Skip to main content
Log in

Secure localization algorithm based on node cooperative for sensor networks

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

As to the safety threats faced by sensor networks (SN), nodes limitations of computation, memory and communication, a secure location algorithm (node cooperative secure localization, NCSL) is presented in this paper. The algorithm takes the improvements of SN location information security as its design targets, utilizing nodes’ cooperation to build virtual antennae array to communicate and localize, and gains arraying antenna advantage for SN without extra hardware cost, such as reducing multi-path effects, increasing receivers’ signal to noise ratio and system capability, reducing transmitting power, and so on. Simulations show that the algorithm based on virtual antennae array has good localization ability with a at high accuracy in direction-of-arrival (DOA) estimation, and makes SN capable to resist common malicious attacks, especially wormhole attack, by using the judgment rules for malicious attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Jennifer Y, Biswanath M, Dipak G. Wireless Sensor Network Survey [J]. Computer Networks, 2008, 52(12): 2292–2330.

    Article  Google Scholar 

  2. Lazos L, Radha P. HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks [J]. IEEE J Sel Areas Commun, 2006, 24(2): 233–246.

    Article  Google Scholar 

  3. Ayhan E, Vedat C, Adnan K. The Sectoral Sweeper Scheme for Wireless Sensor Networks: Adaptive Antenna Array Based Sensor Node Management and Location Estimation [J]. Wireless Pers Commun,2006, 39(4): 415–433.

    Article  Google Scholar 

  4. Elissaios G, Manikas A. Array Formation in Arrayed Wireless Sensor Networks [EB/OL]. [2007-05-06]. http://skynet.ee.ic.ac.uk/papers/2005_J_HERMIS_Array_Formation_In_AWSN.pdf.

  5. Liu Donggang. Security Mechanisms for Wireless Sensor Networks [D]. Raleigh: Department of Computer Science, North Carolina State University, 2005.

    Google Scholar 

  6. Boukerche A, Oliveira H A B, Nakamura E. F, et al. Secure Localization Algorithms for Wireless Sensor Networks [J]. IEEE Communications Magazine, 2008, 46(4): 96–101.

    Article  Google Scholar 

  7. Du W, Fang L, Ning P. LAD: Localization Anomaly Detection for Wireless Sensor Networks [J]. Journal of parallel and distributed computing, 2006, 66(7): 874–886.

    Article  MATH  Google Scholar 

  8. Li Xiaohua, Chen Mo, Ratazzi E P. Array-Transmission Based Physical-Layer Security Techniques for Wireless Sensor Networks [C]// Proceedings of the IEEE International Conference on Mechatronics & Automation. Niagara Falls: IEEE Press, 2005: 1618–1623.

    Google Scholar 

  9. Tian Yuan, Ekici E. Cross-Layer Collaborative In-Network Processing in Multi-Hop Wireless Sensor Networks [J]. IEEE Trans Mobile Computing, 2007, 6(3): 297–310.

    Article  Google Scholar 

  10. Mudubai R, Barriac G, Madhow U. On the Feasibility of Distributed Beam Forming in Wireless Networks [J]. IEEE Trans Wireless Communications, 2007, 6(5): 1754–1763.

    Article  Google Scholar 

  11. Cui Shuguang, Goldsmith A J, Bahai A. Energy-Efficiency of MIMO and Cooperative MIMO Techniques in Sensor Networks [J]. IEEE J Sel Areas Commun, 2004, 22(6): 1089–1098.

    Article  Google Scholar 

  12. Yuan Yong, He Zhihai, Chen Min. Virtual MIMO-Based Cross Layer Design for Wireless Sensor Networks [J]. IEEE Transactions on Vehicular Technology, 2006, 55(3): 856–864.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianguo Ma.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60272014) and the National High Technology Research and Development Program of China (2005AA121520).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ma, J., Peng, B. Secure localization algorithm based on node cooperative for sensor networks. Wuhan Univ. J. Nat. Sci. 13, 636–640 (2008). https://doi.org/10.1007/s11859-008-0525-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0525-2

Key words

CLC number

Navigation