Secure Range-Dependent Localization in Wireless Sensor Networks

2011 ◽  
Vol 474-476 ◽  
pp. 2247-2252
Author(s):  
Jia Zhang ◽  
Hai Yan Zhang ◽  
Jin Na Lv ◽  
Yan Chang Liu

In many applications of wireless sensor network (WSN), it is essential to ensure that sensors can determine their location, even in the presence of malicious adversaries. However, almost all the localization algorithms need the location information of reference nodes to locate the unknown nodes. When the location information is tempered by the attacks, the accuracy of these algorithms will degrade badly. We present a novel mechanism for secure localization. The mechanism aims to filter out malicious reference signals on the basis of the normal distribution trait among multiple reference signals. This will ensure each node to obtain correct information about its position in the presence of attackers. In this paper, a simulation circumstance which might be attacked is constructed to compare the improved algorithm with original one. The experiment results demonstrate that the proposed mechanism can effectively survive malicious attacks.

2008 ◽  
Vol 46 (4) ◽  
pp. 96-101 ◽  
Author(s):  
A. Boukerche ◽  
H.A.B. Oliveira ◽  
E.F. Nakamura ◽  
A.A.F. Loureiro

Author(s):  
NAYANA NAYANA ◽  
M.B. NIRMALA ◽  
A.S MANJUNATH

Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, we discuss a new technique that aims to localize all the sensor nodes in the network using trilateration with greedy technique, and a security protocol is used for providing confidentiality and authentication between anchor nodes and sensor nodes.


2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Peng Li ◽  
Xiaotian Yu ◽  
He Xu ◽  
Jiewei Qian ◽  
Lu Dong ◽  
...  

Secure localization has become very important in wireless sensor networks. However, the conventional secure localization algorithms used in wireless sensor networks cannot deal with internal attacks and cannot identify malicious nodes. In this paper, a localization based on trust valuation, which can overcome a various attack types, such as spoofing attacks and Sybil attacks, is presented. The trust valuation is obtained via selection of the property set, which includes estimated distance, localization performance, position information of beacon nodes, and transmission time, and discussion of the threshold in the property set. In addition, the robustness of the proposed model is verified by analysis of attack intensity, localization error, and trust relationship for three typical scenes. The experimental results have shown that the proposed model is superior to the traditional secure localization models in terms of malicious nodes identification and performance improvement.


Author(s):  
Sitanshu Kumar ◽  
Dr. Sunil Rathod

The main objective of this research paper is to review and analyze the different existing localization algorithms techniques that are used to overcome the localization issue in the wireless sensor network. Underwater Wireless sensor networks consists up of small sensor nodes that are placed in huge quantity over a large water surface region to perform several tasks like sensing the data and communicate with other devices. Most of the applications of underwater wireless sensor networks like forest fire detection required the exact position of the sensing element. The main motive of the localization process is to localize the coordinates to the every node with unidentified location in the sensing area of underwater. In this paper, we have discussed various localization algorithms for localizing the sensor nodes like particle swarm optimization; bees optimization algorithm, bat algorithm, cuckoo optimization and butterfly optimization algorithm etc. are reviewed. The detail analysis of these techniques in terms of localization error, computation time and amount of localized nodes has been discussed in this paper.


2014 ◽  
Vol 622 ◽  
pp. 191-198
Author(s):  
Devasagayam Jayashree ◽  
V. Uma Rani ◽  
K. Soma Sundaram

Due to emerging technology Wireless Sensor Network (WSN), it is necessary to monitor the behavior of sensor nodes and establish the secure communication in network. Security is a challenging task in wireless environment. Several encryption mechanisms are available to prevent outsider attacks, but no mechanism available for insider attacks. A trust model is a collection of rules used to establish co-operation or collaboration among nodes as well as monitoring misbehavior of wireless sensor networks. Trust model is necessary to enhance secure localization, communication or routing, aggregation, collaboration among nodes. In this paper, proposed a behavior based distributed trust model for wireless sensor network to effectively deal with self-ish or malicious nodes. Here, take multidimensional trust attributes derived from communications and networks to evaluate the overall trust of sensor nodes. It monitors the behavior of nodes and establishes secure communication among networks.


Author(s):  
Yawen Wei ◽  
Zhen Yu ◽  
Yong Guan

Localization of sensor nodes is very important for many applications proposed for wireless sensor networks (WSN), such as environment monitoring, geographical routing, and target tracking. Because sensor networks may be deployed in hostile environments, localization approaches can be compromised by many malicious attacks. The adversaries can broadcast corrupted location information; they can jam or modify the transmitting signals between sensors to mislead them to obtain incorrect distance measurements or nonexistent connectivity links. All these malicious attacks will cause sensors not able to or wrongly estimate their locations. In this chapter, we summarize the threat models and provide a comprehensive survey and taxonomy of existing secure localization and verification schemes for wireless sensor networks.


2013 ◽  
Vol 694-697 ◽  
pp. 1060-1063 ◽  
Author(s):  
Fang Wei Liu ◽  
Zhi Long Shan

The locations of sensor nodes are essential to Wireless Sensor Networks applications. Researchers have proposed many localization algorithms for Wireless Sensor Network and verified them through simulators. In this paper, a system-level node location model that aims to validate proposed algorithms for wireless sensor networks in Matlab environment is proposed. This model can reflect the reality networks effectively. Using this model, researchers can verify the performance of the localization algorithms including run time, location error, and location node numbers.


Sign in / Sign up

Export Citation Format

Share Document