Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Probabilistic Location Verification for Wireless Sensor Networks

R. VidhyaLakshmi, G. Surya

Abstract


Security is one of the important factors for any Wireless Sensor Networks application. Location verification system provides that security for retrieving data from Wireless Sensor Networks application. Previous System requires group deployment knowledge of sensors or depends on highly expensive, dedicated hardware because of these requirement it is very expensive. In this paper location verification system with trusted token analyzer and Attack resistant location estimation scheme in secure manner is proposed. This system provides highly feasible true location estimation of sensor node with low cost and reduces false estimation due to attacks such as malicious attack, wormhole attack, pollution attack etc.

Keywords


Beacon Node, Claimed Location, Malicious Attack, Wormhole Attack.

Full Text:

PDF

References


Yawen Wei, Student Member, IEEE, and Yong Guan, Member, IEEE, “Lightweight Location Verification Algorithms for Wireless Sensor Networks,” IEEE Trans.parallel and Distributed systems, vol. 24, no. 5,may 2013.

Jinfang Jiang, Guangjie Han1, Chuan Zhu1, Yuhui Dong and Na Zhang , “Secure Localization in Wireless Sensor Networks: A Survey,” JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 6, SEPTEMBER 2011

B. Karp and H. T. Kung, “GPSR: Greedy Perimeter Stateless Routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Network, 2000, pp. 243–354.

D. Liu and P. Ning, “Location-based pairwise key establishments for static sensor networks,” in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 72–82.

S. U. Sastry, N. and D. Wagner, “Secure verification of location claims,” in Proceedings of the 2nd ACM workshop on Wireless security, September 2003.

J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor networks: a survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, August 2008.

Ting ZHANG, Jingsha HE, Yang ZHANG, Yuqiang ZHANG and Xiaoyu SONG,” DV-based Robust Localization against Wormhole Attacks in Wireless Sensor Networks”, Journal of Computational Information Systems 7: 13 (2011) 4732-4739.

Manoop Talasila, Reza Curtmola, and Cristian Borcea,” LINK: Location verification through immediate Neighbors Knowledge,” Computer Science Department New Jersey Institute of Technology Newark, NJ, USA.

Tingting Sun, Bin Zan, Yanyong Zhang and Marco Gruteser, “The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks , “IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 7, JULY 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.