Reputation-Based Secure Sensor Localization in Wireless Sensor Networks

Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments.

[1]  Rajesh K. Gupta,et al.  Sensor localization with deterministic accuracy guarantee , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Jian-Bo Yang,et al.  Management of Uncertainty and Spatio-Temporal Aspects for Monitoring and Diagnosis in a Smart Home , 2008, Int. J. Comput. Intell. Syst..

[3]  Boon-Hee Soong,et al.  A New Lower Bound on Range-Free Localization Algorithms in Wireless Sensor Networks , 2011, IEEE Communications Letters.

[4]  Abdelhakim Hafid,et al.  High accuracy localization method using AoA in sensor networks , 2009, Comput. Networks.

[5]  Liusheng Huang,et al.  A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[6]  Honglong Chen,et al.  A Novel Secure Localization Approach in Wireless Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[7]  Kuo-Feng Ssu,et al.  An Energy Efficient Protocol for Target Localization in Wireless Sensor Networks , 2009 .

[8]  Aurel Stefan Gontean,et al.  Maximum Likelihood Estimation Algorithm Evaluation for Wireless Sensor Networks , 2010, 2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.

[9]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[10]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[11]  Yong-Hoon Choi,et al.  A Polygonal Method for Ranging-Based Localization in an Indoor Wireless Sensor Network , 2011, Wirel. Pers. Commun..

[12]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[13]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[14]  Ang Gao,et al.  Cosine Theorem-based DV-Hop Localization Algorithm in Wireless Sensor Networks , 2011 .

[15]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[16]  Kang G. Shin,et al.  Attack-tolerant localization via iterative verification of locations in sensor networks , 2008, TECS.

[17]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[19]  Ismail Güvenç,et al.  A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques , 2009, IEEE Communications Surveys & Tutorials.

[20]  Di Wu,et al.  Localization Algorithms for Wireless Sensor Retrieval , 2010, Comput. J..

[21]  Erik F. Golen,et al.  An evolutionary approach to underwater sensor deployment , 2009, GECCO '09.