A New Security Localization Method for Detecting Malicious Beacon Nodes in Wireless Sensor Networks

Article Preview

Abstract:

In this paper, we address wireless sensor network localization problems that have high reliability in an environment where physical node destruction is possible. We propose a range-independent localization algorithm called security localization based on Detecting malicious beacon nodes (DMBSL) that allows sensors to passively determine their location with high reliability, without increasing the number of reference points, or the complexity of the hardware of each reference point or node. In DMBSL, constraints of wireless sensor network are used to find and remove the malicious beacon nodes, then the maximum likelihood method is used to calculate the location of unknown nodes, so that the location calculation is very robust and is able to resist malicious attacks. In this paper, the location performance of DMBSL algorithm is deeply analyzed. The results of the simulation show the algorithm can get lower average positioning error, meantime malicious attacks have little side effects to location performance.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

428-432

Citation:

Online since:

January 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D. G. Liu. Security mechanisms for wireless sensor networks [D]. North Carolina State University, PhD Thesis. 2005: 74~215.

Google Scholar

[2] E.S. Navarro, V. Vivekanandan V.W.S. Wong. Dual and Mixture Monte Carlo Localization Algorithms for Mobile Wireless Sensor Networks[C]. in: Proc. of the IEEE Wireless Communications and Networking Conference (WCNC2007), Kowloon, China, 2007: 4027-4031.

DOI: 10.1109/wcnc.2007.735

Google Scholar

[3] L. Hu, D. Evans. Localization for mobile sensor networks. in: Tenth International Conference on Mobile Computing and Networking (MobiCom04), Philadelphia, Pennsylvania, USA, 2004: 45–57.

Google Scholar

[4] A. Baggio, K. Langendoen. Monte Carlo localization for mobile wireless sensor networks[J]. Ad Hoc Networks. 2008(6): 718-733.

DOI: 10.1016/j.adhoc.2007.06.004

Google Scholar

[5] L. Lazos, R. Poovendran. SeRLoc: Robust Localization for Wireless Sensor Networks [J]. ACM Transactions on Sensor Networks. 2005, 1(1): 73-100.

DOI: 10.1145/1077391.1077395

Google Scholar

[6] Murtuza Jadliwala, Sheng Zhong etc. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes [J]. IEEE Transactions on mobile computing. 2010, 9(6): 810-823.

DOI: 10.1109/tmc.2010.20

Google Scholar

[7] Wen Tao Zhu, Yang Xiang. Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks[C]. (Eds. ): ATC 2009, LNCS 5586, 2009: 164–178.

DOI: 10.1007/978-3-642-02704-8_13

Google Scholar

[8] Zhao Huan, Feng Ying, Luo Juan, Yang Ke-hua. Research on Mobile Node Localization Algorithm in Wireless Sensor Networks[J]. Chinese journal of sensors and actuators. 2007, 34(8): 74-77.

Google Scholar