1. School of Electronic and Information Engineering, Tianjin University, Tianjin 300072, China
2.
3. School of Electronic and Information Engineering, Tianjin University, Tianjin 300072, China;
4. School of Computer, Qinghai Normal University, Xining Qinghai 810008, China
ZHANG Yao JIN Zhigang LUO Yongmei DU Xiujuan. Node secure localization algorithm in underwater sensor network based on trust mechanism[J]. Journal of Computer Applications, 2013, 33(05): 1208-1211.
[1]李淑秋,李启虎,张春华.水下声学传感器网络的发展和应用[J].物理,2006,35(11):945-952.[2]黎作鹏,蔡绍滨, 张菁,等 .水声传感器网络节点定位技术综述[J].小型微型计算机系统,2012,33(3):442-447.[3]CHENG X Z,SHU H N,LIANG Q L,et al.Silent positioning in underwater acoustic sensor networks[J].IEEE Transactions on Vehicular Technology,2008,57(3): 1756 -1766.[4]KIM E,LEE S,KIM C,et al. Long-range beacons on sea surface based 3D-localization for underwater sensor networks[C] // Proceedings of the 5th International Conference on Mobile Ad-Hoc and Sensor Networks.Piscataway: IEEE,2009:102-107.[5]EROL M,VIERA L F M, GERLA M. Localization with Dive′N′rise (DNR) beacons for underwater acoustic sensor networks [C] // WuWNet '07: The Second ACM International Workshop on Underwater Networks.New York:ACM,2007: 97-100.[6]EROL M, VIEIRA L F, GERLA M. AUV-aided localization for underwater sensor networks[C] // Proceedings of International Conference on Wireless Algorithms,Systems and Applications. Piscataway: IEEE,2007:44-54.[7]LUO H-J,ZHAO Y-Y,GUO Z-W.UDB: using directional beacons for localization in underwater sensor network[C] // Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems.Piscataway: IEEE,2008:551-556.[8]曹晓梅,俞波,陈贵海,等.传感器网络节点定位系统安全性研究[J].软件学报,2008,19(4):869-877.[9]BAO F Y, CHEN I-R, CHANG M J. Trust-based intrusion detection in wireless sensor networks[C] // Proceedings of 2011 IEEE International Conference on Communications.Piscataway: IEEE,2011:1-6.[10]康松林,王彦东,李慧.信任模型在无线传感器网络入侵检测中的应用[J].计算机工程与应用,2012,48(5):89-92.[11]SRINIVASAN A,TEITELBAUM J,WU J.DRBTS: Distributed reputation-based beacon trust system [C] // Proceedings of the 2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing.Piscataway: IEEE,2006:277-283.[12]凌远景, 叶阿勇, 许力,等.基于声誉机制的传感器网络节点安全定位算法[J].计算机应用,2012,32(1):70-73.[13]URICK R J. Principles of underwater sound [M]. New York: McGraw-Hill,1983.[14]荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. [15]CONG Y P, YANG G, WEI Z Q,et al.Security in underwater sensor network[C] // Proceedings of 2010 International Conference on Communications and Mobile Computing.Piscataway: IEEE,2010:162-168.[16]XIE P.Aqua-Sim:An NS-2 based simulator for underwater sensor networks[C] // OCEANS 2009: MTS/IEEE Biloxi-Marine Technology for Our Future: Global and Local Challenges.Piscataway: IEEE,2009:26-29.