Research Article

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Table 2

Prevention of attacks by the proposed model.

AttacksAttack behaviourPrevention by our proposed model

StealingSignal eavesdropping and tamperingOur proposed model uses encryption to prevent such attacks

JammingSending jamming signal in the working frequency rangeDetection is addressed in the proposed algorithm

CollisionRepetition of messagesNot applicable in the proposed model, as the maximum calculation is done by BS and anchor node with minimum message controls

ExhaustionSending of unnecessary messageNo scope to provide unnecessary message as transmission range is limited to and the distance estimation process is secured

UnfairnessExplicitly taking the control of the channelNot possible due to the minimum size of the packets

DoS AttacksExhaustion of energy of the unknown nodesCan be monitored directly by the Base Station

Selective forwardingSelectively forward packetsUsing the approach of one-hop neighborhood forwarding is not necessary

SybilPossessing multiple identitiesMutual authentication is used

SinkholeMaliciously tamper with routingMutual authentication is used with the certificates

WormholeShortening the distance to make a fast routing pathThe distance estimation is done based upon the light speed which is the maximum speed of transmission can be and therefore no faster route can be created between an anchor and an unknown node

FloodingEstablishing false connectionsBroadcasting is limited by the anchor nodes within a limited range of

TamperingTampering localization beaconsBoth encryption and mutual authentication are used

Insider attackCompromised anchor nodes may provide false informationBoth the distance reduction and distance enlargement attack have been addressed

Range change attackChanging the range or Angle of Arrival (AoA)Our proposed model does not incorporate the mechanism of AoA as it works on time interval to calculate the distance and therefore can easily avoid such attack

False beacon location attackCompromising a beacon and then he can make the beacon broadcast false locationAuthentication, limited range, and validation of distance estimation in the proposed approach will help to avoid such attack

False reported location attackMalicious node reports falseVerification is done at the BS, so there is less chance to report falsified verification