Abstract
Localization technology is crucial in wireless sensor networks (WSN) by forming the basis of various WSN applications. With the advancements of WSN, WSN attacks for node localization have increasingly become an important security issue. The Sybil attack is an example of such attacks where a reputation system is subverted by creating multiple pseudonymous identities. In this paper, a detection and defense algorithm against Sybil attacks based on the distance vector-hop (DV-Hop) method is presented. Experimental results show that the algorithm can effectively improve the security of the node localization in WSN. When the number of beacon nodes is 50, our proposed algorithm reduces the average localization error by 3% than the traditional DV-Hop.
Similar content being viewed by others
References
Dan PYW (2011) A review: wireless sensor networks localization. J Electron Measure Instrum 25(5):389–399
Martirosyan A, Boukerche A (2016) Lip: an efficient lightweight iterative positioning algorithm for wireless sensor networks. Wireless Netw 22(3):825–838
Ren H, Meng MQ-H (2009) Power adaptive localization algorithm for wireless sensor networks using particle filter. IEEE Trans Veh Technol 58(5):2498–2508
Garciaotero M, Poblacion A, Fernandez-Herrero A, Herrera Guardado A (2012) Performance of robust algorithms for secure localization in wireless sensor networks. In: 2012 International conference on localization and GNSS. IEEE, pp 1–4
Huang W, Wang Y, Guan H (2009) The current situation and prospect of localization inwireless sensor network. In: Second international workshop on computer science and engineering. WCSE’09, vol. 1, IEEE. pp 483–487
Kalnoor G, Agarkhed J (2016) Qos based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In: 2016 International conference on circuit, power and computing technologies (ICCPCT). IEEE, pp 1–6
Wu F, Xu L, Kumari S, Li X (2018) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw Appl 11(1):1–20
Jamshidi M, Zangeneh E, Esnaashari M, Darwesh AM, Meybodi MR (2019) A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Pers Commun 105(1):145–173
Rajan A, Jithish J, Sankaran S(2017) Sybil attack in IOT: modeling and defenses. In 2017 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2323–2327
Chen H, Lou W, Wang Z (2015) On providing wormhole attack resistant localization using conflicting sets. Wirel Commun Mob Comput 15(15):1865–1881
Luo J, Han S, Lu YL (2015) Research on hop-based secure positioning algorithm in wsn. Appl Mech Mater 738:1193–1196
Mofarreh-Bonab M, Ghorashi SA (2013) A low complexity and high speed gradient descent based secure localization in wireless sensor networks. In: 3th International e-conference on computer and knowledge engineering (ICCKE), 2013. IEEE, pp 300–303
Suo H, Wan J, Huang L, Zou C (2012) Issues and challenges of wireless sensor networks localization in emerging applications. In: International conference on computer science and electronics engineering (ICCSEE), 2012, vol 3. IEEE, pp 447–451
Wang D, Yang L (2012) Cooperative robust localization against malicious beacons based on semi definite programming. In: MILCOM 2012-2012 IEEE military communications conference. IEEE, pp 1–6
Dong Shi, Qi Yingchun (2015) MPDV-HOP: an improved localization algorithm for wireless sensor networks. Wseas Trans Commun 14:390–398
Abdelkarim A, Benslimane A, Mabrouki I, Belghith A (2012) Secatdist: a novel secure at-dist localization scheme for wireless sensor networks. In: Vehicular technology conference (VTC Fall), 2012 IEEE. IEEE, pp 1–5
Patel MM, Aggarwal A (2013) Security attacks in wireless sensor networks: a survey. In: International conference on intelligent systems and signal processing (ISSP), 2013. IEEE, pp 329–333
Niculescu D, Nath B (2003) Dv based positioning in ad hoc networks. Telecommun Syst 22(1–4):267–280
Capkun S, Hubaux J-P (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings IEEE 24th annual joint conference of the IEEE computerand communications societies vol 3. IEEE, pp 1917–1928
Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835
Capkun S, Srivastava M, Cagalj M (2006) Securing localization with hidden and mobile base stations. In: IEEE conference on computer communications (INFOCOM)
Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In IEEE international conference on mobile adhoc and sensor systems conference, 2005. IEEE, p 9
Lazos L, Poovendran R (2004) Serloc: secure range-independent localization for wireless sensor networks. In: Proceedings of the 3rd ACM workshop on wireless security. ACM, pp 21–30
Lazos L, Poovendran R, Capkun S (2005) Rope: robust position estimation in wireless sensor networks. In: Proceedings of the 4th international symposium on Information processing in sensor networks. IEEE Press, p 43
Lazos L, Poovendran R (2006) Hirloc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233–246
Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: 2006 IEEE international conference on communications vol 8. IEEE, pp 3485–3490
Chen H, Lou W, Sun X, Wang Z (2010) A secure localization approach against wormhole attacks using distance consistency. EURASIP J Wirel Commun Netw. https://doi.org/10.1155/2010/627039
Zhang T, He J, Li X, Zhang Y (2012) A novel secure localization scheme for wireless sensor networks. J Converg Inf Technol 7(5):10–16
Niculescu D, Nath B (2003) Localized positioning in ad hoc networks. Ad Hoc Netw 1(2):247–259
Dong Q, Xu X (2014) A novel weighted centroid localization algorithm based on RSSI for an outdoor environment [J]. J Commun 9(3):279–285
Acknowledgements
The authors would like to thank the anonymous reviewers for their comments which helped us to improve the quality of the paper.
Funding
This paper is supported by Key Scientific and Technological Research Projects in Henan Province (Grant No. 192102210125).
Author information
Authors and Affiliations
Contributions
All authors have contributed to the design and evaluation of the schemes and the writing of the manuscript. All authors have read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors of the paper certify that they have no affiliations with or involvement in any organization or entity with any financial interest.
Declarations
Data sharing is not applicable to this article as no real-world datasets were acquired or analyzed during the current study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dong, S., Zhang, Xg. & Zhou, Wg. A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks. J. Electr. Eng. Technol. 15, 919–926 (2020). https://doi.org/10.1007/s42835-020-00361-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42835-020-00361-5