Research on Hop-Based Secure Positioning Algorithm in WSN

Article Preview

Abstract:

In order to further improve the performance of node positioning system and intrusion tolerance in Wireless Sensor Network (WSN), taking advantage of the redundant information within multi-hop sensor networks, a secure location algorithm which based on node hops, consistence aggregation and gradient descent (HCAGD) was put forward in this paper. In which the ideology of Hop-based node positioning algorithm was used for getting reference positioning information; the gradient descent algorithm was used for position estimation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1193-1196

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Capkun, and J.P. Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 221-232.

DOI: 10.1109/jsac.2005.861380

Google Scholar

[2] F. Anjum, S. Pandey, P. Agrawal. Secure positioning in sensor networks using transmission range variation. In: Proc. of 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems. Washington: IEEE Computer Society, 2005, 195- 203.

DOI: 10.1109/mahss.2005.1542800

Google Scholar

[3] Z. Li, W. Trappe, Y. Zhang, et al. Robust statistical methods for securing wireless positioning in sensor networks. In: Proc. of IPSN 2005, Los Angeles: IEEE Computer Society, 2005, 91-98.

DOI: 10.1109/ipsn.2005.1440903

Google Scholar

[4] Wang C , Liu A , Ning P. Cluster-based minimum mean square estimation for secure and resilient positioning in wireless sensor networks [C]∥Proc. of the International Conference on Wireless Algorithms, Systems and Applications (WASA'07). Chica -go , IL , August (2007).

DOI: 10.1109/wasa.2007.146

Google Scholar

[5] A. Srinivasan, J. Teitelbaum, and J. Wu, DRBTS: Distributed reputation-based beacon trust system, in Proc. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Sept. 2006, 277-283.

DOI: 10.1109/dasc.2006.28

Google Scholar

[6] Yawen Wei, Zhen Yu, Yong Guan:Location Verification Algorithms for Wireless Sensor Networksin proc. of 27th International Conference on Distributed Computing Systems, (ICDCS'07), 2007, 3442-3453.

DOI: 10.1109/icdcs.2007.117

Google Scholar