博碩士論文 975202084 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:13 、訪客IP:3.144.8.68
姓名 李威(Wei Li)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 無線感測網路中移動節點之偵測
(A Novel Node Movement Detection Scheme in Wireless Sensor Networks)
相關論文
★ 基於OP-TEE的可信應用程式軟體生態系統★ SeFence: 基於安全感測的可信任周邊存取控制
★ 高解析度二維地理影像的三維建模:旋轉變換投影與傳統方法的比較研究★ 在低軌道衛星無線通訊中的CSI預測方法
★ 為多流量低軌道衛星系統提出的動態換手策略★ 基於Trustzone的智慧型設備語音隱私保護系統
★ 一種減輕LEO衛星網路干擾的方案★ TruzGPS:基於TrustZone的位置隱私權保護系統
★ 衛星地面整合網路之隨機接入前導訊號設計與偵測★ SatPolicy: 基於Trustzone的衛星政策執行系統
★ TruzMalloc: 基於TrustZone 的隱私資料保 護系統★ 衛星地面網路中基於物理層安全的CSI保護方法
★ 低軌道衛星地面整合網路之安全非正交多重存取傳輸★ 低軌道衛星地面網路中的DRX機制設計
★ 衛星地面整合網路之基於集合系統的前導訊號設計★ 基於省電的低軌衛星網路路由演算法
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在無線感測網路中,無線感測器的位置資訊是非常重要的。在感測器被布置並且被定位之後,感測器的位置是要持續地去維護的。感測器可能會因為自然現象或是人為因素而從原來的位置被移動了,因此感測器回傳給Sink的資訊與其位置會不一致,甚至散播其錯誤的位置資訊到網路中而導致以地理為基礎的協定或應用發生問題。因此,在這篇論文中,我們提出了一個輕量的分散式方法來偵測被移動的節點。模擬的結果顯示我們的節點移動偵測方法能夠在無線感測網路中有效率的運作,通訊成本和準確率優於過去所提出的方法,特別是在大範圍節點移動的情況下。
摘要(英) The location information of sensors is significant in Wireless Sensor Network (WSN). However, after deploying and localizing the sensors, the location of sensors has to maintain constantly. Sensors may be moved from their original location by the depredation of the enemy or natural phenomena, and further, sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in arising problem with geographic protocol or applications. Consequently, in this paper, we proposed a new light-weight distributed scheme which is utilized the movement before and after with different topology to detect moved nodes. The simulation results show that our scheme can cost a bit of communication overhead and has high detection rate especially with large scale node movement.
關鍵字(中) ★ 節點移動
★ 無線感測網路
★ 位置
關鍵字(英) ★ Wireless Sensor Network
★ node movement
★ Location
論文目次 1 Introduction 1
2 Related works 5
3 Node movement detection 8
3.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Unmoved nodes identification . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3 Moved nodes identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.4 Recursive identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.5 The tolerable region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.6 The detecting process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.7 Summary of our scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4 Analysis of our scheme 19
4.1 Analysis of the communication overhead . . . . . . . . . . . . . . . . . . . . 20
4.2 Analysis of the computation overhead . . . . . . . . . . . . . . . . . . . . . . 21
5 Simulation results 22
5.1 Group movement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2 Communication overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.3 Random movement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5.3.1 Effect of node density . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5.3.2 Effect of the moved ratio . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.3.3 Effect of the maximum moved distance . . . . . . . . . . . . . . . . . 27
5.4 Effect of radius of tolerable region . . . . . . . . . . . . . . . . . . . . . . . . 29
6 Conclusions 30
References 31
參考文獻 [1] J. Albowicz, A. Chen, and L. Zhang, “Recursive Position Estimation in Sensor
Networks,” Proceedings of the Ninth International Conference on Network Protocols
(ICNP2001), pp. 35-41, 2001.
[2] F. Amini, J. Misic, and H. Pourreza, “Detection of Sybil attack in beacon enabled IEEE
802.15.4 Networks,” in International Wireless Communications and Mobile Computing
Conference (IWCMC 2008), pp. 1058-1063, 2008.
