GRADIENT DESCENT APPROACH FOR SECURE LOCALIZATION IN RESOURCE CONSTRAINED WIRELESS SENSOR NETWORKS

被引:15
作者
Garg, Ravi [1 ]
Varna, Avinash L. [1 ]
Wu, Min [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING | 2010年
关键词
Secure localization; Wireless sensor networks; Gradient descent;
D O I
10.1109/ICASSP.2010.5495371
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able to autonomously determine their locations before they start sensing and transmitting data. Most localization algorithms rely on anchor nodes whose locations are known to determine the positions of the remaining nodes. In an adversarial scenario, some of these anchor nodes could be compromised and used to transmit misleading information aimed at preventing the accurate localization of the remaining sensors. In this paper, a computationally efficient algorithm to determine the location of sensors that can resist such attacks is described. The proposed algorithm combines gradient descent with a selective pruning of inconsistent measurements to achieve good localization accuracy. Simulation results show that the proposed algorithm has performance comparable to existing schemes while requiring less computational resources.
引用
收藏
页码:1854 / 1857
页数:4
相关论文
共 6 条
[1]   RANDOM SAMPLE CONSENSUS - A PARADIGM FOR MODEL-FITTING WITH APPLICATIONS TO IMAGE-ANALYSIS AND AUTOMATED CARTOGRAPHY [J].
FISCHLER, MA ;
BOLLES, RC .
COMMUNICATIONS OF THE ACM, 1981, 24 (06) :381-395
[2]  
Lazos L., 2004, P ACM WORKSHOP WIREL, P21
[3]  
Li Z., 2005, 2005 Fourth International Symposium on Information Processing in Sensor Networks (IEEE Cat. No.05EX1086), P91
[4]   Attack-resistant location estimation in wireless sensor networks [J].
Liu, Donggang ;
Ning, Peng ;
Liu, An ;
Wang, Cliff ;
Du, Wenliang Kevin .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (04)
[5]   DV based positioning in ad hoc networks [J].
Niculescu, D ;
Nath, B .
TELECOMMUNICATION SYSTEMS, 2003, 22 (1-4) :267-280
[6]  
SAVVIDES A, 2001, DYNAMIC FINE GRAINED, P166