Open Access Open Access  Restricted Access Subscription or Fee Access

Optimization of Location Verification Algorithm in Wireless Sensor Network

T. Sheela, N. Ramkumar

Abstract


In wireless sensor network localization schemes are used to knowing the location of all sensor nodes. But some localization is subjected to many malicious attacks in the network such as wormhole attack. Therefore, sensors locations are not truthful and need to be verified the sensors’ locations are trustable or not. To detect the abnormal location in wireless sensor networks, this paper propose technique called in-region verification and Distributed In-Region Verification. Each region has separate verification center in distributed verification algorithm, and one verification center for in-region verification. Use of multiple verification centers in the network is reducing communication overhead and high detection accuracy. Performance of previous location verification algorithms are analyzed through graph. Better performance finds the suitable location verification algorithm for wireless sensor network.


Keywords


Wireless Sensor Network, Localization, In-Region, Location Verification.

Full Text:

PDF

References


Yawen Wei and Yong Guan, “Lightweight Location Verification algorithm for wireless sensor networks,” IEEE TRANSACTIONS on Parallel and distributed System MAY 2013.

M. Talasila, R. Curtmola, and C. Borcea, “LINK: Location- Verification through Immediate Neighbors Knowledge,” technical report, Dept. of Computer Science, NJIT, 2010.

Youssef and M. Youssef, “A Taxonomy of Localization Schemes for Wireless Sensor Networks,” Proc. Int’l Conf. Wireless Networks (ICWN ’07), pp. 444-450, 2007.

L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” Proc. 11th Network and Distributed System Security Symp., 2003.

Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proc. IEEE INFOCOM, 2003.

L. Lazos and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks,” Proc. ACM workshop Wireless Security (WiSe), 2004.

Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN ’05), 2005.

D. Liu, N. Peng, and W.K. Du, “Attack-Resistant Location Estimation in Sensor Networks,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN ’05), 2005.

S. Brands and D. Chaum, “Distance-Bounding Protocols,” Proc. Workshop the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT ’93), pp. 344C359, 1994.

S. Capkun and J.P. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,” Proc. IEEE INFOCOM, 2005.

W. Du, L. Fang, and P. Ning, “LAD: Localization Anomaly Detection for Wireless Sensor Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS ’05),

S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization with Hidden and Mobile Base Stations,” Proc. IEEE INFOCOM, 2006


Refbacks

  • There are currently no refbacks.