A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate th...

Full description

Bibliographic Details
Main Authors: Gulshan Kumar, Mritunjay Kumar Rai, Hye-jin Kim, Rahul Saha
Format: Article
Language:English
Published: Hindawi Limited 2017-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2017/3243570
id doaj-638ece64136140d1bac06d412a260224
record_format Article
spelling doaj-638ece64136140d1bac06d412a2602242021-07-02T01:25:35ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2017-01-01201710.1155/2017/32435703243570A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor NetworksGulshan Kumar0Mritunjay Kumar Rai1Hye-jin Kim2Rahul Saha3School of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, IndiaSchool of Electronics and Communication Engineering, Lovely Professional University, Phagwara, Punjab, IndiaBusiness Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of KoreaSchool of Computer Applications, Lovely Professional University, Phagwara, Punjab, IndiaLocalization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.http://dx.doi.org/10.1155/2017/3243570
collection DOAJ
language English
format Article
sources DOAJ
author Gulshan Kumar
Mritunjay Kumar Rai
Hye-jin Kim
Rahul Saha
spellingShingle Gulshan Kumar
Mritunjay Kumar Rai
Hye-jin Kim
Rahul Saha
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
Mobile Information Systems
author_facet Gulshan Kumar
Mritunjay Kumar Rai
Hye-jin Kim
Rahul Saha
author_sort Gulshan Kumar
title A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
title_short A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
title_full A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
title_fullStr A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
title_full_unstemmed A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
title_sort secure localization approach using mutual authentication and insider node validation in wireless sensor networks
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2017-01-01
description Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.
url http://dx.doi.org/10.1155/2017/3243570
work_keys_str_mv AT gulshankumar asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT mritunjaykumarrai asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT hyejinkim asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT rahulsaha asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT gulshankumar securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT mritunjaykumarrai securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT hyejinkim securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
AT rahulsaha securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks
_version_ 1721344972694749184