SECURE LOCALIZATION AGAINST MALICIOUS ATTACKS ON WIRELESS SENSOR NETWORK
Abstract
Wireless sensor networks (WSN) are very susceptible to location errors due to malicious attacks on sensor nodes that distort the position of the sensor nodes, which will lead to an error during unknown node localization. In this paper, we propose a localization algorithm to defend against independent attacks and collusion attacks. In the algorithm, we first select three random reference nodes, then use the trilateral detection method and the confidence interval to get rid of the malicious nodes. We then use the PSO optimization algorithm to locate the unknown node, is called (Secure localization algorithm against advanced attacks-SL4A). Through the simulation results, we prove that our proposed algorithm outperforms the existing algorithms, in terms of the variability of malicious nodes and noise, average localization error and degree computational complexity.
References
Y.S.I.F.Akyildiz,W.SuandE.Cayirci,“Asurveyonsensornetworks,” IEEE Communications Magazine, 2002, vol. 40, no. 8, pp. 102–114.
L.Doherty and K. Pister, “Convex position estimation in wireless sensor networks,” in Proceeding of IEEE International Conference on Computer and Communications Societies (INFOCOM), 2001, vol. 3, pp. 1655–1663.
T. He and C. Huang, “Range-free localization schemes for large scale sensor networks,” ACM MobiCom, San Diego, 2003, pp. 81–95.
D. Niculescu and B. Nath, “Dv based positioning in ad hoc networks,” Telecommunication Systems, 2003, vol. 22, no. 1, pp. 267–280.
C. H. Chang and W. Liao, “A probabilistic model for relative location estimation in wireless sensor networks,” IEEE Communications Letters, 2009, vol. 13, no. 12, pp. 893–895.
O.M.R.Weber,E.MademannandS.Zeisberg,“Localizationtechniques for traffic applications based on robust wecols positioning in wireless sensor networks,” Proceedings of Workshop on Positioning Navigation and Communication (WPNC), 2012, pp. 215–219.
J. Cao, “A localization algorithm based on particle swarm optimization and quasi-newton algorithm for wireless sensor networks,” Journal of Communication and Computer 12, 2015, pp. 85–90.
J. M.-S. . E. R.-I. . A. E.-R. . L. Rizo-Dominguez, “A comparative of range free localization algorithms and dv-hop using the particle swarm optimization algorithm,” in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017, no. 17489361, pp. 150–157.
W. T. Y. Chen and R. Martin, “Attack detection in wireless localization,” in Proceeding of IEEE International Conference on Computer Communications (INFOCOM), 2007, pp. 1964–1972.
S. U. M. Jadliwala, S. Zhong and C. Qiao, “Secure distance-based localization in the presence of cheating beacon nodes,” IEEE Transactions on Mobile Computing, 2010, vol. 9, no. 6, pp. 810–823.
C. C. C. S. H. Fang and C. Wang, “Attack-resistant wireless localization using an inclusive
disjunction model,” IEEE Transactions on Communications, 2012, vol. 60, no. 5, pp. 1209–1214.
L. S. J. Jiang, G. Han and H. C. Chao, “A novel secure localization scheme against collaborative
collusion in wireless sensor networks,” Proceedings of Wireless Communications and Mobile
Computing Conference (IWCMC), 2011, pp. 308–303.
J. H. N. Bulusu and D. Estrin, “Gps-less low cost outdoor localization for very small devices,”
GPS-less low cost outdoor localization for very small devices, 2000, vol. 7, no. 5, pp. 28–34.
V. B. L. J. Yang, Y. Chen and V. Swaminathan, “Robust wireless localization to attacks on access
points,” Proceeding of IEEE Sarnoff Symposium, 2009, pp. 208–212.
N. Kiyavash and F. Koushanfar, “Anti-collusion position estimation in wireless sensor networks,”
in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2007, pp.
–9.
Y. Z. Z. Li, W. Trappe, “Robust statistical methods for securing wireless localization in sensor
networks,” in IPSN 2005. Fourth International Symposium on Information Processing in Sensor.
Wikipedia, Confidence interval, 2008, https://en.wikipedia.org/wiki/ Confidence interval.