Abstract
As to the safety threats faced by sensor networks (SN), nodes limitations of computation, memory and communication, a secure location algorithm (node cooperative secure localization, NCSL) is presented in this paper. The algorithm takes the improvements of SN location information security as its design targets, utilizing nodes’ cooperation to build virtual antennae array to communicate and localize, and gains arraying antenna advantage for SN without extra hardware cost, such as reducing multi-path effects, increasing receivers’ signal to noise ratio and system capability, reducing transmitting power, and so on. Simulations show that the algorithm based on virtual antennae array has good localization ability with a at high accuracy in direction-of-arrival (DOA) estimation, and makes SN capable to resist common malicious attacks, especially wormhole attack, by using the judgment rules for malicious attacks.
Similar content being viewed by others
References
Jennifer Y, Biswanath M, Dipak G. Wireless Sensor Network Survey [J]. Computer Networks, 2008, 52(12): 2292–2330.
Lazos L, Radha P. HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks [J]. IEEE J Sel Areas Commun, 2006, 24(2): 233–246.
Ayhan E, Vedat C, Adnan K. The Sectoral Sweeper Scheme for Wireless Sensor Networks: Adaptive Antenna Array Based Sensor Node Management and Location Estimation [J]. Wireless Pers Commun,2006, 39(4): 415–433.
Elissaios G, Manikas A. Array Formation in Arrayed Wireless Sensor Networks [EB/OL]. [2007-05-06]. http://skynet.ee.ic.ac.uk/papers/2005_J_HERMIS_Array_Formation_In_AWSN.pdf.
Liu Donggang. Security Mechanisms for Wireless Sensor Networks [D]. Raleigh: Department of Computer Science, North Carolina State University, 2005.
Boukerche A, Oliveira H A B, Nakamura E. F, et al. Secure Localization Algorithms for Wireless Sensor Networks [J]. IEEE Communications Magazine, 2008, 46(4): 96–101.
Du W, Fang L, Ning P. LAD: Localization Anomaly Detection for Wireless Sensor Networks [J]. Journal of parallel and distributed computing, 2006, 66(7): 874–886.
Li Xiaohua, Chen Mo, Ratazzi E P. Array-Transmission Based Physical-Layer Security Techniques for Wireless Sensor Networks [C]// Proceedings of the IEEE International Conference on Mechatronics & Automation. Niagara Falls: IEEE Press, 2005: 1618–1623.
Tian Yuan, Ekici E. Cross-Layer Collaborative In-Network Processing in Multi-Hop Wireless Sensor Networks [J]. IEEE Trans Mobile Computing, 2007, 6(3): 297–310.
Mudubai R, Barriac G, Madhow U. On the Feasibility of Distributed Beam Forming in Wireless Networks [J]. IEEE Trans Wireless Communications, 2007, 6(5): 1754–1763.
Cui Shuguang, Goldsmith A J, Bahai A. Energy-Efficiency of MIMO and Cooperative MIMO Techniques in Sensor Networks [J]. IEEE J Sel Areas Commun, 2004, 22(6): 1089–1098.
Yuan Yong, He Zhihai, Chen Min. Virtual MIMO-Based Cross Layer Design for Wireless Sensor Networks [J]. IEEE Transactions on Vehicular Technology, 2006, 55(3): 856–864.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60272014) and the National High Technology Research and Development Program of China (2005AA121520).
Rights and permissions
About this article
Cite this article
Ma, J., Peng, B. Secure localization algorithm based on node cooperative for sensor networks. Wuhan Univ. J. Nat. Sci. 13, 636–640 (2008). https://doi.org/10.1007/s11859-008-0525-2
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-008-0525-2