- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

International Journal of Distributed Sensor Networks

Volume 2013 (2013), Article ID 107024, 9 pages

http://dx.doi.org/10.1155/2013/107024

## BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks

School of Instrumentation Science and Optoelectronics Engineering, Beijing University of Aeronautics and Astronautics (Beihang University), Beijing 100191, China

Received 6 October 2012; Revised 23 January 2013; Accepted 5 February 2013

Academic Editor: Sunho Lim

Copyright © 2013 Ning Yu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

Localization is the key supporting technology for wireless sensor networks (WSNs). Security and accuracy are the premise of the localization application. Real-world applications of wireless sensor networks are often subject to a variety of adverse circumstances interference, and the localization performance is seriously affected. In this paper, we propose a BRS-based robust secure localization (BRSL) algorithm in order to reduce the impact of the malicious attackers in WSNs. The BRSL method includes two phases. In the first stage, the trust evaluation framework is established on the basis of beta reputation system. In the second phase, we employ the weighted Taylor-series least squares method to estimate the coordinates of sensor nodes. Simulation results demonstrate that the proposed algorithm is robust and effective.

#### 1. Introduction

Wireless sensor networks (WSNs) are based on the technology of sensor, wireless communication, tiny embedded devices, and distributed computing. They exchange information with the environment through sensors and implement the function of collecting and dealing with data. Wireless sensor networks have been widely used in the fields of environmental monitoring, target tracking, military applications, disaster management, and so forth [1–3].

Self-localization technology of nodes is the prerequisite and basis for the application of wireless sensor networks, especially the position information that is needed for the perceived data. Node localization of WSNs is to determine the positions of normal nodes based on the positions of beacon nodes and the constraint relations between normal and beacon nodes. Positions or coordinates of normal nodes are unknown. Beacon nodes usually get their positions or coordinates through global positioning system (GPS) modules or by manual deployments. Being an essential support technology of wireless sensor networks, node localization has got more and more attention in the recent years [4–10].

Most localization methods depend on measuring the distances or hops between normal and beacon nodes to obtain the coordinates of normal nodes. In many typical localization algorithms [11–13], the coordinates of beacon nodes are generally assumed to be completely correct without any disturbs of adverse factors, and the normal nodes can use beacon information in security. However, in the actual hostile situations, some malicious nodes may intrude into sensor networks. They pretend to be true beacon nodes or attack other anchor nodes and make them declare false coordinates [14, 15]. The false coordinates or distance estimation will cause a major localization error for normal sensor nodes [16]. In this case, some methods should be explored to eliminate or reduce the adverse influence caused by malicious beacon nodes and ensure safe localization in wireless sensor networks.

In this paper, we develop a BRS-based robust secure localization (BRSL) algorithm for solving the node self-localization problem in the case of malicious nodes existence. In BRSL, normal sensor node first observes the anchor nodes in its communication range and evaluates the trust values of these anchor nodes. Specially, the concepts of the beta reputation system are employed to deal with the uncertain factors in trust evaluation. Then, each anchor node obtains a final trust value, and sensor nodes compare the final trust values of anchor nodes in their multihop communication range with the stored threshold. Finally, the normal sensor nodes utilize the trustful anchor nodes to estimate their coordinates. All the above operations can be carried out by each node. The method is a completely distributed localization approach. Through simulations, we demonstrate that the BRSL method can efficiently reduce the influence of malicious attackers in WSNs.

The remainder of the paper is organized as follows: Section 2 introduces related works on secure localization algorithms. Section 3 presents the network model, attack model, and related definitions. Section 4 provides the details of the BRS-based robust secure localization (BRSL) algorithm. Section 5 presents the simulation results. Section 6 concludes the paper.

#### 2. Related Works

Alfaro et al. [17] consider the localization security of sensor nodes under limited trust anchor nodes. It introduces three algorithms to enable the sensor nodes to determine their positions, but it would fail when the malicious anchor nodes are in colluding conditions.

Liu et al. [18] propose two secure localization algorithms. One is attack-resistant minimum mean square estimation, which excludes malicious anchor nodes by the consistency check. The other is voting-based location estimation. The algorithms are difficult to work for the malicious anchor nodes in colluding conditions.

Zhu et al. [19] propose an attack detection module which can detect compromised beacons and provide a localization service in terms of bounded estimation error by secure localization module, but it mainly concentrates on the one-hop localization.

