Abstract
The security problem of beacon nodes is ignored in most existing localization algorithms in Wireless Sensor Networks (WSNs), although beacon nodes’ location information is crucial to the process of sensor nodes’ localization. Assumed that some of beacon nodes were attacked as a result of the secure vulnerability of WSNs, a secure DV-Hop localization algorithm based on beacons’ credits is proposed in the paper. By distributed calculating the credits of beacon nodes, sensor nodes could eliminate the malicious beacon information effectively according to their credits to ensure the correctness of beacon location information they received. Finally, the efficiency and feasibility of proposed algorithm are proved by the performance evaluation results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Langendoen, K., Reijers, N.: Distributed localization in wireless sensor networks: a quantitative comparison. Comput. Netw. 43, 499–518 (2003)
Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1999), pp. 59–68. ACM, New York (1999)
Girod, L., Estrin, D.: Robust range estimation using acoustic and multimodal sensing. In: Proc. of the Intelligent Robots and Systems (IROS 2001), vol. 3, pp. 1312–1320. IEEE Robotics and Automation Society, Maui (2001)
Girod, L., Bychovkiy, V., Elson, J., Estrin, D.: Locating tiny sensors in time and space: A case study. In: Proc. of the Computer Design: VLSI in Computers and Processors, pp. 214–219. IEEE Computer Society, Freiburg (2002)
Priyantha, N.B., Akl, M., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: Proc. of the 7th Annual Intl. Conf. on Mobile Computing and Networking, pp. 1–14. ACM Press, Rome (2001)
Bulusu, N., Heidemann, J., Estrin, D.: GPS-Less low cost outdoor localization for very mall devices. IEEE Personal Communications 7(5), 28–34 (2000)
Niculescu, D., Nath, B.: DV based positioning in ad hoc networks. Journal of Telecommunication Systems 22(1/4), 267–280 (2003)
Doherty, L., Pister, K.S.J., Ghaoui, L.E.: Convex position estimation in wireless sensor networks. In: Proc. of the IEEE INFOCOM 2001, vol. 3, pp. 1655–1663. IEEE Computer and Communications Societies, Anchorage (2001)
He, T., Huang, C.D., Blum, B.M., et al.: Range-Free localization schemes in large scale sensor networks. In: Proc. of the 9th Annual Intl. Conf. on Mobile Computing and Networking, pp. 81–95. ACM Press, San Diego (2003)
Shang, Y., Ruml, W., Zhang, Y., Fromherz, M.P.J.: Localization from mere connectivity. In: Proc. of the 4th ACM Intl. Symp. on Mobile Ad Hoc Networking & Computing, pp. 201–212. ACM Press, Annapolis (2003)
Wang, F., Shi, L., Ren, F.: Self-Localization Systems and Algorithms for Wireless Sensor Networks. Journal of Software 16(5), 857–868 (2005)
Cao, X., Yu, B., Chen, G., Ren, F.: Security Analysis on Node Localization Systems of Wireless Sensor Networks. Journal of Software, 869–877 (2008)
Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proc. of International Conference on Distributed Computing Systems, pp. 609–619. IEEE, Columbus (2005)
Hu, Y.C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of IEEE Infocom, 1976C–1986C (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhong, J., Xu, L., Hu, H., Ye, A. (2013). A Secure DV-Hop Localization Algorithm Based on Secure Beacon Nodes. In: Wang, R., Xiao, F. (eds) Advances in Wireless Sensor Networks. CWSN 2012. Communications in Computer and Information Science, vol 334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36252-1_67
Download citation
DOI: https://doi.org/10.1007/978-3-642-36252-1_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36251-4
Online ISBN: 978-3-642-36252-1
eBook Packages: Computer ScienceComputer Science (R0)