Skip to main content
Log in

A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks

  • Original Article
  • Published:
Journal of Electrical Engineering & Technology Aims and scope Submit manuscript

Abstract

Localization technology is crucial in wireless sensor networks (WSN) by forming the basis of various WSN applications. With the advancements of WSN, WSN attacks for node localization have increasingly become an important security issue. The Sybil attack is an example of such attacks where a reputation system is subverted by creating multiple pseudonymous identities. In this paper, a detection and defense algorithm against Sybil attacks based on the distance vector-hop (DV-Hop) method is presented. Experimental results show that the algorithm can effectively improve the security of the node localization in WSN. When the number of beacon nodes is 50, our proposed algorithm reduces the average localization error by 3% than the traditional DV-Hop.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Dan PYW (2011) A review: wireless sensor networks localization. J Electron Measure Instrum 25(5):389–399

    Article  Google Scholar 

  2. Martirosyan A, Boukerche A (2016) Lip: an efficient lightweight iterative positioning algorithm for wireless sensor networks. Wireless Netw 22(3):825–838

    Article  Google Scholar 

  3. Ren H, Meng MQ-H (2009) Power adaptive localization algorithm for wireless sensor networks using particle filter. IEEE Trans Veh Technol 58(5):2498–2508

    Article  Google Scholar 

  4. Garciaotero M, Poblacion A, Fernandez-Herrero A, Herrera Guardado A (2012) Performance of robust algorithms for secure localization in wireless sensor networks. In: 2012 International conference on localization and GNSS. IEEE, pp 1–4

  5. Huang W, Wang Y, Guan H (2009) The current situation and prospect of localization inwireless sensor network. In: Second international workshop on computer science and engineering. WCSE’09, vol. 1, IEEE. pp 483–487

  6. Kalnoor G, Agarkhed J (2016) Qos based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In: 2016 International conference on circuit, power and computing technologies (ICCPCT). IEEE, pp 1–6

  7. Wu F, Xu L, Kumari S, Li X (2018) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw Appl 11(1):1–20

    Article  Google Scholar 

  8. Jamshidi M, Zangeneh E, Esnaashari M, Darwesh AM, Meybodi MR (2019) A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Pers Commun 105(1):145–173

    Article  Google Scholar 

  9. Rajan A, Jithish J, Sankaran S(2017) Sybil attack in IOT: modeling and defenses. In 2017 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2323–2327

  10. Chen H, Lou W, Wang Z (2015) On providing wormhole attack resistant localization using conflicting sets. Wirel Commun Mob Comput 15(15):1865–1881

    Article  Google Scholar 

  11. Luo J, Han S, Lu YL (2015) Research on hop-based secure positioning algorithm in wsn. Appl Mech Mater 738:1193–1196

    Article  Google Scholar 

  12. Mofarreh-Bonab M, Ghorashi SA (2013) A low complexity and high speed gradient descent based secure localization in wireless sensor networks. In: 3th International e-conference on computer and knowledge engineering (ICCKE), 2013. IEEE, pp 300–303

  13. Suo H, Wan J, Huang L, Zou C (2012) Issues and challenges of wireless sensor networks localization in emerging applications. In: International conference on computer science and electronics engineering (ICCSEE), 2012, vol 3. IEEE, pp 447–451

  14. Wang D, Yang L (2012) Cooperative robust localization against malicious beacons based on semi definite programming. In: MILCOM 2012-2012 IEEE military communications conference. IEEE, pp 1–6

  15. Dong Shi, Qi Yingchun (2015) MPDV-HOP: an improved localization algorithm for wireless sensor networks. Wseas Trans Commun 14:390–398

    Google Scholar 

  16. Abdelkarim A, Benslimane A, Mabrouki I, Belghith A (2012) Secatdist: a novel secure at-dist localization scheme for wireless sensor networks. In: Vehicular technology conference (VTC Fall), 2012 IEEE. IEEE, pp 1–5

  17. Patel MM, Aggarwal A (2013) Security attacks in wireless sensor networks: a survey. In: International conference on intelligent systems and signal processing (ISSP), 2013. IEEE, pp 329–333

  18. Niculescu D, Nath B (2003) Dv based positioning in ad hoc networks. Telecommun Syst 22(1–4):267–280

    Article  Google Scholar 

  19. Capkun S, Hubaux J-P (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings IEEE 24th annual joint conference of the IEEE computerand communications societies vol 3. IEEE, pp 1917–1928

  20. Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835

    Article  Google Scholar 

  21. Capkun S, Srivastava M, Cagalj M (2006) Securing localization with hidden and mobile base stations. In: IEEE conference on computer communications (INFOCOM)

  22. Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In IEEE international conference on mobile adhoc and sensor systems conference, 2005. IEEE, p 9

  23. Lazos L, Poovendran R (2004) Serloc: secure range-independent localization for wireless sensor networks. In: Proceedings of the 3rd ACM workshop on wireless security. ACM, pp 21–30

  24. Lazos L, Poovendran R, Capkun S (2005) Rope: robust position estimation in wireless sensor networks. In: Proceedings of the 4th international symposium on Information processing in sensor networks. IEEE Press, p 43

  25. Lazos L, Poovendran R (2006) Hirloc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233–246

    Article  Google Scholar 

  26. Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: 2006 IEEE international conference on communications vol 8. IEEE, pp 3485–3490

  27. Chen H, Lou W, Sun X, Wang Z (2010) A secure localization approach against wormhole attacks using distance consistency. EURASIP J Wirel Commun Netw. https://doi.org/10.1155/2010/627039

    Article  Google Scholar 

  28. Zhang T, He J, Li X, Zhang Y (2012) A novel secure localization scheme for wireless sensor networks. J Converg Inf Technol 7(5):10–16

    Google Scholar 

  29. Niculescu D, Nath B (2003) Localized positioning in ad hoc networks. Ad Hoc Netw 1(2):247–259

    Article  Google Scholar 

  30. Dong Q, Xu X (2014) A novel weighted centroid localization algorithm based on RSSI for an outdoor environment [J]. J Commun 9(3):279–285

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their comments which helped us to improve the quality of the paper.

Funding

This paper is supported by Key Scientific and Technological Research Projects in Henan Province (Grant No. 192102210125).

Author information

Authors and Affiliations

Authors

Contributions

All authors have contributed to the design and evaluation of the schemes and the writing of the manuscript. All authors have read and approved the final manuscript.

Corresponding author

Correspondence to Shi Dong.

Ethics declarations

Conflict of interest

The authors of the paper certify that they have no affiliations with or involvement in any organization or entity with any financial interest.

Declarations

Data sharing is not applicable to this article as no real-world datasets were acquired or analyzed during the current study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dong, S., Zhang, Xg. & Zhou, Wg. A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks. J. Electr. Eng. Technol. 15, 919–926 (2020). https://doi.org/10.1007/s42835-020-00361-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42835-020-00361-5

Keywords

Navigation