| 研究生: |
李威 Wei Li |
|---|---|
| 論文名稱: |
無線感測網路中移動節點之偵測 A Novel Node Movement Detection Scheme in Wireless Sensor Networks |
| 指導教授: |
張貴雲
Guey-Yun Chang |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 畢業學年度: | 98 |
| 語文別: | 英文 |
| 論文頁數: | 33 |
| 中文關鍵詞: | 節點移動 、無線感測網路 、位置 |
| 外文關鍵詞: | Wireless Sensor Network, node movement, Location |
| 相關次數: | 點閱:8 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在無線感測網路中,無線感測器的位置資訊是非常重要的。在感測器被布置並且被定位之後,感測器的位置是要持續地去維護的。感測器可能會因為自然現象或是人為因素而從原來的位置被移動了,因此感測器回傳給Sink的資訊與其位置會不一致,甚至散播其錯誤的位置資訊到網路中而導致以地理為基礎的協定或應用發生問題。因此,在這篇論文中,我們提出了一個輕量的分散式方法來偵測被移動的節點。模擬的結果顯示我們的節點移動偵測方法能夠在無線感測網路中有效率的運作,通訊成本和準確率優於過去所提出的方法,特別是在大範圍節點移動的情況下。
The location information of sensors is significant in Wireless Sensor Network (WSN). However, after deploying and localizing the sensors, the location of sensors has to maintain constantly. Sensors may be moved from their original location by the depredation of the enemy or natural phenomena, and further, sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in arising problem with geographic protocol or applications. Consequently, in this paper, we proposed a new light-weight distributed scheme which is utilized the movement before and after with different topology to detect moved nodes. The simulation results show that our scheme can cost a bit of communication overhead and has high detection rate especially with large scale node movement.
[1] J. Albowicz, A. Chen, and L. Zhang, “Recursive Position Estimation in Sensor
Networks,” Proceedings of the Ninth International Conference on Network Protocols
(ICNP2001), pp. 35-41, 2001.
[2] F. Amini, J. Misic, and H. Pourreza, “Detection of Sybil attack in beacon enabled IEEE
802.15.4 Networks,” in International Wireless Communications and Mobile Computing
Conference (IWCMC 2008), pp. 1058-1063, 2008.
[3] R. Anthony and M. Ghassemian, “Automatic mobility status estimation in wireless
self-organised networks,” in Elsevier Journal of Computer and System Sciences, 2010.
[4] A. Boukerche, H.A.B.F. de Oliveira, E.F. Nakamura, and A.A.F Loureiro, “A Voronoi
Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks,”
in 16th Intl Conference Computer Communication and Networks (ICCCN 2007), pp.
497-502, 2007.
[5] S. Capkun and J. P. Hubaux, “Secure positioning in wireless networks,” in IEEE Journal
on Selected Areas in Communications, vol. 24, pp. 221-232, 2006
[6] S. Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, “Secure Location Verification
with Hidden and Mobile Base Stations,” in IEEE Transactions on Mobile Computing,
pp. 470-483, 2008.
[7] H. Chen, W. Lou, J. Ma, and Z. Wang, “TSCD:A Novel Secure Localization Approach
for Wireless Sensor Networks,” in IEEE Sensor Technologies and Applications (SEN-
SORCOMM 2008), pp. 661-666, 2008.
[8] Y. Chen, J. Yang, X. Zheng, and V. Swaminathan, “NORM:A Decentralized Location
Verification Mechanism for Wireless Sensor Networks,” in Proceedings of 26th Army
Science Conference, 2008.
[9] W. Du, L. Fang, and P. Ning, “LAD: localization anomaly detection for wireless sensor
networks,” in Elsevier Journal of Parallel and Distributed Computing, pp. 874-886, 2006.
[10] J. Hwang, T. He, and Y. Kim, “Secure localization with phantom node detection” in
Elsevier Journal of Ad Hoc Networks, vol. 6, pp. 1031-1050, 2008.
[11] S.-P. Kuo, H.-J. Kuo, and Y.-C. Tseng, “The Beacon Movement Detection Problem
in Wireless Sensor Networks for Localization Applications,” in IEEE Transactions on
Mobile Computing, pp. 1326-1338, 2009.
[12] R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks
using connectivity information,” in IEEE Conference on Computer Communications
(INFOCOM 2007), pp. 107-115 ,2007.
[13] S. Misra, X. Guoliang, and A. Shrivastava, “Robust Localization in Wireless Sensor Net-
works through the Revocation of Malicious Anchors,” in IEEE International Conference
on Communications (ICC 2007), pp. 3057-3062, 2007.
[14] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS),” in Proceedings of
the IEEE Global Telecommunications Conference (GLOBECOM 2001), pp. 2926-2931,
2001.
[15] H. A. B. F. de Oliveira, A. Boukerche, E. F. Nakamura, and A. A. F. Loureiro, “An
Efficient Directed Localization Recursion Protocol for Wireless Sensor Networks,” in
IEEE Transactions on Computers, vol. 58, pp. 677-691, 2009.
[16] N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Pro-
ceedings of the 2003 ACM workshop on Wireless security (Wise 2003), pp. 110, 2003.
[17] J. Tang, P. Fan, and X. Tang, “A RSSI-Based Cooperative Anomaly Detection Scheme
for Wireless Sensor Networks,” in International Conference on Wireless Communica-
tions, Networking and Mobile Computing (WiCom 2007), pp.2783-2786, 2007.
[18] W. Wang, J. Kong, B. K. Bhargava, and M. Gerla, “Visualisation of wormholes in un-
derwater sensor networks: a distributed approach,” in International Journal of Security
and Networks (IJSN 2008), vol. 3, no. 1, pp. 10-23, 2008.
[19] Y. Wei, Z. Yu, and Y. Guan, “Location Verification Algorithms for Wireless Sensor Net-
works,” in IEEE International Conference on Distributed Computing Systems (ICDCS
2007), pp. 70-77, 2007.
[20] The Network Simulator(NS), URL<http://www.isi.edu/nsnam/ns/>