Liu et al. [20] present a secure localization mechanism that detects malicious anchor nodes claiming fake positions. It uses redundant anchor nodes instead of normal nodes in the sensing field to verify malicious anchors. The method relies on a centralized base station for the detection.

Li et al. [21] introduce a secure scheme “Bilateration” which is derived from multilateration. It calculates the weight of anchor nodes and decides which anchor nodes are malicious. After ignoring the coordinates caused by compromised nodes, it uses the average value of the left candidate positions as the estimated location of the sensor node, but it mainly focuses on the one-hop localization.

#### 3. Preliminaries

##### 3.1. Network Model

We consider a network consisting of two types of nodes, namely, anchor nodes and sensor nodes. The anchor nodes are specially equipped and aware of their coordinates after deployment. The sensor nodes, whose positions are yet to be discovered, estimate their locations by measuring distances to neighboring anchor nodes. All nodes are randomly distributed in a 2D spatial region. Every node has a unique identity (ID). The transmission range or ranging radius of each node is . Every node is capable of measuring the distance to any of its immediate neighbors. The ranging error follows a Gaussian distribution , where the mean is 0 and the standard deviation is within a threshold. Measurement error is bounded by , and the maximum physical inaccuracy can be obtained experimentally. In multihop localization, each anchor node broadcasts a message that carries its declared position to its one-hop neighbors. Then, the message is propagated in the network in a controlled flooding manner. When a sensor node obtains three or more anchor messages, the sensor node can estimate its location by the localization algorithm.

##### 3.2. Attack Model

We assume that the WSN is in a hostile environment, that is, there are malicious attackers in the network. The attackers attack the anchor nodes in order to make them declare dishonest coordinates. When an anchor node is attacked and broadcasts erroneous locations, we call it malicious anchor node. The nodes claiming actual coordinates are called benign anchor nodes. We consider an adversarial environment where the malicious anchor nodes are in noncolluding scenario or colluding scenario. If the malicious anchor nodes are noncolluding, they cannot know whether other anchor nodes are malicious or not. They can only fake their own declared locations to affect the localization process. While the malicious anchor nodes are colluding, they can detect whether other anchor nodes are the same type, and each pair of colluding malicious anchor nodes can revise the measure distance between them by changing their declared locations.

As shown in Figure 1, when a sensor node gets enough measurement distances (), where , to anchor nodes , a system of the Euclidean equations can be set up: where is ’s coordinates that need to be estimated and is anchor node ’s declared position.

If the anchor node is attacked, it will become a malicious anchor node with fake coordinates. When utilizes to compute its position, its estimated position will deviate far from its physical position, and its location accuracy will be very low.

##### 3.3. Related Definitions

To be convenient, some necessary definitions are given in the following.

(i)Measurement distance: node is in the communication radius of node . The physical measurement distance from to (through RSSI, TDOA, etc.) is called measurement distance.(ii)The Euclidean distance: the distance between the declared coordinates of two anchor nodes and , that is, where and denote, respectively, the declared coordinates of anchors and .(iii)Multihop communication range: the range that a node’s propagation packet can reach through multihop forwarding.(iv)Multihop count: the hops count of the shortest path between a pair of nodes. For example, if the shortest path between nodes and passes nodes (including and ), the multihop count of nodes and is .#### 4. BRS-Based Robust Secure Localization (BRSL) Algorithm

In BRSL method, every sensor node has the detecting function. The sensor node examines each of the anchor nodes that are available to it and evaluates the reliability of each anchor node according to the geometric relationship among anchor nodes. After the sensor node obtains the final trust values of each anchor node, a weighted Taylor-series least squares method is utilized to compute the sensor nodes’ coordinates. In general, the BRSL method includes two main phases: trust evaluation of anchor nodes and the localization of sensor nodes.

##### 4.1. Trust Evaluation of Anchor Nodes

In this subsection, we employ the concepts of the beta reputation system [22] to construct the trust evaluation framework of anchor nodes. In contrast to most other intuitive reputation systems, the beta reputation system has a firm basis on the theory of statistics, that is, the beta probability density function. The beta distribution can be expressed by using the gamma function as where , , , and is the gamma function.

