Secure localization using hypothesis testing in wireless networks

被引:6
作者
AlRoomi, Suood Abdulaziz [1 ]
Ahmad, Imtiaz [1 ]
Dimitriou, Tassos [1 ]
机构
[1] Kuwait Univ, Comp Engn Dept, Fourth Ring Rd, Kuwait, Kuwait
关键词
Wireless sensor networks; Wireless adhoc networks; Network security; Localization; NODES;
D O I
10.1016/j.adhoc.2018.03.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Localization is the method of estimating the location of a wireless node using measured inputs such as distances from nodes with known locations. When the measured distances from anchor nodes are used for localization, compromised nodes that are involved in the process can give false information that produces inaccurate location estimates. This paper proposes a Generalized Likelihood Ratio (GLRT) based approach to find the compromised nodes that deliberately give false information. After detecting such malicious nodes, the measurements given by them are eliminated from the localization computation to improve the location estimate. The proposed method works for Gaussian range measurement errors, which is considered more realistic, as compared to a method available in literature that works only for uniformly distributed range errors. Extensive simulations were carried out to assess the performance of the algorithm under various conditions. The proposed method was found to give better localization accuracy as compared to previous methods available in the literature which address the same problem. Simulations also showed that the algorithm performs well even when some of the assumptions used in the algorithm do not hold true. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:47 / 56
页数:10
相关论文
共 23 条
[1]  
[Anonymous], 2001, MOBICOM 2001 P 7 ANN
[2]  
[Anonymous], P IEEE C COMP COMM I
[3]  
[Anonymous], IEEE T WIREL COMMUN
[4]   Localization and Location Verification in Non-Homogeneous One-Dimensional Wireless Ad-Hoc Networks [J].
Ataei, Mohammad R. ;
Kunz, Thomas ;
Banihashemi, Amir H. .
IEEE Journal on Selected Areas in Communications, 2015, 33 (07) :1304-1316
[5]   LAD: Localization anomaly detection for wireless sensor networks [J].
Du, Wenliang ;
Fang, Lei ;
Peng, Ning .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (07) :874-886
[6]   Attack-Resistant Wireless Localization Using an Inclusive Disjunction Model [J].
Fang, Shih-Hau ;
Chuang, Chung-Chih ;
Wang, Chiapin .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (05) :1209-1214
[7]   Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes [J].
Garcia-Alfaro, Joaquin ;
Barbeau, Michel ;
Kranakis, Evangelos .
ANNALS OF TELECOMMUNICATIONS, 2011, 66 (9-10) :535-552
[8]   A Survey on Mobile Anchor Node Assisted Localization in Wireless Sensor Networks [J].
Han, Guangjie ;
Jiang, Jinfang ;
Zhang, Chenyu ;
Duong, Trung Q. ;
Guizani, Mohsen ;
Karagiannidis, George K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2220-2243
[9]   A Two-Step Secure Localization for Wireless Sensor Networks [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shu, Lei ;
Guizani, Mohsen ;
Nishio, Shojiro .
COMPUTER JOURNAL, 2013, 56 (10) :1154-1166
[10]   Detecting phantom nodes in wireless sensor networks [J].
Hwang, Joengmin ;
He, Tian ;
Kifn, Yongdae .
INFOCOM 2007, VOLS 1-5, 2007, :2391-+