Abstract
Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on the location parameters of the event, secure localization is mandatory and must not be compromised at any cost. The main task, as if any node is malicious, is to authenticate nodes that are involved in the localization process. In this paper, we propose a secure hop-based algorithm that provides a better localization accuracy. In addition, to maintain the security of the localization process, the digital signature approach is used. Moreover, the impact of malicious nodes on the proposed scheme has also been observed. The proposed approach is also contrasted with the basic DV-Hop and improved DV-Hop based on error correction. From the simulation outcomes, we infer that this secure digital-signature-based localization strategy is quite robust against any node compromise attacks, thereby boosting its precision. Comparisons between the proposed algorithm and the state of the art were made on the grounds of different parameters such as the node quantity, ratio of anchor nodes, and range value towards the localization error.
Highlights
A wireless sensor networks (WSN) is a network where assorted nodes work together and feel the phenomena around them to achieve a common objective [1,2]
The security approach used in this work is quite effective in dealing with the various attacks as mentioned in the Table 2 above. This is because the onus lies with the base station (BS) that distributes the keys to the nodes involved in the localization process, and, there are two signatures generated (S1 & S2) while the message is transmitted between the sender and the receiver; in addition, the verification is done through the two verification entities (B1 & B2) that are computed and compared at the receiver’s end
Duced valueerror of the ALEwas can calculated be correlated with the complexity involvement the
Summary
A WSN is a network where assorted nodes work together and feel the phenomena around them to achieve a common objective [1,2]. If a BS has the details that a particular operation is taking place, and a sensor transfers these attributes to the BS and the location of the BS is not known, the BS cannot take the best possible action depending on the event [2]. To gather the location of sensor nodes, localization comes into the picture, through which the coordinates of the sensor node are determined. Security is another key issue that needs to be addressed—as without security, the true location of the nodes cannot be known or estimated. Regarding the security in the localization process, this is the security of data that is shared among the sensor nodes for the position estimation using any type of algorithm. The authentication of the nodes engaged in the localization process is the primary task, as if any one of the nodes is malicious, the whole system can be compromised
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.