[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3378936.3378963acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsimConference Proceedingsconference-collections
research-article

Research on Security Location of Malicious Node Filtering for Environmental Monitoring Sensor Networks

Published: 07 March 2020 Publication History

Abstract

In order to solve the problem that the positioning accuracy is reduced due to the difficult filtering of malicious nodes in wireless sensor networks. Aiming at the reason that the traditional DV-HOP positioning algorithm is vulnerable, an improved DV-HOP algorithm is proposed. The algorithm can combine multiple communication radii to reduce the hop error of the anchor node in communication with other nodes, and make the positioning more accurate by the hop-weighted hyperbolic algorithm. Further, consistency checking mechanism between packet information aggregator implemented filtering malicious nodes. The simulation results show that the improved DV-HOP algorithm has significantly higher positioning accuracy than the traditional DV-HOP algorithm under the condition that the detection mechanism filters malicious nodes.

References

[1]
Cong Shan, Chen Guifen. DV-Hop Location Algorithm for Wireless Sensor Networks[J]. Journal of Changchun University of Science and Technology(Natural Science Edition), 2018, 41(02): 105--109.
[2]
Hou Mingxing, Yan Hui, Huang Binke. Research on abnormal data processing of wireless sensor networks based on distributed compressed sensing [J/OL]. Computer Science: 1-8[2019-11-01]. http://kns.Cnki.net/kcms/detail/50.1075.TP.20190919.1455.054.html.
[3]
Liu Zhixiong, Li Limiao. Modeling and Simulation of Location-Based False Data Filtering in Sensor Networks[J]. Journal of System Simulation, 2019, 31(01): 27--35.
[4]
Liu Yafang. Research on false data detection and filtering mechanism in wireless sensor networks [D]. Ocean University of China, 2015.
[5]
Zou Hong, Zhou Wei. Improved DV-Hop algorithm based on wormhole attack detection[J].Digital Technology and Application, 2014(11):133--134.
[6]
Wu Xuezhen, Li Xueqing, Ding Jiajing. An Improved Wireless Sensor Network DV-HOP Location Algorithm[J].Software Guide, 2019, 18(08):52--55.
[7]
YANG Xiaoying, ZHANG Wanli. DV-Hop Location Algorithm for Resisting Deception Attack[J].Journal of Luoyang Teachers College, 2015, 34(02):79--81.
[8]
Zhang Shuguang. Research on false data filtering and malicious node location in wireless sensor networks [D]. University of Science and Technology of China, 2014.
[9]
SHI Chuanjun. Overview of the filtering technology of false data in wireless sensor networks [J]. Computer and Digital Engineering, 2017, 45 (06): 1090--1094+1137.
[10]
Xie Wei, Li Wei, Yang Feng. A Method of Filtering and Traceability Tracking in Combination with False Data Injection[J].Computer Systems, 2011, 20(12):249--256.
[11]
Zou Ke, Yao Yingwei. DV-Hop Security Location Algorithm for Defending Against Deception Attacks[J]. Journal of Transduction Technology, 2017, 30(04): 603--610.
[12]
Yang Gang. Research on attack node tracking scheme in wireless sensor networks [D]. Liaoning University, 2019.
[13]
LIU Shixing, HUANG Junjie, LIU Hongyin, et al. Weighted DV-Hop localization algorithm based on multi-communication radius[J]. Journal of Transduction Technology, 2015, 28(6): 883--887.
[14]
GUI L, VAL T, WEI A, et al. Improvement of range-free localization technology by a novel DV-hop protocol in wireless sensor networks[J]. Ad Hoc Networks, 2015, 24:55--73.
[15]
LI X, YAN L, WEI P, et al. Optimization of DV-hop localization algorithm in hybrid optical wireless sensor networks[J]. Journal of Heuristics, 2015, 21(2):177--195.
[16]
WU H, GAO R. An improved method of DV-Hop localization algorithm[J].Journal of Computational Information Systems, 2011:2293--2298.
[17]
Tan Bo, Che Jin, Zhang Cheng. Improved weighted DV-Hop algorithm based on least squares optimization[J]. Computer Engineering and Applications, 2015, 51(2): 82--86.
[18]
Gao Meifeng, Li Fengchao.DV-Hop Localization Algorithm Based on Genetic Particle Swarm Optimization[J].Journal of Transduction Technology, 2017, 30(7):1084--1088.

Index Terms

  1. Research on Security Location of Malicious Node Filtering for Environmental Monitoring Sensor Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICSIM '20: Proceedings of the 3rd International Conference on Software Engineering and Information Management
    January 2020
    258 pages
    ISBN:9781450376907
    DOI:10.1145/3378936
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Science and Technology of China: University of Science and Technology of China

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 March 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DV-HOP algorithm
    2. Detection mechanism
    3. multiple communication radius
    4. positioning accuracy
    5. wireless sensor network

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICSIM '20

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 53
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media