An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks

被引:60
作者
Garg, Ravi [1 ]
Varna, Avinash L. [1 ]
Wu, Min [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Gradient descent; mobile sensor networks (MSNs); secure localization; wireless sensor networks (WSNs);
D O I
10.1109/TIFS.2012.2184094
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many applications of wireless sensor networks require precise knowledge of the locations of constituent nodes. In these applications, it is desirable for the nodes to be able to autonomously determine their locations before they start sensing and transmitting data. Most localization algorithms use anchor nodes with known locations to determine the positions of the remaining nodes. However, these existing techniques often fail in hostile environments where some of the nodes may be compromised by adversaries and used to transmit misleading information aimed at preventing accurate localization of the remaining sensors. In this paper, a computationally efficient secure localization algorithm that withstands such attacks is described. The proposed algorithm combines iterative gradient descent with selective pruning of inconsistent measurements to achieve high localization accuracy. Results show that the proposed algorithm utilizes fewer computational resources and achieves an accuracy better than or comparable to that of existing schemes. The proposed secure localization algorithm can also be used in mobile sensor networks, where all nodes are moving, to estimate the relative locations of the nodes without relying on anchor nodes. Simulations demonstrate that the proposed algorithm can find the relative location map of the entire mobile sensor network even when some nodes are compromised and transmit false information.
引用
收藏
页码:717 / 730
页数:14
相关论文
共 39 条
[1]  
[Anonymous], 2001, MOBICOM 2001 P 7 ANN
[2]  
[Anonymous], 2008, P 27 C COMP COMM
[3]  
[Anonymous], 1978, Multidimensional scaling
[4]  
[Anonymous], 2005, Location estimation in sensor networks
[5]  
[Anonymous], P C MOB AD HOC SENS
[6]  
[Anonymous], P IEEE MIL COMM C WA
[7]  
Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
[8]  
Basha EA, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P295
[9]   A survey of mobility models for ad hoc network research [J].
Camp, T ;
Boleng, J ;
Davies, V .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05) :483-502
[10]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232