The gamma function [23] (represented by the capital Greek letter ) is an extension of the factorial function, with its argument shifted down by 1, to real and complex numbers. If is a positive integer, we get the formula . If is a complex number, we get the formula , where the real part of must be larger than zero . The gamma function is applicable in the fields of probability and statistics. It is also a component in various probability-distribution functions.

The beta reputation system consists of two elements that can be used separately or in combination to provide a flexible framework for reputation services of WSNs applications. We use the beta reputation system to establish the trust evaluation framework of anchor nodes. In the network, anchor nodes have two types: benign anchor nodes and malicious anchor nodes. And the two elements of beta reputation system are the most appropriate parameters here to judge the anchor nodes. The probability expectation value of the beta distribution is given by and the variance is

In the network, every anchor node has a unique ID, and the sensor node is assumed to have the detecting function. We utilize the beta reputation system to detect the malicious anchor nodes. The detecting process is considered with two possible outcomes (benign anchor node and malicious anchor node). Let be the observed outcome number of benign anchor nodes, and let be the observed outcome number of malicious anchor nodes. Then, we have a beta function expressed as , where denotes the benign anchor node. The observed number of benign anchor nodes and malicious anchor nodes is used in the beta function to estimate the probability of anchor nodes to be benign ones, which equals to the expectation value of . As we do not know whether the anchor nodes are benign or not at the beginning, we initially assume all anchor nodes to be benign ones.

Let denotes the reputation of anchor nodes and . Let denotes the trust value of the anchor node. From the beta reputation system, we know that the expectation value of is equal to , that is, . Assume that there are anchor nodes and sensor nodes randomly deployed in the network. Assume () anchor nodes () are available to an arbitrary sensor node . We deploy the network times in total. The detail of the detecting process is given as follows.(1) Compute and through the geometric relationship among anchor nodes. The values of and are set to 0 initially. The value of is the Euclidean distance between and , and denotes the measurement distance between and (if and are neighbors).(a)If inequality or 0 is satisfied, let . Otherwise, let .(b)If inequality or is satisfied, let . Otherwise, let .

For example, Figure 2 shows the geometric relationship among anchor nodes, in which ( ) represents the anchor nodes and ( ) represents the sensor nodes. Anchor node is attacked, and is the declared position of . As anchor node is not the neighbor of , we can only obtain the Euclidean distance between them. A set of inequalities can be set up: , ≤ , ≤ , , and . Sensor nodes and are in anchor node ’s communication range. Therefore, we can get .(2) Compute the trust value of anchor node in each network deployment.(a)Assume that () sensor nodes () are available to anchor node . These sensor nodes utilize step to detect anchor node . The observed number of anchor node to be a benign one is and the observed number of anchor node to be a malicious one is (b)The . The trust value of anchor node is and the variance of anchor node is (3)Compute the trust value of anchor node after the times network deployment. Let denotes the current deployment time. Repeat step (1) and step (2) until . The final trust value of anchor node is and the final variance of anchor node is (4) Judge whether anchor node is a benign anchor node.(a)After the anchor node obtains the final trust value , it broadcasts to the network in a multihop flooding manner. The sensor nodes store the final trust values they obtained, based on which they can decide whether is a benign anchor node.(b)The sensor nodes compare the that they received from step (3) with threshold . If , sensor nodes will consider anchor node as a benign anchor node and utilize in the localization phase. If , sensor nodes will take anchor node as a malicious anchor node, and will be revoked before the localization stage.

The determination of threshold depends on the final trust value of each anchor node. The threshold is defined as follows where is the total number of anchor nodes, is the ID of anchor node, and is the final variance of anchor node .

From the above steps, we will get the trust evaluation of anchor nodes. The situation we investigated in this paper is that the percentage of malicious anchor nodes is less than half of the number of anchor nodes. When the malicious anchor nodes are noncolluding, they will not cooperate with each other. Therefore, it is hard for these malicious anchor nodes to obtain high value of . As the number of malicious anchor nodes is less than that of benign ones, the colluding malicious anchor nodes will be given more value on . When malicious anchor nodes are cooperated, some malicious anchor nodes may obtain more value on than , but such nodes are very few. Generally, is smaller than for malicious anchor nodes, and is bigger than for benign anchor nodes. Therefore, most benign anchor nodes’ trust values are larger than that of malicious anchor nodes in each network deployment.

