Abstract

Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on the location parameters of the event, secure localization is mandatory and must not be compromised at any cost. The main task, as if any node is malicious, is to authenticate nodes that are involved in the localization process. In this paper, we propose a secure hop-based algorithm that provides a better localization accuracy. In addition, to maintain the security of the localization process, the digital signature approach is used. Moreover, the impact of malicious nodes on the proposed scheme has also been observed. The proposed approach is also contrasted with the basic DV-Hop and improved DV-Hop based on error correction. From the simulation outcomes, we infer that this secure digital-signature-based localization strategy is quite robust against any node compromise attacks, thereby boosting its precision. Comparisons between the proposed algorithm and the state of the art were made on the grounds of different parameters such as the node quantity, ratio of anchor nodes, and range value towards the localization error.

Highlights

  • A wireless sensor networks (WSN) is a network where assorted nodes work together and feel the phenomena around them to achieve a common objective [1,2]

  • The security approach used in this work is quite effective in dealing with the various attacks as mentioned in the Table 2 above. This is because the onus lies with the base station (BS) that distributes the keys to the nodes involved in the localization process, and, there are two signatures generated (S1 & S2) while the message is transmitted between the sender and the receiver; in addition, the verification is done through the two verification entities (B1 & B2) that are computed and compared at the receiver’s end

  • Duced valueerror of the ALEwas can calculated be correlated with the complexity involvement the

Read more

Summary

Introduction

A WSN is a network where assorted nodes work together and feel the phenomena around them to achieve a common objective [1,2]. If a BS has the details that a particular operation is taking place, and a sensor transfers these attributes to the BS and the location of the BS is not known, the BS cannot take the best possible action depending on the event [2]. To gather the location of sensor nodes, localization comes into the picture, through which the coordinates of the sensor node are determined. Security is another key issue that needs to be addressed—as without security, the true location of the nodes cannot be known or estimated. Regarding the security in the localization process, this is the security of data that is shared among the sensor nodes for the position estimation using any type of algorithm. The authentication of the nodes engaged in the localization process is the primary task, as if any one of the nodes is malicious, the whole system can be compromised

Contributions of Paper
Organization of Paper
Related Work
Attack Model
Proposed Scheme
Network Model and Assumptions
The Initialization Phase
Signature Verification Phase
Empirical Analysis of Signature Generation and Verification
Find Hop Count among the Nodes
Find Updated Hop Size and Node Distance
Position Value Estimation using a 2D Hyperbolic Approach
Mid-perpendicular
Security Analysis
Simulation and Implementation
Factors for Analysis can be calculated
Results and Discussion
Impact of Malicious Nodes Corresponding to the Range
Impact error of Malicious
Impact
Localization
Average
Conclusions and Future

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.