scholarly journals An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks

2012 ◽  
Vol 7 (2) ◽  
pp. 717-730 ◽  
Author(s):  
Ravi Garg ◽  
Avinash L. Varna ◽  
Min Wu

The fundamental capacity of a sensor system is to accumulate and forward data to the destination. It is crucial to consider the area of gathered data, which is utilized to sort information that can be procured using confinement strategy as a piece of Wireless Sensor Networks (WSNs).Localization is a champion among the most basic progressions since it agreed as an essential part in various applications, e.g., target tracking. If the client can't gain the definite area information, the related applications can't be skillful. The crucial idea in most localization procedures is that some deployed nodes with known positions (e.g., GPS-equipped nodes) transmit signals with their coordinates so as to support other nodes to localize themselves. This paper mainly focuses on the algorithm that has been proposed to securely and robustly decide thelocation of a sensor node. The algorithm works in two phases namely Secure localization phase and Robust Localization phase. By "secure", we imply that malicious nodes should not effectively affect the accuracy of the localized nodes. By “robust”, we indicate that the algorithm works in a 3D environment even in the presence of malicious beacon nodes. The existing methodologies were proposed based on 2D localization; however in this work in addition to security and robustness, exact localization can be determined for 3D areas by utilizing anefficient localization algorithm. Simulation results exhibit that when compared to other existing algorithms, our proposed work performs better in terms of localization error and accuracy.


Author(s):  
Teemu Laukkarinen ◽  
Lasse Määttä ◽  
Jukka Suhonen ◽  
Timo D. Hämäläinen ◽  
Marko Hännikäinen

Resource constrained Wireless Sensor Networks (WSNs) require an automated firmware updating protocol for adding new features or error fixes. Reprogramming nodes manually is often impractical or even impossible. Current update protocols require a large external memory or external WSN transport protocol. This paper presents the design, implementation, and experiments of a Program Image Dissemination Protocol (PIDP) for autonomous WSNs. It is reliable, lightweight and it supports multi-hopping. PIDP does not require external memory, is independent of the WSN implementation, transfers firmware, and reprograms the whole program image. It was implemented on a node platform with an 8-bit microcontroller and a 2.4 GHz radio. Implementation requires 22 bytes of data memory and less than 7 kilobytes of program memory. PIDP updates 178 nodes within 5 hours. One update consumes under 1‰ of the energy of two AA batteries.


2014 ◽  
Vol 977 ◽  
pp. 484-490
Author(s):  
Run Zeng

Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.


Sign in / Sign up

Export Citation Format

Share Document