Please use this identifier to cite or link to this item:
標題: 應用於無線感測網路之非同步安全測距研究
Secure Asynchronous Ranging for Wireless Sensor Networks
作者: 林世昌
Lin, Shih-Chang
關鍵字: Wireless Sensor Networks;無線感測網路;Secure Distance Estimation;Secure Localization;安全距離量測;安全定位技術
出版社: 電機工程學系所
引用: 參考文獻 [1] 方煒, "無所不在的網路與無線感測" ,台灣農業資訊科技發展協會,Taita 電子報第1期, 2006年,。 [2] 陳俊國, "直接序列超寬頻與多頻帶正交分頻多工訊號在無線感測網路 中分散式測距上之應用",國立中興大學電機工程學系95年度碩士論 文。 [3] Chih-Yu Wen, Robin D. Morris, and William A. Sethares, “Distance Estimation Using Bidirectional Communications Without Synchronous Clocking,” IEEE Transactions on Signal Processing, vol. 55, no. 5, Part I, pp. 1927-1939, May 2007. (SCI) [4] D. Liu, P. Ning, and W. Du, “Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks,” 25th ICDCS, 2005, pp.609–19. [5] ANTONIO A. F. LOUREIRO, AZZEDINE BOUKERCHE, ORACIO A. B. F. OLIVEIRA “Secure Localization Algorithms for Wireless Sensor Networks” IEEE Communications Magazine ‧ April 2008 [6] H. A. Oliveira et al., “Directed Position Estimation: A Recursive Localization Approach for Wireless Sensor Networks,” 14th IEEE Int’l. Conf. Comp. Commun. and Networks, San Diego, CA, Oct. 2005, pp.557–62. [7] T. He et al., “Range-Free Localization Schemes for Large Scale Sensor Networks,” MobiCom ’03: Proc. 9th Annual Int’l. Conf. Mobile Comp. and Networking, New York: ACM Press, 2003, pp. 81–95. [8] J. Albowicz, A. Chen, and L. Zhang, “Recursive Position Estimation in Sensor Networks,” 9th Int’l. Conf. Network Protocols, Nov. 2001, pp.35–41. [9] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS),” IEEE GLOBECOM ’01), San Antonio, TX, Nov. 2001, pp. 2926–31. [10] L.Lazos and R. Poovendran, “Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks,” IEEE JSAC, vol. 24, Feb.2006, pp. 233–46. [11] L. Lazos and R. Poovendran, “Serloc: Secure Range Independent Localization for Wireless Sensor Networks,” Proc. WiSe ’04, 2004, pp.21–30. [12] L. Lazos, R. Poovendran, and S. Capkun, “Rope: Robust Position Estimation in Wireless Sensor Networks,” Proc.IPSN, Apr. 2005, pp.44 324–31. [13] S. Capkun and J.-P. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,” INFOCOM ’05, Miami, FL, Mar. 2005. [14] A. Srinivasan, J. Teitelbaum, and J. Wu, “DRBTS: Distributed Reputation-Based Beacon Trust System,” 2nd IEEE DASC, 2006, pp.277–83. [15] Z. Li et al., “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” IPSN ’05,2005, pp. 12. [16] D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,” IPSN ’05: Proc. 4th Int’l.Symp. Info. Processing in Sensor Networks, 2005, pp. 13. [17] W. Du, L. Fang, and P. Ning, “Lad: Localization Anomaly Detection for Wireless Sensor Networks,” 19th IPDPS, 2005, pp. 41.1. [18] N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” WiSe ’03, N2003, pp. 1–10. [19] S. Gezici, T. Zhi, G. B. Giannakis, H. Kobayashi, A. F. Molisch, H. V. Poor, and Z. Sahinoglu, “Localization via ultra-sideband radios: A look at positioning aspects for future sensor networks,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 70–84, Jul. 2005. [20] E. C. Fieller, “The distribution of the index in a normal bivariate population,”Biometrika, vol. 24, no. 3–4, pp. 428–440, 1932. [21] D. V. Hinkley, “On the ratio of two correlated normal random variables,” Biometrika, vol. 56, no. 3, pp. 635–639, 1969. [22] R.Ware and F. Lad, “Approximating the distribution for sum of product of normal variables,” Math. and Statis. Dept., Canterbury Univ.,Canterbury,U.K.,2003. [23] Crossbow Technology Inc. Wireless sensor networks. /Products/Wireless Sensor_Networks.htm. Accessed in February 2004. [24] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. S. J. Pister.System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93–104, 2000. [25] C.-Y. Wen, J.-K. Chen, and W. A. Sethares, “Joint Distributed Clustering and Ranging for Wireless Ad-Hoc Sensor Networks,” (to appear in Proceedings of IEEE VTC2007-Spring, Dublin, April 45 2007). [26] F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach, Morgan Kaufmann, CA, 2004.
(Distance Estimation Via Asynchronous Clocks,DEVAC)為理論基礎,提
出了一個非同步安全測距(Secure Distance Estimation Via Asynchronous
Clocks (SDEVAC))方法,利用非同步無線感測器間通訊延遲之物理特性
的可靠度及準確性,進而達到安全測距之目的。由模擬實驗可知, SDEVAC


A fundamental problem when locating sensors in a network is to
estimate the distance between pairs of sensors. Since security of sensor
networks is vulnerable in the wireless environment, this thesis proposes a
secure ranging scheme which can provide secure position information for
wireless sensor applications. By generalizing the asynchronous distance
estimation technology (Distance Estimation Via Asynchronous Clocks;
DEVAC), a secure asynchronous distance estimation method (Secure Distance
Estimation Via Asynchronous Clocks; SDEVAC) is presented. Based on the
physical property of a device, the communication delay (for example: internal
component delay, difference of the clocks, and the sensor waiting time)
between two wireless sensors may be used to identify the normal wireless
sensors, to renew the network node information, to enhance the reliability of
distance estimation, and to achieve the aim of secure ranging. The method is
shown to be feasible for identifying malicious sensor nodes in the network.

Keywords: Wireless Sensor Networks、Secure Distance Estimation、
Secure Localization
其他識別: U0005-0802201016330000
Appears in Collections:電機工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.