博碩士論文 975202084 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:9 、訪客IP:18.205.176.85
姓名 李威(Wei Li)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 無線感測網路中移動節點之偵測
(A Novel Node Movement Detection Scheme in Wireless Sensor Networks)
相關論文
★ 在無線感測網路中連續型物體的偵測與追蹤協定之設計★ 在車用無線網路中利用虛擬地標的封包繞徑協定
★ 在無線感測網路下處理不同重要性區域的覆蓋問題★ 在車用網路環境下分散式計程車呼叫協定
★ 車用無線網路車輛密度偵測方法★ 在車用無線網路中利用適應道路分割法提供區域性階層式定位服務
★ 在無線感測網路中以延長網路生命週期為目的之避洞繞徑協定★ 利用車用無線網路尋找空停車位之協定
★ 在車載無線網路中以區域性為基礎的資源分享協定★ 設計於城市環境之分散式車載隨意行動網路位置服務
★ 在無線感測網路下以方向性天線為基礎的定位方法★ 在移動式感測網路中利用移動方向的定位演算法
★ 在無線感測網路環境下的流量平衡資料收集與無碰撞排程協定★ 無線感測網路中之共同移動節點偵測
★ 無線感測網路克服障礙物及延長網路存活時間之繞徑協定★ 一個在感知無線電網路中分散式的宣告校準方法
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在無線感測網路中,無線感測器的位置資訊是非常重要的。在感測器被布置並且被定位之後,感測器的位置是要持續地去維護的。感測器可能會因為自然現象或是人為因素而從原來的位置被移動了,因此感測器回傳給Sink的資訊與其位置會不一致,甚至散播其錯誤的位置資訊到網路中而導致以地理為基礎的協定或應用發生問題。因此,在這篇論文中,我們提出了一個輕量的分散式方法來偵測被移動的節點。模擬的結果顯示我們的節點移動偵測方法能夠在無線感測網路中有效率的運作,通訊成本和準確率優於過去所提出的方法,特別是在大範圍節點移動的情況下。
摘要(英) The location information of sensors is significant in Wireless Sensor Network (WSN). However, after deploying and localizing the sensors, the location of sensors has to maintain constantly. Sensors may be moved from their original location by the depredation of the enemy or natural phenomena, and further, sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in arising problem with geographic protocol or applications. Consequently, in this paper, we proposed a new light-weight distributed scheme which is utilized the movement before and after with different topology to detect moved nodes. The simulation results show that our scheme can cost a bit of communication overhead and has high detection rate especially with large scale node movement.
關鍵字(中) ★ 節點移動
★ 無線感測網路
★ 位置
關鍵字(英) ★ Wireless Sensor Network
★ node movement
★ Location
論文目次 1 Introduction 1
2 Related works 5
3 Node movement detection 8
3.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Unmoved nodes identification . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3 Moved nodes identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.4 Recursive identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.5 The tolerable region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.6 The detecting process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.7 Summary of our scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4 Analysis of our scheme 19
4.1 Analysis of the communication overhead . . . . . . . . . . . . . . . . . . . . 20
4.2 Analysis of the computation overhead . . . . . . . . . . . . . . . . . . . . . . 21
5 Simulation results 22
5.1 Group movement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2 Communication overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.3 Random movement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5.3.1 Effect of node density . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5.3.2 Effect of the moved ratio . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.3.3 Effect of the maximum moved distance . . . . . . . . . . . . . . . . . 27
5.4 Effect of radius of tolerable region . . . . . . . . . . . . . . . . . . . . . . . . 29
6 Conclusions 30
References 31
參考文獻 [1] J. Albowicz, A. Chen, and L. Zhang, “Recursive Position Estimation in Sensor
Networks,” Proceedings of the Ninth International Conference on Network Protocols
(ICNP2001), pp. 35-41, 2001.
[2] F. Amini, J. Misic, and H. Pourreza, “Detection of Sybil attack in beacon enabled IEEE
802.15.4 Networks,” in International Wireless Communications and Mobile Computing
Conference (IWCMC 2008), pp. 1058-1063, 2008.
