A Range-Based Secure Localization Algorithm for Wireless Sensor Networks

The accurate localization of nodes in wireless sensor networks can be jeopardized in certain applications of fields, such as those in security and military. In order to detect the nodes that are captured as malicious anchors, a malicious node detection algorithm named MNDC and its improved version named EMDC are proposed in this paper. The algorithms utilize the density-based spatial clustering to acquire the abnormal clusters, which are further examined via a sequential probability ratio test. The malicious nodes that jeopardize networks are then determined. The conducted simulation results and corresponding analysis demonstrate that the proposed algorithms outperform other state-of-art schemes in terms of detection accuracy and effectiveness.

[1]  Abdennaceur Kachouri,et al.  Outlier detection for wireless sensor networks using density-based clustering approach , 2017, IET Wirel. Sens. Syst..

[2]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[3]  Shihao Yan,et al.  Location Verification Systems for VANETs in Rician Fading Channels , 2014, IEEE Transactions on Vehicular Technology.

[4]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[5]  W. Yang,et al.  Voting-On-Grid Clustering for Secure Localization in Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[6]  Mianxiong Dong,et al.  DisLoc: A Convex Partitioning Based Approach for Distributed 3-D Localization in Wireless Sensor Networks , 2017, IEEE Sensors Journal.

[7]  Chin-Tau A. Lea,et al.  Received Signal Strength-Based Wireless Localization via Semidefinite Programming: Noncooperative and Cooperative Schemes , 2010, IEEE Transactions on Vehicular Technology.

[8]  Shihao Yan,et al.  An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[9]  Sajal K. Das,et al.  Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.

[10]  Shihao Yan,et al.  Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.

[11]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[12]  Ismail Güvenç,et al.  A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques , 2009, IEEE Communications Surveys & Tutorials.

[13]  Jihyuk Choi,et al.  Secure Location Verification Using Simultaneous Multilateration , 2012, IEEE Transactions on Wireless Communications.

[14]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[15]  Hao Wang,et al.  WSN Localization Using RSS in Three-Dimensional Space—A Geometric Method With Closed-Form Solution , 2016, IEEE Sensors Journal.

[16]  Lawrence Wai-Choong Wong,et al.  Geo-Spatial Location Spoofing Detection for Internet of Things , 2016, IEEE Internet of Things Journal.

[17]  Reza Ghazizadeh,et al.  Range Free Localization in Wireless Sensor Networks for Homogeneous and Non-Homogeneous Environment , 2016, IEEE Sensors Journal.

[18]  Yu Peng,et al.  RSSI-Based Localization Through Uncertain Data Mapping for Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[19]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[20]  Umberto Mengali,et al.  TOA Estimation with the IEEE 802.15.4a Standard , 2010, IEEE Transactions on Wireless Communications.

[21]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[22]  J M Bland,et al.  Statistical methods for assessing agreement between two methods of clinical measurement , 1986 .

[23]  Marco Fiore,et al.  Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing , 2014, IEEE Transactions on Mobile Computing.

[24]  Marco Fiore,et al.  Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[25]  Nicola Basilico,et al.  Security Games for Node Localization through Verifiable Multilateration , 2014, IEEE Transactions on Dependable and Secure Computing.

[26]  Min Wu,et al.  An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Yong Guan,et al.  Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[28]  Dong-Yang Liu Attack-resistant location estimation in wireless sensor networks , 2013 .

[29]  Yi Xie,et al.  An Optimization Scheme of Enhanced Adaptive Dynamic Energy Consumption Based on Joint Network-Channel Coding in WSNs , 2017, IEEE Sensors Journal.