[3] R. Anthony and M. Ghassemian, “Automatic mobility status estimation in wireless
self-organised networks,” in Elsevier Journal of Computer and System Sciences, 2010.
[4] A. Boukerche, H.A.B.F. de Oliveira, E.F. Nakamura, and A.A.F Loureiro, “A Voronoi
Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks,”
in 16th Intl Conference Computer Communication and Networks (ICCCN 2007), pp.
497-502, 2007.
[5] S. Capkun and J. P. Hubaux, “Secure positioning in wireless networks,” in IEEE Journal
on Selected Areas in Communications, vol. 24, pp. 221-232, 2006
[6] S. Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, “Secure Location Verification
with Hidden and Mobile Base Stations,” in IEEE Transactions on Mobile Computing,
pp. 470-483, 2008.
[7] H. Chen, W. Lou, J. Ma, and Z. Wang, “TSCD:A Novel Secure Localization Approach
for Wireless Sensor Networks,” in IEEE Sensor Technologies and Applications (SEN-
SORCOMM 2008), pp. 661-666, 2008.
[8] Y. Chen, J. Yang, X. Zheng, and V. Swaminathan, “NORM:A Decentralized Location
Verification Mechanism for Wireless Sensor Networks,” in Proceedings of 26th Army
Science Conference, 2008.
[9] W. Du, L. Fang, and P. Ning, “LAD: localization anomaly detection for wireless sensor
networks,” in Elsevier Journal of Parallel and Distributed Computing, pp. 874-886, 2006.
[10] J. Hwang, T. He, and Y. Kim, “Secure localization with phantom node detection” in
Elsevier Journal of Ad Hoc Networks, vol. 6, pp. 1031-1050, 2008.
[11] S.-P. Kuo, H.-J. Kuo, and Y.-C. Tseng, “The Beacon Movement Detection Problem
in Wireless Sensor Networks for Localization Applications,” in IEEE Transactions on
Mobile Computing, pp. 1326-1338, 2009.
[12] R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks
using connectivity information,” in IEEE Conference on Computer Communications
(INFOCOM 2007), pp. 107-115 ,2007.
[13] S. Misra, X. Guoliang, and A. Shrivastava, “Robust Localization in Wireless Sensor Net-
works through the Revocation of Malicious Anchors,” in IEEE International Conference
on Communications (ICC 2007), pp. 3057-3062, 2007.
[14] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS),” in Proceedings of
the IEEE Global Telecommunications Conference (GLOBECOM 2001), pp. 2926-2931,
2001.
[15] H. A. B. F. de Oliveira, A. Boukerche, E. F. Nakamura, and A. A. F. Loureiro, “An
Efficient Directed Localization Recursion Protocol for Wireless Sensor Networks,” in
IEEE Transactions on Computers, vol. 58, pp. 677-691, 2009.
[16] N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Pro-
ceedings of the 2003 ACM workshop on Wireless security (Wise 2003), pp. 110, 2003.
[17] J. Tang, P. Fan, and X. Tang, “A RSSI-Based Cooperative Anomaly Detection Scheme
for Wireless Sensor Networks,” in International Conference on Wireless Communica-
tions, Networking and Mobile Computing (WiCom 2007), pp.2783-2786, 2007.
[18] W. Wang, J. Kong, B. K. Bhargava, and M. Gerla, “Visualisation of wormholes in un-
derwater sensor networks: a distributed approach,” in International Journal of Security
and Networks (IJSN 2008), vol. 3, no. 1, pp. 10-23, 2008.
[19] Y. Wei, Z. Yu, and Y. Guan, “Location Verification Algorithms for Wireless Sensor Net-
works,” in IEEE International Conference on Distributed Computing Systems (ICDCS
2007), pp. 70-77, 2007.
[20] The Network Simulator(NS), URL
指導教授 張貴雲(Guey-Yun Chang) 審核日期 2010-7-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明