Formula (8) shows that the bigger is, the larger is. Similarly, the bigger is, the smaller is. The variance of anchor node denotes the deviating degree of anchor node ’s trust value from the expectation value. If the final variance of anchor node is big, it means the distribution of anchor node ’s trust values () is relatively discrete in times network deployment. While the final variance of anchor node is small, it means that the distribution of anchor node ’s trust values is relatively concentrated. The differences between most benign anchor nodes’ trust values and their average trust value are larger than those of malicious anchor nodes, that is, . The weight of trust values of anchor nodes in formula (12) demonstrates that the trust values of benign anchor nodes account for a higher proportion than malicious anchor nodes’ trust values in the judging threshold, which is helpful in excluding malicious anchor nodes. Therefore, formula (12) indicates the most appropriate threshold here.

##### 4.2. The Localization of Sensor Nodes

When utilizing malicious anchor nodes to localize the sensor nodes, the localization accuracy of sensor nodes is very low. To resolve this problem, we eliminate the malicious anchor nodes before the localization phase. The sensor node utilizes all its multihop communication anchor nodes to estimate its coordinates. The traditional method like maximum likelihood estimation (MLE) has a high computational complexity and always loses much coordinates information.

We employ the weighted Taylor-series least squares algorithm to estimate the coordinates of sensor nodes and the final trust values , , , () of benign anchor nodes are used as the weight in the localization stage. The weighted Taylor-series least squares method can make better use of the anchor information, and the computing accuracy can be greatly improved. The localization processes are as follows.

Assume () are the measurement distances from the anchor nodes to the sensor node and is the declared coordinates of anchor node . The position of sensor node is denoted as . Therefore, we have a set of the Euclidean equations:

Firstly, calculate the centroid coordinates of anchor nodes, that is, .

Secondly, expand the function in Taylor series at , and ignore the high-order terms. Equation (13) is transformed into the following modus: where denotes the Euclidean distance between and . Therefore, can be obtained by , where

Thirdly, let , and judge whether the iteration termination condition is satisfied, where is a prior-defined threshold. If , we stop the iteration process. Otherwise, we set and go to the second step.

Finally, repeat the second step and the third step until the iteration termination condition is satisfied or the maximum iteration number is reached. The final output is the estimated coordinates of sensor node .

#### 5. Performance Evaluation

In this section, the performance of the BRSL algorithm is tested. All simulations are executed in MATLAB.

The WSN is in a hostile environment, and the malicious anchor nodes are in two conditions: noncolluding or colluding. The default network configuration parameters are shown in Table 1. Unless specified, the default parameters are used in the simulations.

Figure 3 shows the random network deployment, and each anchor node has a unique ID in all the simulations, where benign anchor nodes’ IDs are from 1 to 20 and malicious anchor nodes’ IDs are from 21 to 30.

##### 5.1. Trust Evaluation of Anchor Nodes

Firstly, we analyze the trust evaluation of anchor nodes. Figures 4 and 5 show that the final variances of benign anchor nodes are bigger than those of the malicious anchor nodes, no matter whether the malicious anchor nodes are noncolluding or colluding. Therefore, the weight is proper in this paper. When malicious anchor nodes are in noncolluding condition, from Figure 6, we can see that the final trust values of benign anchor nodes are much larger than those of malicious anchor nodes, and the threshold is about 0.267032. Therefore, we can remove all the malicious anchor nodes before the localization stage. When malicious anchor nodes are colluding, as Figure 7 shows, some of the malicious anchor nodes’ final trust values are bigger than those of benign anchor nodes, and the threshold is about 0.297201. Although all the malicious anchor nodes can be excluded by the threshold, some benign anchor nodes are also removed. But in Section 5.2, it proves that the localization accuracy is still high although some benign anchor nodes are excluded.

##### 5.2. Evaluation of BRSL Algorithm

In this subsection, we compare the average localization error (ALE) of the BRSL algorithm with other localization techniques: RMLA2 [15], RMLA1 [15], Bilateration [21], and the traditional multihop localization method without trust evaluation in which Taylor-series least squares solver is used (t-TLS for short). Based on our simulations, we show that BRSL has superior performance in localization accuracy.

The ALE is normalized by the nodes’ communication radius : where is the estimated coordinates of sensor node and is the real coordinates of sensor node .

