A New Security Localization method for Detecting malicious beacon nodes in wireless sensor networks

被引:1
|
作者
Miao, Chen [1 ]
Bao, Peng [1 ]
Liang, Ma [1 ]
机构
[1] SW Univ Sci & Technol, Sch Informat Engn, Mianyang 621002, Sichuan, Peoples R China
关键词
Detecting malicious beacon nodes; Wireless sensor networks; Security localization;
D O I
10.4028/www.scientific.net/AMR.186.428
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we address wireless sensor network localization problems that have high reliability in an environment where physical node destruction is possible. We propose a range-independent localization algorithm called security localization based on Detecting malicious beacon nodes (DMBSL) that allows sensors to passively determine their location with high reliability, without increasing the number of reference points, or the complexity of the hardware of each reference point or node. In DMBSL, constraints of wireless sensor network are used to find and remove the malicious beacon nodes, then the maximum likelihood method is used to calculate the location of unknown nodes, so that the location calculation is very robust and is able to resist malicious attacks. In this paper, the location performance of DMBSL algorithm is deeply analyzed. The results of the simulation show the algorithm can get lower average positioning error, meantime malicious attacks have little side effects to location performance.
引用
收藏
页码:428 / 432
页数:5
相关论文
共 50 条
  • [1] Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    Liu, DG
    Ning, P
    Du, WL
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 609 - 619
  • [2] Repeated Game Based Localization Algorithm for Wireless Sensor Networks with Malicious Beacon Nodes
    Yu, Ning
    Wan, Jiangwen
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2015, 25 (1-2) : 45 - 68
  • [3] Malicious beacon detection for localization in wireless sensor networks
    Wang, Weidong
    Zhu, Qingxin
    Zhong, Qianchuan
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1410 - +
  • [4] Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
    Alghamdi, Turki Ali
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [5] A new malicious nodes attack-resistant security location method in wireless sensor network
    [J]. Ye, M. (ym@mail.xidian.edu.cn), 1600, Science Press (36):
  • [6] A Security Localization method in wireless sensor networks
    Xue-dong, Chen
    Bao, Peng
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 193 - +
  • [7] A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks
    Jiang, Yuan-xi
    Zhao, Bao-hua
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 49 - 55
  • [8] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [9] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [10] Efficient localization schemes in sensor networks with malicious nodes
    Xiong, Kaiqi
    Thuente, David
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 190 - 196