[3] R. Anthony and M. Ghassemian, “Automatic mobility status estimation in wireless
self-organised networks,” in Elsevier Journal of Computer and System Sciences, 2010.
[4] A. Boukerche, H.A.B.F. de Oliveira, E.F. Nakamura, and A.A.F Loureiro, “A Voronoi
Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks,”
in 16th Intl Conference Computer Communication and Networks (ICCCN 2007), pp.
497-502, 2007.
[5] S. Capkun and J. P. Hubaux, “Secure positioning in wireless networks,” in IEEE Journal
on Selected Areas in Communications, vol. 24, pp. 221-232, 2006
[6] S. Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, “Secure Location Verification
with Hidden and Mobile Base Stations,” in IEEE Transactions on Mobile Computing,
pp. 470-483, 2008.
[7] H. Chen, W. Lou, J. Ma, and Z. Wang, “TSCD:A Novel Secure Localization Approach
for Wireless Sensor Networks,” in IEEE Sensor Technologies and Applications (SEN-
SORCOMM 2008), pp. 661-666, 2008.
[8] Y. Chen, J. Yang, X. Zheng, and V. Swaminathan, “NORM:A Decentralized Location
Verification Mechanism for Wireless Sensor Networks,” in Proceedings of 26th Army
Science Conference, 2008.
[9] W. Du, L. Fang, and P. Ning, “LAD: localization anomaly detection for wireless sensor
networks,” in Elsevier Journal of Parallel and Distributed Computing, pp. 874-886, 2006.
[10] J. Hwang, T. He, and Y. Kim, “Secure localization with phantom node detection” in
Elsevier Journal of Ad Hoc Networks, vol. 6, pp. 1031-1050, 2008.
[11] S.-P. Kuo, H.-J. Kuo, and Y.-C. Tseng, “The Beacon Movement Detection Problem
in Wireless Sensor Networks for Localization Applications,” in IEEE Transactions on
Mobile Computing, pp. 1326-1338, 2009.
[12] R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks
using connectivity information,” in IEEE Conference on Computer Communications
(INFOCOM 2007), pp. 107-115 ,2007.
[13] S. Misra, X. Guoliang, and A. Shrivastava, “Robust Localization in Wireless Sensor Net-
works through the Revocation of Malicious Anchors,” in IEEE International Conference
on Communications (ICC 2007), pp. 3057-3062, 2007.
[14] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS),” in Proceedings of
the IEEE Global Telecommunications Conference (GLOBECOM 2001), pp. 2926-2931,
2001.
[15] H. A. B. F. de Oliveira, A. Boukerche, E. F. Nakamura, and A. A. F. Loureiro, “An
Efficient Directed Localization Recursion Protocol for Wireless Sensor Networks,” in
IEEE Transactions on Computers, vol. 58, pp. 677-691, 2009.
[16] N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Pro-
ceedings of the 2003 ACM workshop on Wireless security (Wise 2003), pp. 110, 2003.
[17] J. Tang, P. Fan, and X. Tang, “A RSSI-Based Cooperative Anomaly Detection Scheme
for Wireless Sensor Networks,” in International Conference on Wireless Communica-
tions, Networking and Mobile Computing (WiCom 2007), pp.2783-2786, 2007.
[18] W. Wang, J. Kong, B. K. Bhargava, and M. Gerla, “Visualisation of wormholes in un-
derwater sensor networks: a distributed approach,” in International Journal of Security
and Networks (IJSN 2008), vol. 3, no. 1, pp. 10-23, 2008.
[19] Y. Wei, Z. Yu, and Y. Guan, “Location Verification Algorithms for Wireless Sensor Net-
works,” in IEEE International Conference on Distributed Computing Systems (ICDCS
2007), pp. 70-77, 2007.
[20] The Network Simulator(NS), URL
指導教授 張貴雲(Guey-Yun Chang) 審核日期 2010-7-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明