A Range-Based Secure Localization Algorithm for Wireless Sensor Networks

被引:47
作者
Liu, Xingcheng [1 ,2 ]
Su, Shaohua [1 ]
Han, Feng [1 ]
Liu, Yitong [3 ]
Pan, Zhihong [2 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Informat Sci, Xinhua Coll, Guangzhou 510520, Guangdong, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless sensor networks (WSNs); secure localization; sequential probability ratio test (SPRT); malicious node detection; clustering; VERIFICATION; ATTACKS;
D O I
10.1109/JSEN.2018.2877306
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The accurate localization of nodes in wireless sensor networks can be jeopardized in certain applications of fields, such as those in security and military. In order to detect the nodes that are captured as malicious anchors, a malicious node detection algorithm named MNDC and its improved version named EMDC are proposed in this paper. The algorithms utilize the density-based spatial clustering to acquire the abnormal clusters, which are further examined via a sequential probability ratio test. The malicious nodes that jeopardize networks are then determined. The conducted simulation results and corresponding analysis demonstrate that the proposed algorithms outperform other state-of-art schemes in terms of detection accuracy and effectiveness.
引用
收藏
页码:785 / 796
页数:12
相关论文
共 31 条
[1]   Outlier detection for wireless sensor networks using density-based clustering approach [J].
Abid, Aymen ;
Kachouri, Abdennaceur ;
Mahfoudhi, Adel .
IET Wireless Sensor Systems, 2017, 7 (04) :83-90
[2]   Range Free Localization in Wireless Sensor Networks for Homogeneous and Non-Homogeneous Environment [J].
Ahmadi, Younes ;
Neda, Naser ;
Ghazizadeh, Reza .
IEEE SENSORS JOURNAL, 2016, 16 (22) :8018-8026
[3]   Security Games for Node Localization through Verifiable Multilateration [J].
Basilico, Nicola ;
Gatti, Nicola ;
Monga, Mattia ;
Sicari, Sabrina .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (01) :72-85
[4]   Statistical methods for assessing agreement between two methods of clinical measurement [J].
Bland, J. Martin ;
Altman, Douglas G. .
INTERNATIONAL JOURNAL OF NURSING STUDIES, 2010, 47 (08) :931-936
[5]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[6]   Secure Location Verification Using Simultaneous Multilateration [J].
Chiang, Jerry T. ;
Haas, Jason J. ;
Choi, Jihyuk ;
Hu, Yih-Chun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) :584-591
[7]   Distributed Detection of Clone Attacks in Wireless Sensor Networks [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi Vincenzo ;
Mei, Alessandro .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :685-698
[8]   TOA Estimation with the IEEE 802.15.4a Standard [J].
D'Amico, Antonio A. ;
Mengali, Umberto ;
Taponecco, Lorenzo .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (07) :2238-2247
[9]  
Du W., 2005, P FUZZ SYST KNOWL DI, P1
[10]  
Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226