Figures 8 and 9 show the impact of malicious anchor number on the localization accuracy of BRSL, RMLA2, RMLA1, Bilateration, and t-TLS. With the increase of number of malicious anchor nodes, the ALE of RMLA2, RMLA1, Bilateration, and t-TLS rises obviously, while that of BRSL remains stable (no more than 22% in noncolluding scenario and 30% in colluding scenario). Therefore, BRSL is robust for multihop localization and can greatly improve the average localization accuracy no matter the malicious anchor nodes are noncolluding or colluding.

Figures 10 and 11 show the comparison results of ALE under different standard deviation of ranging errors in noncolluding and colluding scenario, respectively. The ALE of each algorithm increases with standard deviation . Compared with RMLA2, RMLA1, Bilateration, and t-TLS, BRSL may approximately improve the localization accuracy by 10%, 15%, 55%, and 110%, respectively, in noncolluding scenario and 15%, 20%, 65%, and 150% in colluding scenario. The BRSL performs much better than other algorithms.

Figures 12 and 13 illustrate the relationship of ALE with the times of network deployment. The number of simulation rounds equals to the times of network deployment. The ALE almost does not change with the number of simulation rounds whether the malicious anchor nodes are in noncolluding or colluding condition. The variety of network topology does not affect the detecting and localization process.

##### 5.3. Cost Analysis

Finally, we analyze the costs of five algorithms. Assume a sensor node can hear anchor nodes in its one-hop range. In BRSL method, needs to compute times to detect each anchor node. Thus, the cost of reputation computation in the network is . The computation complexity of the localization stage in our method is . Then the total cost of BRSL method is . The costs of RMLA2 equals to that of RMLA1. The communication complexity of RMLA1 or RMLA2 is . And the computation complexity of RMLA1 or RMLA2 is . Thus, the total cost of RMLA1 or RMLA2 is , which is the same as BRSL algorithm. The costs of Bilateration and t-TLS mainly focus on the computation stage. The computation complexity of Bilateration is , while that of t-TLS is . Therefore, the cost of our method is moderate and acceptable.

#### 6. Conclusions

In this paper, we propose a BRS-based robust secure localization algorithm for the case of presence of malicious anchor nodes. Based on the beta reputation system and the trust evaluation, the malicious anchor nodes are detected and excluded. By utilizing the weighted Taylor-series least squares method, the coordinates of sensor nodes are estimated. The simulation results demonstrate that the BRSL algorithm can effectively distinguish malicious anchor nodes and improve localization accuracy, as well as resist topology variety and ranging uncertainties. In the future, our work will focus on the secure localization when there are multiple and different attacks in complex environments.

#### Acknowledgments

The authors are grateful to the anonymous reviewers for their industrious work and insightful comments. This work is supported by National Natural Science Foundation of China under Grant nos. 61001138 and 61201317.

