The Effect of Pruning Stage in Secure Localization in Wireless Sensor Networks

被引:0
作者
Mofarreh-Bonab, Mostafa [1 ]
Mofarreh-Bonab, Mohamad [2 ]
Ghorashi, Seyed Ali [1 ]
机构
[1] Shahid Beheshti Univ, Cognit Telecommun Res Grp, Dept Elect Engn, Fac Elect & Comp Engn, Tehran 1983963113, Iran
[2] Univ Bonab, Dept Elect Engn, Bonab, Iran
来源
2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST) | 2012年
关键词
secure localization; Wireless Sensor Network; pruning; localization error; Gradient descent;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Wireless Sensor Networks (WSNs), the received data from nodes are useful only when accurate information about their locations is available. Many localization methods use some nodes that their locations are known by manual or by means of positioning systems such as GPS. These nodes are known as anchor or beacon nodes. In those applications of WSNs in which localization is very important, such as robotic land mine detection, battle field surveillance, etc., the anchor nodes may be attacked by unauthorized accesses in hostile environments and as a result, the localization system may face perturbation. Therefore, in recent literatures some secure localization methods have been introduced. Gradient descent is a low complex, secure and time efficient approach that marks some anchor nodes as attacked ones by using special algorithms and prunes them, then determines the position of sensors using the remaining anchor nodes. In this paper, it is shown that pruning these anchor nodes may cause to localization error increase. In other words, it is shown that in non-coordinated attacks, using the information sent by attacked anchor nodes can improve the localization accuracy. The simulation results show that by utilizing
引用
收藏
页码:455 / 458
页数:4
相关论文
共 10 条
[1]  
Bouerche Azzedine, 2007, IEEE WIREL COMMUN, P6
[2]   An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks [J].
Garg, Ravi ;
Varna, Avinash L. ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :717-730
[3]   GRADIENT DESCENT APPROACH FOR SECURE LOCALIZATION IN RESOURCE CONSTRAINED WIRELESS SENSOR NETWORKS [J].
Garg, Ravi ;
Varna, Avinash L. ;
Wu, Min .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :1854-1857
[4]  
Haykin S., ADAPTIVE FILTER THEO, P915
[5]   Real-Time Estimation of Sensor Node's Position Using Particle Swarm Optimization With Log-Barrier Constraint [J].
Hong Anh Nguyen ;
Guo, Hao ;
Low, Kay-Soon .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2011, 60 (11) :3619-3628
[6]   Technical Correspondence [J].
Kulkarni, Raghavendra V. ;
Venayagamoorthy, Ganesh Kumar .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2011, 41 (02) :262-267
[7]  
Li Z., 2005, P 4 INT S INFORM PRO, P12
[8]   Attack-resistant location estimation in wireless sensor networks [J].
Liu, Donggang ;
Ning, Peng ;
Liu, An ;
Wang, Cliff ;
Du, Wenliang Kevin .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (04)
[9]  
Qureshi S., 2011, J EMERGING TRENDS EN, V2
[10]  
Srinivasan Avinash, SURVEY SECURE LOCALI