Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 8672305, 18 pages
http://dx.doi.org/10.1155/2016/8672305
Research Article

Distributed Classification of Localization Attacks in Sensor Networks Using Exchange-Based Feature Extraction and Classifier

School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China

Received 5 August 2016; Revised 31 October 2016; Accepted 15 November 2016

Academic Editor: Alexandru Serbanati

Copyright © 2016 Su-Zhe Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Jiang, G. Han, C. Zhu, Y. Dong, and N. Zhang, “Secure localization in wireless sensor networks: a survey,” Journal of Communications, vol. 6, no. 6, pp. 460–470, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Zhang, W. Liu, Y. Fang, and D. Wu, “Secure localization and authentication in ultra-wideband sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 4, pp. 829–835, 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. Y. Chen, W. Trappe, and R. P. Martin, “Attack detection in wireless localization,” in Proceedings of the IEEE 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 1964–1972, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Boukerche, H. H. A. B. F. Oliveira, E. F. Nakamura, and A. A. F. Loureiro, “Secure localization algorithms for wireless sensor networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 96–101, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. D. He, L. Cui, H. Huang, and M. Ma, “Design and verification of enhanced secure localization scheme in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 7, pp. 1050–1058, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Garg, A. L. Varna, and M. Wu, “An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 717–730, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Wei and Y. Guan, “Lightweight location verification algorithms for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 5, pp. 938–950, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and privacy in localization for underwater sensor networks,” IEEE Communications Magazine, vol. 53, no. 11, pp. 56–62, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Liu, P. Ning, and W. Du, “Detecting malicious beacon nodes for secure location discovery in wireless sensor networks,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), pp. 609–619, Columbus, Ohio, USA, June 2005. View at Scopus
  10. M. Jadliwala, S. Zhong, S. J. Upadhyaya, C. Qiao, and J.-P. Hubaux, “Secure distance-based localization in the presence of cheating beacon nodes,” IEEE Transactions on Mobile Computing, vol. 9, no. 6, pp. 810–823, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. W. Du, L. Fang, and N. Peng, “LAD: localization anomaly detection for wireless sensor networks,” Journal of Parallel and Distributed Computing, vol. 66, no. 7, pp. 874–886, 2006. View at Publisher · View at Google Scholar · View at Scopus
  12. G. Han, J. Jiang, L. Shu, M. Guizani, and S. Nishio, “A two-step secure localization for wireless sensor networks,” Computer Journal, vol. 56, no. 10, pp. 1154–1166, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust statistical methods for securing wireless localization in sensor networks,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), pp. 91–98, Boise, Idaho, USA, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. M. A. Fischler and R. C. Bolles, “Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography,” Communications of the ACM, vol. 24, no. 6, pp. 381–395, 2010. View at Google Scholar
  15. N. Yu, L. Zhang, and Y. Ren, “BRS-based robust secure localization algorithm for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 3, Article ID 107024, 2013. View at Publisher · View at Google Scholar
  16. L. Doherty, L. E. Ghaoui, and K. S. J. Pister, “Convex position estimation in wireless sensor network,” in Proceedings of the 8th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), Anchorage, Alaska, USA, April 2001.
  17. T. Bao, J. Wan, K. Yi, and Q. Zhang, “A game-based secure localization algorithm for mobile wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 11, no. 9, Article ID 642107, 2015. View at Publisher · View at Google Scholar
  18. M. H. C. Law, M. A. T. Figueiredo, and A. K. Jain, “Simultaneous feature selection and clustering using mixture models,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 26, no. 9, pp. 1154–1166, 2004. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Boutemedjet, N. Bouguila, and D. Ziou, “A hybrid feature extraction selection approach for high-dimensional non-Gaussian data clustering,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 8, pp. 1429–1443, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Subasi, “EEG signal classification using wavelet feature extraction and a mixture of expert model,” Expert Systems with Applications, vol. 32, no. 4, pp. 1084–1093, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Yuan and X.-P. Zhang, “Statistical modeling in the wavelet domain for compact feature extraction and similarity measure of images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 20, no. 3, pp. 439–445, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. P. Bouboulis, S. Theodoridis, C. Mavroforakis, and L. Evaggelatou-Dalla, “Complex support vector machines for regression and quaternary classification,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 6, pp. 1260–1274, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. J. Peng, Y. Zhou, and C. L. Philip Chen, “Region-kernel-based support vector machines for hyperspectral image classification,” IEEE Transactions on Geoscience and Remote Sensing, vol. 53, no. 9, pp. 4810–4824, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. C.-Y. Yeh, W.-P. Su, and S.-J. Lee, “Employing multiple-kernel support vector machines for counterfeit banknote recognition,” Applied Soft Computing, vol. 11, no. 1, pp. 1439–1447, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. P. A. Forero, A. Cano, and G. B. Giannakis, “Consensus-based distributed support vector machines,” Journal of Machine Learning Research (JMLR), vol. 11, pp. 1663–1707, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  26. A.-Y. Ye, J.-F. Ma, Q.-Q. Pei, and L. Xu, “Survey on secure node positioning in wireless sensor networks,” Journal on Communications, vol. 30, no. 10, pp. 74–84, 2009. View at Google Scholar · View at Scopus
