Research Article

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Algorithm 2

Validation of distance estimation and detection of malicious anchors by BS.
Input. Set of anchor nodes A with locations , location estimate of an unknown node , error parameter
Step 1. ,
If  
then exit
else go to Step
Step 2. calculate the algebraic centre of intersection region
Step 3. Initialize //radius of the intersection region as
Step 4. inside the region do
    if
   then
   end if
Step 5. ,   do
  
Step 6. if then
     Anchor node is malicious
   else
      is not malicious
Step 7. end if