Efficient localization schemes in sensor networks with malicious nodes

被引:0
|
作者
Xiong, Kaiqi [1 ]
Thuente, David [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
wireless sensor network (WSN); sensor localization; vulnerability; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. It is impractical to have a GPS device on each sensor in WSN due to costs. Most of the existing location discovery schemes can only be used in the trusted environment. Recent research has addressed security issues in sensor network localization but, to the best of our knowledge, none has completely solved the secure localization problem. In this paper, we propose novel schemes for secure dynamic localization in sensor networks. The proposed algorithms tolerate up to 50% of beacon nodes being malicious and they have linear computation time with respect to the number of reference nodes. We have conducted simulations to analyze their performance.
引用
下载
收藏
页码:190 / 196
页数:7
相关论文
共 50 条
  • [1] Dynamic localization schemes in malicious sensor networks
    Xiong, Kaiqi
    Thuente, David
    Journal of Networks, 2009, 4 (08) : 677 - 686
  • [2] Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
    Mukherjee, Partha
    Sen, Sandip
    COMPUTER JOURNAL, 2011, 54 (03): : 482 - 489
  • [3] Secure Efficient Geocast Protocol for Sensor Networks with Malicious Nodes
    Shim, Young-Chul
    EHAC'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS, 2009, : 179 - 184
  • [4] RSS-Based Localization in the Presence of Malicious Nodes in Sensor Networks
    Mukhopadhyay, Bodhibrata
    Srirangarajan, Seshan
    Kar, Subrat
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2021, 70 (70)
  • [5] Repeated Game Based Localization Algorithm for Wireless Sensor Networks with Malicious Beacon Nodes
    Yu, Ning
    Wan, Jiangwen
    AD HOC & SENSOR WIRELESS NETWORKS, 2015, 25 (1-2) : 45 - 68
  • [6] A New Security Localization method for Detecting malicious beacon nodes in wireless sensor networks
    Miao, Chen
    Bao, Peng
    Liang, Ma
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 428 - 432
  • [7] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [8] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [9] Indoor sensor networks: Localization schemes
    Abielmona, Rami
    Groza, Voicu
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1078 - 1081
  • [10] A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks
    Wang, Fang
    Wei, Zhe
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (08) : 1084 - 1087