Secured Source Location Privacy using Infrastructure Centric Method
Wireless Sensor Network attains the major issue of localization problems. The accuracy of the localization depends upon the localization of sensor nodes with the highest security requirements. The source network consists of two parts which is named as common nodes as well as beacon nodes. The localization process is highly depends upon the common nodes. The proposed method consists of infrastructure- centric technique. The proposed technique is used to secure locate the common nodes within the routing protocol. It consists of multi-hop localization technique. Many attackers comprises of many wireless network attacks which initiates many false beacons as well as many false location of the beacons. The proposed methodology will eliminate the security problem within the common nodes during the localization of sensor nodes of the protocol. The network consists of various random nodes which has the deployment as well as the mobility concern. The implemented protocol consists of Infrastructure-centric localization systems to secure the source node location. Further, our projected set of rules presents low overhead thanks to the employment of abundant less manipulate messages in an exceedingly restricted transmission selection. Similarly, we've got to boot projected an formula to return across the malicious anchor nodes within the network. The simulated effects show that our projected formula is inexperienced in phrases of your time consumption, localization accuracy, and localization magnitude relation inside the presence of malicious nodes. Time Difference of Arrival (TDOA) is the major factor indicating the location of nodes at the required position. The performance of the metrics can be analyzed using the energy calculation, alive and dead nodes during the transmission.
C. Avin and C. Brito. Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2004.
P. Bahl and V. N. Padmanabhan. RADAR: An In-Building RF-Based User Location and Tracking System. In Proceedings of InfoCom, 2000.
S. Bergbreiter and K. S. J. Pister. CotsBots: An Off-the-Shelf Platform for Distributed Robotics. In Proceedings of IROS, 2003.
S. Brands and D. Chaum. Distance-bounding protocols. In Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 344–359. Springer-Verlag New York, Inc., 1994.
N. Bulusu, J. Heidemann, and D. Estrin. GPS-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7(5):28–34, October 2000.
P. Castro, P. Chiu, T. Kremenek, and R. Muntz. A Probabilistic Room Location Service for Wireless Networked Environments. In Proceedings of the Third International Conference Atlanta Ubiquitous Computing (Ubicomp), volume 2201. Springer-Verlag Heidelberg, September 2001.
Haowen Chan, Mark Luk, and Adrian Perrig. Using Clustering Information for Sensor Network Localization. In Proceedings of IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2005),June 2005.
S. Capkun, M. Hamdi, and J.-P. Hubaux. GPS-free Positioning in Mobile ˇAd-Hoc Networks. Cluster Computing, April 2002.
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices ˇ with application to sensor networks. In Proceedings of InfoCom,2005.
S. Capkun, J.-P. Hubaux, and L. Butty ˇ an. Mobility Helps Peer-to-Peer ´ Security. IEEE Transactions on Mobile Computing, to appear 2005.
K. Dantu, M. H. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. Sukhatme. Robomote: Enabling mobility in sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks, 2005.
L. Doherty, K. Pister, and L. El Ghaoui. Convex position estimation in wireless sensor networks. In Proceedings of InfoCom, April 2001.
T. Eren, D. Goldenberg, W. Whiteley, Y.R. Yang, A.S. Morse, B.D.O. Anderson, and P.N. Belhumeur. Rigidity, computation, and randomization in network localization. In Proceedings of InfoCom, 2004.
R.J. Fontana. Experimental Results from an Ultra Wideband Precision Geolocation System. Ultra-Wideband, Short-Pulse Electromagnetics, May 2000.
R.J. Fontana, E. Richley, and J. Barney. Commercialization of an Ultra Wideband Precision Asset Location System. In IEEE Conference on Ultra Wideband Systems and Technologies, November 2003.
J. Friedman, D. Lee, I. Tsigkogiannis, S. Wang, D. Chao, D. Levin,M. Srivastava, and W. Kaiser. Ragobot: A New Hardware Platform for Research in Wireless Mobile Sensor Networks. In Proceedings of International Conference on Distributed Computing in Sensor Systems,2005.
I. Getting. The Global Positioning System. IEEE Spectrum, December1993.
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In Proceedings of WMASH, 2003.
J. Hightower, G. Boriello, and R. Want. SpotON: An indoor 3D Location Sensing Technology Based on RF Signal Strength. Technical Report 2000-02-02, University of Washington, 2000.
L. Hu and D. Evans. Localization for mobile sensor networks. In Proceedings of MobiCom, 2004.
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of InfoCom, 2003.
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Enhancing Wireless Location Privacy Using Silent Period. In Proceedings of the IEEE Wireless Communications and Networking Conference(WCNC), 2005.
J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In Proceedings of MobiHoc, 2003.
M. G. Kuhn. An Asymmetric Security Mechanism for Navigation Signals. In Proceedings of the Information Hiding Workshop, 2004.
L. Lazos, S. Capkun, and R. Poovendran. ROPE: Robust Position ˇ Estimation in Wireless Sensor Networks. In Proceedings of IPSN, 2005.
J.-Y. Lee and R.A. Scholtz. Ranging in a Dense Multipath Environment Using an UWB Radio Link. IEEE Journal on Selected Areas in Communications, 20(9), December 2002.
Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.
D. Liu, P. Ning, and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.
D. Moore, J. Leonard, D. Rus, and S. Teller. Robust distributed network localization with noisy range measurements. In Proceedings of the ACM Conference on Networked Sensor Systems (SenSys), pages 50–61. ACM Press, 2004.
L. Navarro-Serment, R. Grabowski, C. Paredis, and P.K. Khosla. Modularity in Small Distributed Robots. In Proceedings of the SPI conference on Sensor Fusion and Decentralized Control in Robotic Systems II, 1999.
D. Niculescu and B. Nath. Ad hoc positioning system (aps) using aoa. In Proceedings of InfoCom, 2003.
D. Niculescu and B. Nath. DV Based Positioning in Ad hoc Networks. Journal of Telecommunication Systems, 22(4):267–280, 2003.
V. Van Nostrand. Mathematics of Statistics. Princeton, NJ, 1962.
N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket location-support system. In Proceedings of MobiCom, 2000.
A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. Pervasive Computing, January-March 2003.
I. W. Jackson. Anonymous Addresses and Confidentiality of Location. In Proceedings of International Workshop on Information Hiding, 1996.
M. G. Kendall and P.A.P. Moran. Geometrical Probability. Hafner, New York, 1963.
R. C. Shah, S. Roy, S. Jain, and W. Brunette. Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks. In Proceedings of the IEEE Workshop on Sensor Network Protocols and Applications (SNPA), May 2003.
Y.-C. Hu and H. J. Wang. Location Privacy in Wireless Networks. In Proceedings of the ACM SIGCOMM Asia Workshop, 2005.
N. Sastry, U. Shankar, and D. Wagner. Secure Verification of Location claims. In Proceedings of the ACM Workshop on Wireless Security (WiSe), pages 1–10. ACM Press, September 2003
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.