  27. X. Lu, D. Dong, and X. Liao, “MDS-based wormhole detection using local topology in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 145702, 9 pages, 2012. View at Publisher · View at Google Scholar
  28. Y. C. Hu, A. Perrig, and D. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), vol. 3, no. 2, pp. 1976–1986, IEEE, San Francisco, Calif, USA, 2003.
  29. L. Hung, S. Lee, Y.-K. Lee, and H. Lee, “SCODE: a secure coordination-based data dissemination tomobile sinks in sensor networks,” IEICE Transactions on Communications, vol. E92-B, no. 1, pp. 131–142, 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. H. A. Nguyen, H. Guo, and K.-S. Low, “Real-time estimation of sensor node's position using particle swarm optimization with log-barrier constraint,” IEEE Transactions on Instrumentation and Measurement, vol. 60, no. 11, pp. 3619–3628, 2011. View at Publisher · View at Google Scholar · View at Scopus
  31. V. G. Kulkarni, “Shortest paths in networks with exponentially distributed arc lengths,” Networks, vol. 16, no. 3, pp. 255–274, 1986. View at Publisher · View at Google Scholar · View at MathSciNet
  32. A. El-Zaart and D. Ziou, “Statistical modelling of multimodal SAR images,” International Journal of Remote Sensing, vol. 28, no. 10, pp. 2277–2294, 2007. View at Publisher · View at Google Scholar · View at Scopus
  33. J. Wu, C. K. Tse, F. C. M. Lau, and I. W. H. Ho, “Analysis of communication network performance from a complex network perspective,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 60, no. 12, pp. 3303–3316, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. M. H. DeGroot and M. J. Schervish, Probability and Statistics, Pearson Education, 2010.
  35. T. Nie, Z. Guo, and K. Zhao, “The dynamic correlation between degree and betweenness of complex network under attack,” Physica A: Statistical Mechanics and Its Applications, vol. 457, pp. 129–137, 2016. View at Publisher · View at Google Scholar
  36. L. Tian, C.-P. Zhu, D.-N. Shi, Z.-M. Gu, and T. Zhou, “Universal scaling behavior of clustering coefficient induced by deactivation mechanism,” Physical Review E, vol. 74, no. 4, Article ID 046103, pp. 1–7, 2006. View at Publisher · View at Google Scholar · View at Scopus
  37. X. Chen, L. Liang, G. Xu, and D. Liu, “Feature extraction of kernel regress reconstruction for fault diagnosis based on self-organizing manifold learning,” Chinese Journal of Mechanical Engineering, vol. 26, no. 5, pp. 1041–1049, 2013. View at Publisher · View at Google Scholar · View at Scopus
  38. S. S. Ram, V. V. Veeravalli, and A. Nedic, “Distributed non-autonomous power control through distributed convex optimization,” in Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM '09), pp. 3001–3005, IEEE, Rio de Janeiro, Brazil, 2009.
  39. M. Zhu and S. Martinez, “On distributed convex optimization under inequality and equality constraints,” IEEE Transactions on Automatic Control, vol. 57, no. 1, pp. 151–164, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  40. T. C. Aysal, B. N. Oreshkin, and M. J. Coates, “Accelerated distributed average consensus via localized node state prediction,” IEEE Transactions on Signal Processing, vol. 57, no. 4, pp. 1563–1576, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  41. L. Xiao and S. Boyd, “Fast linear iterations for distributed averaging,” Systems & Control Letters, vol. 53, no. 1, pp. 65–78, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  42. S. Kar and J. M. F. Moura, “Distributed consensus algorithms in sensor networks with imperfect communication: link failures and channel noise,” IEEE Transactions on Signal Processing, vol. 57, no. 1, pp. 355–369, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  43. J. Liu and J. Yang, “Action recognition using spatiotemporal features and hybrid generative/discriminative models,” Journal of Electronic Imaging, vol. 21, no. 2, Article ID 023010, 2012. View at Publisher · View at Google Scholar · View at Scopus
  44. H. Sun, C. Wang, and B. Wang, “Hybrid generative-discriminative human action recognition by combining spatiotemporal words with supervised topic models,” Optical Engineering, vol. 50, no. 2, Article ID 027203, 2011. View at Publisher · View at Google Scholar · View at Scopus
  45. Ø. Birkenes, T. Matsui, K. Tanabe, S. M. Siniscalchi, T. A. Myrvoll, and M. H. Johnsen, “Penalized logistic regression with HMM log-likelihood regressors for speech recognition,” IEEE Transactions on Audio, Speech and Language Processing, vol. 18, no. 6, pp. 1440–1454, 2010. View at Publisher · View at Google Scholar · View at Scopus
  46. B. He, H. Liu, Z. Wang, and X. Yuan, “A strictly contractive Peaceman-Rachford splitting method for convex programming,” SIAM Journal on Optimization, vol. 24, no. 3, pp. 1011–1040, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  47. M. Kang, J. Kim, J.-M. Kim, A. C. C. Tan, E. Y. Kim, and B.-K. Choi, “Reliable fault diagnosis for low-speed bearings using individually trained support vector machines with kernel discriminative feature analysis,” IEEE Transactions on Power Electronics, vol. 30, no. 5, pp. 2786–2797, 2015. View at Publisher · View at Google Scholar · View at Scopus
  48. M. H. Xu and T. Wu, “A class of linearized proximal alternating direction methods,” Journal of Optimization Theory and Applications, vol. 151, no. 2, pp. 321–337, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus