Abstract
Based on the security of the receiving signal strength indicator positioning algorithm, the RSSI positioning algorithm in the environment of witch attack, wormhole attack and replication attack has largely failed.Although existing security positioning algorithms can effectively prevent attacks from occurring, the massive consumption of network resources can’t be ignored.Therefore, a tolerable security positioning method is proposed for each of the three attacks in order to improve the security of positioning.According to the node's physical information, the attack node is detected.Through simulation experiments, compared with the traditional indoor security positioning method, the proposed algorithm can significantly reduce the intervention of witch attack, wormhole attack and replication attack on positioning error.While achieving the goal of combating attacks, it reduces the computational complexity, decreases node energy consumption, and extends the network life cycle.
Highlights
Wireless sensor network technology rises on the basis of the rapid development of wireless communication technology, microelectronics technology, and low-power embedded technology
The RSSI-based wireless sensor network positioning algorithm is known for its low energy consumption, low cost and easy implementation, and it has been applied in many fields
Through learning and researching various security location algorithms, the attack principle of witch attack is analyzed, and a security positioning mechanism that uses the physical characteristics of nodes to defend against witch attacks is proposed: in the one-ranging phase and multiple-ranging phases of the RSSI positioning, ratios are used to filter the witch attack nodes to achieve the purpose of combating witch attacks and reducing RSSI positioning errors
Summary
Wireless sensor network technology rises on the basis of the rapid development of wireless communication technology, microelectronics technology, and low-power embedded technology. The wireless sensor network monitors the environmental information in the network distribution area in real time through the cooperation of micro-sensors and transmits it to the receiving end in a multi-hop self-organizing network. It has been widely used in fields such as location information navigation, security firefighting, medical security, defense military, and environmental monitoring. The sensor node must know its own location information to understand the specific events that occur in the specific coordinates for the task. Sensor networks have been widely used in businesses and industries that require data security. The security of positioning process data transmission has become a new hot spot in wireless sensor network positioning technology
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Online and Biomedical Engineering (iJOE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.