A Distributed Secured Localization Scheme for Wireless Sensor Networks
Nowadays, location-aware security policies play a key role in wireless sensor networks. In this paper, we propose to develop a distributed secured localization scheme that validates the reliability of location information associated with event reports. We make the anchor nodes are deployed such that they form connected sensor coverage and their routing information to these anchor nodes, thereby avoiding the sink overload problem. Since this scheme involves distributed anchor nodes for verification, it has less overhead and delay. By simulation results, we show that our proposed scheme attains good delivery ratio with reduced delay and overhead.
KeywordsSecurity issues on localization Anchor nodes Coverage algorithm
- 1.Alfaro, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of the Seventh Annual Communication Networks and Services Research Conference (2009)Google Scholar
- 2.Chen, H., et al.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wireless Commun. Networking 2010, 8 (2010)Google Scholar
- 3.Soosahabi, R., Naraghi-Pour, M., Perkins, D., Bayoumi, M.A.: Optimal probabilistic encryption for secure detection in wireless sensor networks information forensics and security. IEEE Transactions on Digital Object Identifier, vol. 9, PP. 375–385 (2014). doi: 10.1109/TIFS.2014.2298813
- 5.Elbasi, E., Ozdemir, S.: Secure data aggregation in wireless multimedia sensor networks via watermarking. In: Application of Information and Communication Technologies (AICT), 2012 6th International Conference on Digital Object Identifier, PP. 1–6 (2012). doi: 10.1109/ICAICT.2012.6398501
- 6.Ben Othman, S., Alzaid, H., Trad, A., Youssef, H.: An efficient secure data aggregation scheme for wireless sensor networks. In: Information, Intelligence, Systems and Applications (IISA), 2013 4th International Conference on Digital Object Identifier, PP. 1–4 (2013). doi: 10.1109/IISA.2013.6623701