Skip to main content

A Secure DV-Hop Localization Algorithm Based on Secure Beacon Nodes

  • Conference paper
Advances in Wireless Sensor Networks (CWSN 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 334))

Included in the following conference series:

Abstract

The security problem of beacon nodes is ignored in most existing localization algorithms in Wireless Sensor Networks (WSNs), although beacon nodes’ location information is crucial to the process of sensor nodes’ localization. Assumed that some of beacon nodes were attacked as a result of the secure vulnerability of WSNs, a secure DV-Hop localization algorithm based on beacons’ credits is proposed in the paper. By distributed calculating the credits of beacon nodes, sensor nodes could eliminate the malicious beacon information effectively according to their credits to ensure the correctness of beacon location information they received. Finally, the efficiency and feasibility of proposed algorithm are proved by the performance evaluation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Langendoen, K., Reijers, N.: Distributed localization in wireless sensor networks: a quantitative comparison. Comput. Netw. 43, 499–518 (2003)

    Article  MATH  Google Scholar 

  2. Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1999), pp. 59–68. ACM, New York (1999)

    Chapter  Google Scholar 

  3. Girod, L., Estrin, D.: Robust range estimation using acoustic and multimodal sensing. In: Proc. of the Intelligent Robots and Systems (IROS 2001), vol. 3, pp. 1312–1320. IEEE Robotics and Automation Society, Maui (2001)

    Google Scholar 

  4. Girod, L., Bychovkiy, V., Elson, J., Estrin, D.: Locating tiny sensors in time and space: A case study. In: Proc. of the Computer Design: VLSI in Computers and Processors, pp. 214–219. IEEE Computer Society, Freiburg (2002)

    Chapter  Google Scholar 

  5. Priyantha, N.B., Akl, M., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: Proc. of the 7th Annual Intl. Conf. on Mobile Computing and Networking, pp. 1–14. ACM Press, Rome (2001)

    Google Scholar 

  6. Bulusu, N., Heidemann, J., Estrin, D.: GPS-Less low cost outdoor localization for very mall devices. IEEE Personal Communications 7(5), 28–34 (2000)

    Article  Google Scholar 

  7. Niculescu, D., Nath, B.: DV based positioning in ad hoc networks. Journal of Telecommunication Systems 22(1/4), 267–280 (2003)

    Article  Google Scholar 

  8. Doherty, L., Pister, K.S.J., Ghaoui, L.E.: Convex position estimation in wireless sensor networks. In: Proc. of the IEEE INFOCOM 2001, vol. 3, pp. 1655–1663. IEEE Computer and Communications Societies, Anchorage (2001)

    Google Scholar 

  9. He, T., Huang, C.D., Blum, B.M., et al.: Range-Free localization schemes in large scale sensor networks. In: Proc. of the 9th Annual Intl. Conf. on Mobile Computing and Networking, pp. 81–95. ACM Press, San Diego (2003)

    Google Scholar 

  10. Shang, Y., Ruml, W., Zhang, Y., Fromherz, M.P.J.: Localization from mere connectivity. In: Proc. of the 4th ACM Intl. Symp. on Mobile Ad Hoc Networking & Computing, pp. 201–212. ACM Press, Annapolis (2003)

    Google Scholar 

  11. Wang, F., Shi, L., Ren, F.: Self-Localization Systems and Algorithms for Wireless Sensor Networks. Journal of Software 16(5), 857–868 (2005)

    Article  Google Scholar 

  12. Cao, X., Yu, B., Chen, G., Ren, F.: Security Analysis on Node Localization Systems of Wireless Sensor Networks. Journal of Software, 869–877 (2008)

    Google Scholar 

  13. Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proc. of International Conference on Distributed Computing Systems, pp. 609–619. IEEE, Columbus (2005)

    Google Scholar 

  14. Hu, Y.C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of IEEE Infocom, 1976C–1986C (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhong, J., Xu, L., Hu, H., Ye, A. (2013). A Secure DV-Hop Localization Algorithm Based on Secure Beacon Nodes. In: Wang, R., Xiao, F. (eds) Advances in Wireless Sensor Networks. CWSN 2012. Communications in Computer and Information Science, vol 334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36252-1_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36252-1_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36251-4

  • Online ISBN: 978-3-642-36252-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics