Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks

被引:0
作者
Tu N. Nguyen
Vinh V. Le
Shao-I Chu
Bing-Hong Liu
Yao-Chuan Hsu
机构
[1] Purdue University Fort Wayne,Department of Computer Science
[2] National Kaohsiung University of Science and Technology,Department of Electronic Engineering
来源
Wireless Personal Communications | 2022年 / 127卷
关键词
Wireless sensor network; Secure location; Independent attack; Collusion attack;
D O I
暂无
中图分类号
学科分类号
摘要
The accuracy of the location estimation of sensors in wireless sensor networks (WSNs) is important to many applications such as environment surveillance applications. In large-scale and distributed WSNs, locations of the sensors may not be recorded during the deployment process, resulting in the need of localization techniques to help collect the sensor location information. WSNs are highly vulnerable to localization attacks since the localization techniques totally rely on the neighboring relations to determine the location of sensors. In other words, some of malicious sensor nodes can take the advantage of the neighboring relations to manipulate the localization process. In this paper, we propose two localization algorithms to overcome both common types of localization attacks, independent attacks and collusion attacks. In the first algorithm, we propose the Improved Randomized Consistency Position Algorithm to determine the location of unknown nodes using the location estimation information provided by the three random anchor nodes and using the PSO algorithm paradigm to identify the coordinates of the unknown nodes’ location. In addition, the second algorithm, which is a combination of voting method, location optimization, and the PSO algorithm paradigm to identify the location of unknown nodes, is referred to as the Enhanced Attack-Resistant Secure Localization Algorithm. Through rigorous theoretical analysis and experimentation, we demonstrate that our proposed localization algorithms yield better performance comparing to the existing methods.
引用
收藏
页码:767 / 792
页数:25
相关论文
共 111 条
[21]  
Lin Y-X(2009)Distributed power control-based connectivity reconstruction game in wireless localization IEEE Communications Letters 13 893-205
[22]  
Nguyen N(2012)Distributed toa-based positioning in wireless sensor networks: A potential game approach IEEE Transactions on Communications 60 1209-1751
[23]  
Liu B(2012)A probabilistic model for relative location estimation in wireless sensor networks IEEE Transactions on Information Forensics and Security 7 717-6761
[24]  
Pham V(2019)Attack-resistant wireless localization using an inclusive disjunction model IEEE Sensors Journal 19 785-280
[25]  
Liou T(2019)An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks IEEE Transactions on Network and Service Management 16 192-undefined
[26]  
Nguyen N(2019)A range-based secure localization algorithm for wireless sensor networks International Journal of Communication Systems. 32 e4105-undefined
[27]  
Liu B(2020)Challenges, designs, and performances of a distributed algorithm for minimum-latency of data-aggregation in multi-channel wsns IEEE Access 8 879-undefined
[28]  
Pham V(2020)Secure af relaying with efficient partial relay selection scheme IEEE Transactions on Network Science and Engineering 7 1736-undefined
[29]  
Huang C(2020)Multi-topic misinformation blocking with budget constraint on online social networks IEEE Sensors Journal 20 6753-undefined
[30]  
Nguyen NT(2003)On new approaches of maximum weighted target coverage and sensor connectivity: Hardness and approximation Telecommunication Systems 22 267-undefined