#### References

- J. Albowicz, A. Chen, and L. Zhang, “Recursive position estimation in sensor networks,” in
*Proceedings of the 9th International Conference on Network Protocols*, pp. 35–41, 2001. - H. A. Oliveira, E. F. Nakamura, A. A. F. Loureiro, and A. Boukerche, “Directed position estimation: a recursive localization approach for wireless sensor networks,” in
*Proceedings of the 14th IEEE International Conference on Computer Communications and Networks*, pp. 557–562, San Diego, Calif, USA, 2005. - T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. Abdelzaher, “Range-free localization schemes for large scale sensor networks,” in
*Proceedings of the 9th Annual International Conference Mobile Computing and Networking (MobiCom '03)*, pp. 81–95, ACM Press, San Diego, Calif, USA, 2003. - M. L. Sichitiu and V. Ramadurai, “Localization of wireless sensor networks with a mobile beacon,” in
*Proceedings of the 1st IEEE International Conference on Mobile Ad-Hoc and Sensor Systems*, pp. 174–183, Fort Lauderdale, Fla, USA, October 2004. View at Scopus - X. L. Guo, R. J. Feng, Y. F. Wu, and J. W. Wan, “Grid-Scan-Based multi-hop Localization algorithm for wireless sensor networks,” in
*Proceedings of IEEE Sensors Conference*, pp. 668–672, Waikoloa, Hawaii, USA, 2010. - D. Niculescu and B. Nath, “DV based positioning in ad hoc networks,”
*Telecommunication Systems*, vol. 22, pp. 267–280, 2003. View at Publisher · View at Google Scholar - K. Yu, Y. J. Guo, and M. Hedley, “TOA-based distributed localisation with unknown internal delays and clock frequency offsets in wireless sensor networks,”
*IET Signal Processing*, vol. 3, no. 2, pp. 106–118, 2009. View at Publisher · View at Google Scholar · View at Scopus - J. Wan, N. Yu, R. Feng, Y. Wu, and C. Su, “Localization refinement for wireless sensor networks,”
*Computer Communications*, vol. 32, pp. 1515–1524, 2009. View at Publisher · View at Google Scholar - H. Lim and J. C. Hou, “Localization for anisotropic sensor networks,” in
*Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies*, vol. 1, pp. 138–149, 2005. - J. W. Wan, X. L. Guo, N. Yu, Y. F. Wu, and R. J. Feng, “Multi-hop localization algorithm based on grid-scanning for wireless sensor networks,”
*Sensors*, vol. 11, no. 4, pp. 3908–3938, 2011. View at Publisher · View at Google Scholar · View at Scopus - Y. Shang, H. Shi, and A. A. Ahmed, “Performance study of localization methods for ad-hoc sensor networks,” in
*Proceedings of the IEEE International Conference on Mobile Ad-Hoc and Sensor Systems*, pp. 184–193, October 2004. View at Scopus - S. Y. Wong, J. G. Lim, S. V. Rao, and W. K. G. Seah, “Multihop localization with density and path length awareness in non-uniform wireless sensor networks,” in
*Proceedings of the IEEE 61st Vehicular Technology Conference*, vol. 4, pp. 2551–2555, Stockholm, Sweden, June 2005. View at Scopus - Q. J. Xiao, B. Xiao, J. N. Cao, and J. P. Wang, “Multihop range free localization in anisotropic wireless sensor networks: a pattern-driven scheme,”
*IEEE Transactions On Mobile Computing*, vol. 9, no. 11, pp. 1592–1607, 2010. View at Google Scholar - J. Hwang, T. He, and Y. Kim, “Detecting phantom nodes in wireless sensor networks,” in
*Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07)*, pp. 2391–2395, May 2007. View at Publisher · View at Google Scholar · View at Scopus - R. J. Feng, X. L. Guo, N. Yu, and J. W. Wan, “Robust multihop localization for wireless sensor networks with unreliable beacons,”
*International Journal of Distributed Sensor Networks*, vol. 2012, Article ID 972101, 13 pages, 2012. View at Publisher · View at Google Scholar - H. L. Chen, W. Lou, and Z. Wang, “A novel secure localization approach in wireless sensor networks,”
*Eurasip Journal on Wireless Communications and Networking*, vol. 2010, article 12, 2010. View at Publisher · View at Google Scholar · View at Scopus - J. G. Alfaro, M. Barbea, and E. Kranakis, “Secure localization of nodes in wireless sensor networks with limited number of truth tellers,” in
*Proceedings of the 7th Annual Communication Networks and Services Research Conference (CNSR '09)*, pp. 86–93, May 2009. View at Publisher · View at Google Scholar · View at Scopus - D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du, “Attack-resistant location estimation in sensor networks,” in
*Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN ’05)*, vol. 11, no. 4, pp. 99–106, 2005. - W. T. Zhu, Y. Xiang, J. Y. Zhou, R. H. Deng, and F. Bao, “Secure localization with attack detection in wireless sensor networks,”
*International Journal of Information Security*, vol. 10, no. 3, pp. 155–171, 2011. View at Publisher · View at Google Scholar · View at Scopus - D. Liu, P. Ning, and W. L. Du, “Detecting malicious beacons for secure localization discovery in wireless sensor networks,” in
*Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05)*, pp. 609–619, 2005. - X. Li, B. Hua, Y. Shang, Y. Guo, and L. H. Yue, “Bilateration: an attack-resistant localization algorithm of wireless sensor network,” in
*Embedded and Ubiquitous Computing*, Lecture Notes in Computer Science, pp. 321–332, 2007. View at Google Scholar - A. Jsang and R. Ismail, “The beta reputation system,” in
*Proceedings of the 15th Bled Electronic Commerce Conference*, pp. 41–55, 2002. - G. E. Andrews, R. Askey, and R. J. Roy,
*Special Functions*, Cambridge University Press, Cambridge, UK, 2001.