Sdrfhbloc-a secure framework for localization in wireless sensor networks

被引:0
|
作者
Prashar D. [1 ]
Jyoti K. [2 ]
Kumar D. [3 ]
机构
[1] Department of Computer Science and Engineering, IKG Punjab Technical University, Kapurthala, Punjab
[2] Department of Information Technology, GNDEC, Ludhiana, Punjab
[3] Department of Electronics and Communi-cation, SLIET, Sangrur, Punjab
关键词
Adversaries; Base station; Digital signature; DV-Hop; GUI; Localization; PSO; Security;
D O I
10.2174/2213275912666190218151214
中图分类号
学科分类号
摘要
Background: Deployment of nodes and their security always remain the main point of concern in Wireless Sensor Networks (WSNs). Applications that are position-centric, location estimation is the major requirement and this leads to the emergence of various localization techniques. There are broadly two types of localization methods: range-based and free-range. Along with the position estimation, security of the position computation process is the prime concern as the wrong position estimation through the presence of adversaries in the environment may compromise the whole process. There are some localization systems that are estimating the position coordinate val-ues of the nodes, but none of them has addressed the issues to overcome the inclusion of the adversaries effect on the localization process. Methods: Here, we develop and analyze a new framework SDRFHBLoc (Secure Distributed Range Free Hop Based Localization) that provides the functionality for the deployment of nodes based on different aspects like the node amount, malicious node amount, range and deployment area. Security features are also integrated in the system based on authentication of the nodes who are participating in the localization process using the signature generation and verification. Results: The proposed security framework removes the faulty nodes from the network before they participate in the localization process through the improved DV-Hop approach which is implement-ed in the system. Also, the optimization of the entire process provides the best and precise position estimation using the Particle Swarm Optimization (PSO) module. Conclusion: The proposed framework is quite efficient to mitigate the risk of any kind of attack possible on localization process and also customize as per the requirement of the algorithms. © 2020 Bentham Science Publishers.
引用
收藏
页码:1158 / 1171
页数:13
相关论文
共 50 条
  • [21] Secure Sensor Localization in Wireless Sensor Networks based on Neural Network
    Zhang, Ting
    He, Jingsha
    Zhang, Yang
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) : 914 - 923
  • [22] Secure Range-Dependent Localization in Wireless Sensor Networks
    Zhang, Jia
    Zhang, Haiyan
    Lv, Jinna
    Liu, Yanchang
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 2247 - 2252
  • [23] Secure localization and location verification in wireless sensor networks: a survey
    Zeng, Yingpei
    Cao, Jiannong
    Hong, Jue
    Zhang, Shigeng
    Xie, Li
    JOURNAL OF SUPERCOMPUTING, 2013, 64 (03): : 685 - 701
  • [24] A Two-Step Secure Localization for Wireless Sensor Networks
    Han, Guangjie
    Jiang, Jinfang
    Shu, Lei
    Guizani, Mohsen
    Nishio, Shojiro
    COMPUTER JOURNAL, 2013, 56 (10): : 1154 - 1166
  • [25] Secure Actor Directed Localization in Wireless Sensor and Actor Networks
    Ali, Tamleek
    Khan, Muazzam A.
    Hayat, Amir
    Alam, Masoom
    Ali, Muhammad
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [26] Secure Reputation Update for Target Localization in Wireless Sensor Networks
    Tanuja, R.
    Anoosha, V
    Manjula, S. H.
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    WIRELESS NETWORKS AND COMPUTATIONAL INTELLIGENCE, ICIP 2012, 2012, 292 : 109 - +
  • [27] The Effect of Pruning Stage in Secure Localization in Wireless Sensor Networks
    Mofarreh-Bonab, Mostafa
    Mofarreh-Bonab, Mohamad
    Ghorashi, Seyed Ali
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 455 - 458
  • [28] Practical and secure localization and key distribution for wireless sensor networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    AD HOC NETWORKS, 2012, 10 (06) : 946 - 961
  • [29] Secure localization and location verification in wireless sensor networks: a survey
    Yingpei Zeng
    Jiannong Cao
    Jue Hong
    Shigeng Zhang
    Li Xie
    The Journal of Supercomputing, 2013, 64 : 685 - 701
  • [30] Information Game Model for Secure Localization in Wireless Sensor Networks
    Xu, Xiaofeng
    Ren, Yongji
    2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION AND COMMUNICATION TECHNOLOGY ICEICT 2016 PROCEEDINGS, 2016, : 195 - 198