International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

A Survey on Secure Range Based Localization Algorithms in Wireless Sensor Networks

Author Affiliations

  • 1Faculty of Electrical Engineering, University Teknologi Malaysia, UTM Skudai, Johor 81310, MALAYSIA
  • 2 University of Technology, Baghdad, IRAQ

Res. J. Recent Sci., Volume 3, Issue (11), Pages 103-109, November,2 (2014)

Abstract

Localization refers to locating the position or area in which the sensor or object to be tracked. Based on the localization, many applications are emerging in the sensor network. Localization schemes are broadly divided into Range based and Range free. As localization is becoming popular, many attacks on the localization process are also on a rise. These attacks confuse the localization process and cause location estimation errors. The Range Based and Range free localization methods are available for obtaining the location of the sensor nodes. One of main challenge in localization is that the process can be made erroneous by launching various attacks. In this paper, we analyze the attacks on the Range Based methods and survey the current work on attack detection and resolution.

References

  1. Morteza J, Hossein M, Kasra M and Mohammad F., A Method in Security of Wireless Sensor Network based on Optimized Artificial immune system in Multi-Agent Environments, Res. J. Recent Sci., 10), 99–106 ( 2013)
  2. Mao G. and Fidan B., Localization Algorithms and Strategies for Wireless Sensor Networks; United States of America by Information Science Reference IGI Global (2009)
  3. Wang J., Ghosh R.K. and Das S.K., A survey on sensor localization., J. Control Theory Appl., 8, 2–11 (2010)
  4. Youssef A and Youssef M., A Taxonomy of Localization Schemes for Wireless Sensor Networks ,International Conference on Wireless Networks (ICWN’07), Las Vegas, Nevada, 25–28 (2007)
  5. Ding X, Zhao H, Zhu J, Zhang K and Li D., A Novel Localization Algorithm Based on RSSI for Wireless Sensor Networks, 7th Int. Conf. Wirel. Commun. Netw. Mob. Comput.1(4), 23–25 (2011)
  6. Paramvir B. and Venkata N.P., RADAR : An in-building RF-based user location and tracking system, In IEEE International Conference on Computer Communications (INFOCOM), 775–784 (2000)
  7. Elnahrawy E. and Martin R.P., The limits of localization using signal strength: a comparative study , First Annu. IEEE Commun. Soc. Conf. Sens. Ad Hoc Commun. Networks, 406–414 (2004)
  8. Afzal S., A Review of Localization Techniques for Wireless Sensor Networks, Journal of Basic and Applied Scientific Research,, 7795–7801 (2012)
  9. Alrajeh N.A., Bashir M. and Shams B., Localization Techniques in Wireless Sensor Networks, Int. J. Distrib. Sens. Networks, 1–9 (2013)
  10. Fink A, Beikirch H., Analysis of RSS-based Location Estimation Techniques in Fading Environments., International Conference on Indoor Positioning And Indoor Navigation (IPIN), 21–23 (2011)
  11. Yang Jie and Ying Y.C., Toward attack-resistant localization under infrastructure attacks, Security and Communication Networks,5(4), 384–403 (2011)
  12. Neve KN, Phegade SG and Kirange DY., Secure Localization : The Review on Possible Attacks of WSN and Their Remedy, Int. J. Eng. Res. Technol., 2(8), 2085–2090 (2013)
  13. Zhu WT, Xiang Y, Zhou J, Deng RH and Bao F, Secure localization with attack detection in wireless sensor networks, Int. J. Inf. Secur., 10(3), 155–171 (2011)
  14. Chen Y., Kleisouris K., Li X., Trappe W. and Martin R.P.,A security and robustness performance analysis of localization algorithms to signal strength attacks, ACM Trans. Sens. Networks, 5, 1–37 (2009)
  15. Chen Y., Yang J., Member S., Trappe W. and Martin R.P., Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks, IEEE Transactions on vehicular Technology, 59(5), 2418–2434 (2010)
  16. Poblaciσn A., Performance of Robust Algorithms for Secure Localization in Wireless Sensor Networks,International Conference on Localization and GNSS,1(4), 25-27(2012)
  17. Chen Y. ,Trappe W. and Martin R., Attack Detection in Wireless Localization, In 26th IEEE International Conference on Computer Communications, 1964, 1972 (2007)
  18. Trappe W. and Nath B., Robust statistical methods for securing wireless localization in sensor networks, Fourth Int. Symp. Inf. Process. Sens. Networks, 91–98, (2005)
  19. Lazos L. and Poovendran R., SeRLoc: Robust Localization for Wireless Sensor Networks, ACM Transactions on Sensor Networks, 1(1), 73–100, (2005)
  20. Lazos L., Poovendran R., HiRLoc: high-resolution robust localization for wireless sensor networks, IEEE J. Sel. Areas Commun., 24), 233–246 (2006)
  21. Capkun S. and Hubaux J., Secure positioning of wireless devices with application to sensor networks, Proc. IEEE 24th Annu. Jt. Conf. IEEE Comput. Commun. Soc., , 13-17 (2005)
  22. Guangjie H., Jinfang J., Lei S., mohsen G. and Shojiro N., A Two-Step Secure Localization for Wireless Sensor Networks, The computer Journal,56(10), 1154–1166 (2012)
  23. Jian L., Yang Z. and Liu Y, Beyond Triangle Inequality : Sifting Noisy and Outlier Distance Measurements for Localization, Proc. IEEE INFOCOM, 1(9), 14-19 (2010)
  24. Li X., Chen Y., Yang J. and Zheng X., Achieving robust wireless localization resilient to signal strength attacks, Wireessl Networks 18(1), 45–58, (2012)
  25. Zheng X., Liu H., Yang J., Chen Y., Francisco J., Martin R. and Li X, Characterizing the impact of multi-frequency and multi-power on localization accuracy, 7th IEEE Int. Conf. Mob. Ad-hoc Sens. Syst., 156–165 (2010)
  26. Xiaoyan Li and Martin R., Simple algorithm aggregation improves signal strength based localization, In 3rd International Symposium on Wireless Pervasive Computing, 540 (544),7-9 (2008)
  27. Xiao L., Yin Y., Wu X. and Wang J., A Large-scale RF-based Indoor Localization System Using Low-complexity Gaussian Filter and Improved Bayesian Inference, Radioengineering Journal, 22(1), 371–380(2013)
  28. Jadliwala M. , Upadhyaya S.J. and Hubaux J., Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes, IEEE Trans. Mob. Comput.,9(6), 810–823 (2010)
  29. Li C., Chen F., Zhan Y. and Wang L., Security Verification of Location Estimate in Wireless Sensor Networks , 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 1(4), 23-25 (2010)
  30. Zhan Y. , Li C., Wang X., Zhou Y., Liu L. and Al-Aqrabi H., A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks, IEEE 11th Int. Conf. Trust. Secur. Priv. Comput. Commun., 884889), 25-27(2012)