Blockchain Powered Secure Range-Free Localization in Wireless Sensor Networks

A novel trust-based range-free secure algorithm using blockchain technology is considered in hostile WSNs for localization. The trust values of beacon nodes are evaluated against reputation value, mobility, residual energy and neighbor node list. The blockchain technology is implemented then to share the beacon nodes trust value with neighbor nodes. The highly trustworthy beacon nodes are subsequently elected as a miner for the mining process of blocks so that unknown nodes get information from highly honest beacon nodes to perform the localization process correctly. A set of simulations is conducted to validate the effectiveness of the proposed algorithm compared to the existing one.

[1]  Qiang Zhang,et al.  An Attack-resistant RSS-based Localization Algorithm with L1 Regularization for Wireless Sensor Networks , 2018, 2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC).

[2]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[3]  Hongyi Wu,et al.  Localization in Wireless Ad Hoc Networks , 2005 .

[4]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[5]  Gianluca Dini,et al.  Secure Positioning in Wireless Sensor Networks through Enlargement Miscontrol Detection , 2016, ACM Trans. Sens. Networks.

[6]  Khaled Salah,et al.  Performance analysis of content discovery for ad-hoc tactile networks , 2019, Future Gener. Comput. Syst..

[7]  Amr Tolba,et al.  Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.

[8]  Feng Hao,et al.  M2M-REP: Reputation system for machines in the internet of things , 2018, Comput. Secur..

[9]  Fredrik Gustafsson,et al.  Fingerprinting Localization in Wireless Networks Based on Received-Signal-Strength Measurements: A Case Study on WiMAX Networks , 2010, IEEE Transactions on Vehicular Technology.

[10]  Gulshan Kumar,et al.  Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks , 2017, J. Netw. Comput. Appl..

[11]  Aihua Xia,et al.  Securing DV-Hop localization against wormhole attacks in wireless sensor networks , 2015, Pervasive Mob. Comput..

[12]  Jingsha He,et al.  Reputation-Based Secure Sensor Localization in Wireless Sensor Networks , 2014, TheScientificWorldJournal.

[13]  Miodrag Potkonjak,et al.  Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure , 2001, MobiHoc '01.

[14]  Mritunjay Kumar Rai,et al.  A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks , 2019, IEEE Access.

[15]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[16]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  Abhishek Kumar,et al.  A Hybrid Fuzzy System Based Cooperative Scalable and Secured Localization Scheme For Wireless Sensor Networks , 2018, International Journal of Wireless & Mobile Networks.

[18]  Abdelhakim Hafid,et al.  High accuracy localization method using AoA in sensor networks , 2009, Comput. Networks.

[19]  Dieter Hogrefe,et al.  Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks , 2018, IEEE Access.

[20]  Yipeng Wang,et al.  A nonparametric approach to the automated protocol fingerprint inference , 2017, J. Netw. Comput. Appl..

[21]  Wang Yu A New Malicious Nodes Attack-Resistant Security Location Method in Wireless Sensor Network , 2013 .

[22]  Gang Qu,et al.  A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.

[23]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[24]  Gaurav S. Sukhatme,et al.  On the Feasibility of Ad-Hoc Localization Systems , 2003 .

[25]  S. Sitharama Iyengar,et al.  Secure Reputation Update for Target Localization in Wireless Sensor Networks , 2012 .

[26]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[27]  Miao Ye,et al.  A New Malicious Nodes Attack-Resistant Security Location Method in Wireless Sensor Network: A New Malicious Nodes Attack-Resistant Security Location Method in Wireless Sensor Network , 2014 .

[28]  Bin Luo,et al.  Secure and Robust DV-Hop Localization Based on the Vector Refinement Feedback Method for Wireless Sensor Networks , 2017, Comput. J..

[29]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[30]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[31]  Jingsha He,et al.  A Signcryption-based Secure Localization Scheme in Wireless Sensor Networks , 2012 .

[32]  Xiangliang Zhang,et al.  CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[33]  Chao Shen,et al.  Ultra Dense Cells Management and Resource Allocation in Green Software-Defined Wireless Networks , 2017, Comput. J..

[34]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[35]  Ashraf S. Hasan Mahmoud,et al.  Reliable Middleware for Wireless Sensor-Actuator Networks , 2019, IEEE Access.

[36]  Jean-Pierre Corriveau,et al.  Secure Localization in the Presence of Colluders in WSNs , 2017, Sensors.

[37]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[38]  Rajesh K. Gupta,et al.  Sensor localization with deterministic accuracy guarantee , 2011, 2011 Proceedings IEEE INFOCOM.

[39]  Guangjie Han,et al.  A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks , 2016, Sensors.

[40]  Ismail Güvenç,et al.  A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques , 2009, IEEE Communications Surveys & Tutorials.

[41]  Di Wu,et al.  Localization Algorithms for Wireless Sensor Retrieval , 2010, Comput. J..

[42]  Yan Guo,et al.  Localization of Wireless Sensor Network Based on Genetic Algorithm , 2013, Int. J. Comput. Commun. Control.

[43]  Gulshan Kumar,et al.  A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks , 2017, Mob. Inf. Syst..