A Distributed Secured Localization Scheme for Wireless Sensor Networks

  • Lakshmana Phaneendra Maguluri
  • Shaik Mahaboob Basha
  • S. Ramesh
  • Md Amanatulla
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 309)

Abstract

Nowadays, location-aware security policies play a key role in wireless sensor networks. In this paper, we propose to develop a distributed secured localization scheme that validates the reliability of location information associated with event reports. We make the anchor nodes are deployed such that they form connected sensor coverage and their routing information to these anchor nodes, thereby avoiding the sink overload problem. Since this scheme involves distributed anchor nodes for verification, it has less overhead and delay. By simulation results, we show that our proposed scheme attains good delivery ratio with reduced delay and overhead.

Keywords

Security issues on localization Anchor nodes Coverage algorithm 

References

  1. 1.
    Alfaro, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of the Seventh Annual Communication Networks and Services Research Conference (2009)Google Scholar
  2. 2.
    Chen, H., et al.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wireless Commun. Networking 2010, 8 (2010)Google Scholar
  3. 3.
    Soosahabi, R., Naraghi-Pour, M., Perkins, D., Bayoumi, M.A.: Optimal probabilistic encryption for secure detection in wireless sensor networks information forensics and security. IEEE Transactions on Digital Object Identifier, vol. 9, PP. 375–385 (2014). doi:  10.1109/TIFS.2014.2298813
  4. 4.
    Shih, K.P., Deng, D.J., Chang, R.S., Chen, H.C.: On connected target coverage for wireless heterogeneous sensor networks with multiple sensing units. Sensors 2009(9), 5173–5200 (2009). doi: 10.3390/s90705173 CrossRefGoogle Scholar
  5. 5.
    Elbasi, E., Ozdemir, S.: Secure data aggregation in wireless multimedia sensor networks via watermarking. In: Application of Information and Communication Technologies (AICT), 2012 6th International Conference on Digital Object Identifier, PP. 1–6 (2012). doi:  10.1109/ICAICT.2012.6398501
  6. 6.
    Ben Othman, S., Alzaid, H., Trad, A., Youssef, H.: An efficient secure data aggregation scheme for wireless sensor networks. In: Information, Intelligence, Systems and Applications (IISA), 2013 4th International Conference on Digital Object Identifier, PP. 1–4 (2013). doi:  10.1109/IISA.2013.6623701

Copyright information

© Springer India 2015

Authors and Affiliations

  • Lakshmana Phaneendra Maguluri
    • 1
  • Shaik Mahaboob Basha
    • 2
  • S. Ramesh
    • 2
  • Md Amanatulla
    • 3
  1. 1.Department of Computer Science and EngineeringGudlavalleru Engineering CollegeKrishna DistrictIndia
  2. 2.Department of Computer Science and EngineeringSree Vahini Institute of Science & TechnologyKrishna DistrictIndia
  3. 3.Department of Computer Science and EngineeringNimra Institute of Science & TechnologyKrishna DistrictIndia

Personalised recommendations