07-19

目錄

    /

    返回文章
    返回