计算机科学 ›› 2014, Vol. 41 ›› Issue (1): 156-162.

• 网络与通信 • 上一篇    下一篇

基于梯度的受限空间安全定位方法

王宁,秦小麟,沈尧   

  1. 南京航空航天大学计算机科学与技术学院 南京210016;南京航空航天大学计算机科学与技术学院 南京210016;南京航空航天大学计算机科学与技术学院 南京210016
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受2010年度国家教育部高等学校博士学科点专项科研基金资助

Gradient Based Approach to Secure Localization Algorithm in Constrained Space

WANG Ning,QIN Xiao-lin and SHEN Yao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 现有的无线传感器网络定位技术消耗了大量的计算和处理资源,并且受到了环境因素以及对手攻击等干扰,在受限空间中定位精度较低,无法满足定位需求。为了提高受限空间中的定位精度,提出了一种基于梯度的安全定位算法,算法在双曲线定位模型基础上,引入梯度的概念,降低了算法的计算复杂度,使算法能够适应受限空间的环境要求,实现高效高精度的定位;为了提高算法的安全性,增加了对不一致性测量的选择性剪枝过程,增强了算法对恶意攻击的抵抗能力。最后,以室内走廊为实验环境进行了仿真验证,通过主频计时策略,提高了算法的定位精度。分析结果表明,在室内受限空间中,提出的算法在定位精度、能量消耗和抗干扰能力上优于现有算法。

关键词: 双曲线定位模型,梯度,受限空间,安全定位

Abstract: Existing wireless sensor network location technology can not satisfy the location demands,not only because it calls for a lot of calculation time and processing resources but also for it is interfered by environmental factors,attacks from other users and its positional accuracy is low.Therefore,in order to improve location accuracy in constrained space,a gradient-based security location algorithm was proposed in this paper,in which gradient is brought based on hyperbolic location model.This algorithm lowers the computational complexity so that it can satisfy the environmental demands of constrained space and achieve the high-accuracy localization.Meanwhile,to improve the security of the algorithm,the resistant ability was enhanced and the selective pruning process for inconsistency measuring was also adop-ted.We finally improved the location accuracy by using main frequency strategy according to the simulation results of indoor corridor experiments.And the results show that the proposed algorithm has higher performances not only on lo-calization accuracy and energy consumption but also on anti-interference ability than the existing one.

Key words: Hyperbolic location model,Gradient,Constrained space,Secure localization

[1] Mainwaring A M,Culler D E,Polastre J,et al.Wireless sensor networks for habitat monitoring[C]∥WSNA.2002:88-97
[2] Noury N,Hervé T,Rialle V,et al.Monitoring behavior in home using a smart fall sensor and position sensors [C]∥Microtech-nologies in Medicine and Biology,1st Annual International,Conference on 2000.IEEE,2000:607-610
[3] Meyer S,Rakotonirainy A.A survey of research on context-a-ware homes[C]∥Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003.Volume 21,Australian Computer Society,Inc.,2003:159-168
[4] Knaian A N.A wireless sensor network for smart roadbeds and intelligent transportation systems[D].Massachusetts Institute of Technology,2000
[5] Yu L,Wang N,Meng X.Real-time forest fire detection withwireless sensor networks[C]∥Proceedings.2005International Conference on Wireless Communications,Networking and Mobile Computing,2005.IEEE,2005,2:1214-1217
[6] IEEE Std 1149.7-2009.Rsduced-Pin and Enhanced-Functionali-ty Test Access Port and Boundary-Scan Architecture[S].IEEE Standard Board,2009
[7] Mao G,Fidan B,Anderson B.Wireless sensor network localization techniques[J].Computer Networks,2007,51(10):2529-2553
[8] Zhu W,Cao J,Xu Y,et al.Fault-tolerant RFID reader localization based on passive RFID tags[C]∥INFOCOM,2012Proceedings IEEE.IEEE,2012:2183-2191
[9] Muoz D.Position location techniques and applications[M].Academic Press,2009
[10] Zhu S,Ding Z.A simple approach of range-based positioningwith low computational complexity[J].IEEE Transactions on Wireless Communications,2009,8(12):5832-5836
[11] Heidari M,Alsindi N A,Pahlavan K.UDP identification and error mitigation in ToA-based indoor localization systems using neural network architecture[J].IEEE Transactions on Wireless Communications,2009,8(7):3597-3607
[12] Bahl P,Padmanabhan V N.RADAR:An in-building RF-based user location and tracking system[C]∥INFOCOM 2000,Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE,2000,2:775-784
[13] Harter A,Hopper A,Steggles P,et al.The anatomy of a context-aware application[J].Wireless Networks,2002,8(2):187-197
[14] Girod L,Estrin D.Robust range estimation using acoustic andmultimodal sensing[C]∥ 2001IEEE/RSJ International Conference on Intelligent Robots and Systems,2001.IEEE,2001,3:1312-1320
[15] Niculescu D,Nath B.Ad hoc positioning system (APS) using AOA[C]∥INFOCOM 2003,Twenty-Second Annual Joint Conference of the IEEE Computer and Communications,IEEE Socie-ties.IEEE,2003,3:1734-1743
[16] Bulusu N,Heidemann J,Estrin D.GPS-less low-cost outdoor localization for very small devices[J].Personal Communications,IEEE,2000,7(5):28-34
[17] He T,Huang C,Blum B M,et al.Range-free localizationschemes for large scale sensor networks[C]∥Proceedings of the 9th annual international conference on Mobile computing and networking.ACM,2003:81-95
[18] Bulusu N,Estrin D,Girod L,et al.Scalable coordination forwireless sensor networks:self-configuring localization systems[C]∥International Symposium on Communication Theory and Applications (ISCTA 2001).Ambleside,UK,2001
[19] 王新生,赵衍静,李海涛.基于 DV-Hop 定位算法的改进研究[J].计算机科学,2011,38(2):76-78
[20] Anjum F,Pandey S,Agrawal P.Secure localization in sensornetworks using transmission range variation[C]∥ IEEE International Conference on Mobile Adhoc and Sensor Systems Conference,2005.IEEE,2005:9-203
[21] Du W,Fang L,Peng N.Lad:Localization anomaly detection for wireless sensor networks[J].Journal of Parallel and Distributed Computing,2006,66(7):874-886
[22] Liu D,Ning P,Liu A,et al.Attack-resistant location estimation in wireless sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2008,11(4):22
[23] Qiao D,乔大鹏.Solutions for wireless sensor network localization[J].IEEE Transactions on Evolutionary Computation,2011,15:4-31
[24] Patwari N.Location estimation in sensor networks[D].The University of Michigan,2005
[25] FengYuan.Windows图形编程[M].北京:机械工业出版社,2002:15-17

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!