Advertisement

Impact of Various Networks Security Attacks on Wireless Sensor Localization Algorithms Based upon WSN Node’s Residual Energy

  • Santosh SoniEmail author
  • Manish Shrivastava
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 34)

Abstract

Presently, wireless sensor network localization algorithms attracted various researchers toward research study and experiments . The location of nodes can be determined by various localization algorithms. These wireless sensor network localization algorithms are vulnerable and can be compromised for their security. There are various network security attacks like wormhole, impersonation, compromise, and duplicate attacks which degrade the performance of WSNs. In this research paper, under various network security attacks, we have tested wireless sensor network localization algorithms under certain performance matrices like mobility of WSN node’s, size of packets, temperature, and node density to find out the compromised WSN node’s residual energy. The simulation result shows how these localization algorithms are vulnerable to network security attacks.

Keywords

Wireless sensor network WSN localization algorithms Network security attacks 

References

  1. 1.
    Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31, ACM (2016)Google Scholar
  2. 2.
    Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Secure localization algorithms for wireless sensor networks. IEEE Commun. Mag. 08, 96–101 (2008)Google Scholar
  3. 3.
    Güvenc, I., Chong, C.-C.: A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Commun. Surv. Tutor. 11(3), 107–124 (2009)CrossRefGoogle Scholar
  4. 4.
    Nick, I., Paprotny, I.: Review and comparison of spatial localization methods for low power wireless sensor networks. IEEE Sens. J. 15(10), 5971–5987 (2015)CrossRefGoogle Scholar
  5. 5.
    Goyal, S., Bhatia, T., Verma, A.K.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1463–1468, INDIACom (2015)Google Scholar
  6. 6.
    Meena, T., Nishanthy, M., Kamalanaban, E.: Cluster-based mechanism for multiple spoofing Attackers in WSN. In: International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–5 (2014)Google Scholar
  7. 7.
    Huang, X., Ahmed, M., Sharma, D.: Protecting from inside attacks in wireless sensor networks. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, NSW, pp. 186–191, IEEE, New York (2011)Google Scholar
  8. 8.
    Mesmoudi, Asma, Feham, Mohammed, Labraoui, Nabila: Wireless sensor networks localization algorithms: a comprehensive survey. Int. J. Comput. Netw. Commun. (IJCNC) 5(6), 45–64 (2013)Google Scholar
  9. 9.
    Yang, W., Zhu, W.T.: Voting-on-grid clustering for secure localization in wireless sensor networks. IEEE ICC 2010 Proceedings, pp. 01–05, IEEE, New York (2010)Google Scholar
  10. 10.
    Hong, S.H., Kim, B.K., Eom, D.S.: Localization algorithm in wireless Sensor networks with network mobility. IEEE Trans. Consum. Electron. 55(4), 1921–1928 (2009)CrossRefGoogle Scholar
  11. 11.
    Dai, H., Chen, A.G., Gu, X.F., He, L.: Localization algorithm for large-scale and low-density Wireless sensor networks. Electron. Lett. 47(15), 881–883 (2011)CrossRefGoogle Scholar
  12. 12.
    Yu, K., Guo, Y.J.: Anchor-free localization algorithm and performance analysis in wireless sensor Networks. IET Commun. 3(4), 549–560 (2009)CrossRefGoogle Scholar
  13. 13.
    Zhang, Y., Wu, W., Chen, Y.: A range based localization algorithm for wireless sensor networks. J. Commun. Netw. 7(4), 429 (2005)CrossRefGoogle Scholar
  14. 14.
    Shaukat, H.R., Hashim, F., Sali, A., Fadlee Abdul Rasid, M.: Node replication attacks in mobile wireless sensor network: a survey. Int. J. Distrib. Sens. Netw. 2014(Article ID 402541), 01–15 (2014)Google Scholar
  15. 15.
    Lin, Z.-T., Qu, Y.-G., Jing, L., Zhao, B.-H.: AP Web Workshops 2006 Compromised Nodes in Wireless Sensor Network, pp. 224–230, Springer, New York (2006)Google Scholar
  16. 16.
  17. 17.
    Han, G., Jiang, J., Zhang, C., Duong, T.Q., Guizani, M., Karagiannidis, G.K.: A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(3), 2220–2243 (2016)CrossRefGoogle Scholar
  18. 18.
    Chen, L.: Distributed range-free localization algorithm for Wireless Sensor networks. Electron. Lett. 50(12), 894–896 (2014)CrossRefGoogle Scholar
  19. 19.
    Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: GLOBECOM 2009—2009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1–6, IEEE, New York (2009)Google Scholar
  20. 20.
    Messai, M.-L.: Classification of attacks in wireless sensor networks. In: International Congress on Telecommunication and Application’14 University of A.MIRA Bejaia, Algeria, pp. 23–24 (2014)Google Scholar
  21. 21.
    Bharath Srinivas, V.: Spoofing attacks in wireless sensor networks. IJCSET 3(6), 201–210 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of IT, Institute of TechnologyGuru Ghasidas VishwavidyalayaBilaspurIndia
  2. 2.Department of CSE, Institute of TechnologyGuru Ghasidas VishwavidyalayaBilaspurIndia

Personalised recommendations