A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate th...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2017-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2017/3243570 |
id |
doaj-638ece64136140d1bac06d412a260224 |
---|---|
record_format |
Article |
spelling |
doaj-638ece64136140d1bac06d412a2602242021-07-02T01:25:35ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2017-01-01201710.1155/2017/32435703243570A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor NetworksGulshan Kumar0Mritunjay Kumar Rai1Hye-jin Kim2Rahul Saha3School of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, IndiaSchool of Electronics and Communication Engineering, Lovely Professional University, Phagwara, Punjab, IndiaBusiness Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of KoreaSchool of Computer Applications, Lovely Professional University, Phagwara, Punjab, IndiaLocalization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.http://dx.doi.org/10.1155/2017/3243570 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Gulshan Kumar Mritunjay Kumar Rai Hye-jin Kim Rahul Saha |
spellingShingle |
Gulshan Kumar Mritunjay Kumar Rai Hye-jin Kim Rahul Saha A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks Mobile Information Systems |
author_facet |
Gulshan Kumar Mritunjay Kumar Rai Hye-jin Kim Rahul Saha |
author_sort |
Gulshan Kumar |
title |
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks |
title_short |
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks |
title_full |
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks |
title_fullStr |
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks |
title_full_unstemmed |
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks |
title_sort |
secure localization approach using mutual authentication and insider node validation in wireless sensor networks |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2017-01-01 |
description |
Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes. |
url |
http://dx.doi.org/10.1155/2017/3243570 |
work_keys_str_mv |
AT gulshankumar asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT mritunjaykumarrai asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT hyejinkim asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT rahulsaha asecurelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT gulshankumar securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT mritunjaykumarrai securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT hyejinkim securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks AT rahulsaha securelocalizationapproachusingmutualauthenticationandinsidernodevalidationinwirelesssensornetworks |
_version_ |
1721344972694749184 |