Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6102780, 12 pages
https://doi.org/10.1155/2017/6102780
Research Article

Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks

1School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Jiangsu Province, Nanjing 210003, China

Correspondence should be addressed to Peng Li; nc.ude.tpujn@gnepil

Received 5 October 2016; Revised 6 January 2017; Accepted 19 January 2017; Published 8 March 2017

Academic Editor: Qing Yang

Copyright © 2017 Peng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Jadliwala, S. Zhong, S. J. Upadhyaya, C. Qiao, and J.-P. Hubaux, “Secure distance-based localization in the presence of cheating beacon nodes,” IEEE Transactions on Mobile Computing, vol. 9, no. 6, pp. 810–823, 2010. View at Publisher · View at Google Scholar
  2. P. R. Vamsi and K. Kant, “Trust and location-aware routing protocol for wireless sensor networks,” IETE Journal of Research, vol. 62, no. 5, pp. 634–644, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Nandhakumar and N. Malmurugan, “ETIDS: an effective trust based intrusion detection system for wireless sensor networks,” Journal of Computational and Theoretical Nanoscience, vol. 13, no. 3, pp. 1791–1797, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. N. Labraoui, M. Gueroui, and M. Aliouat, “Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks,” European Transactions on Telecommunications, vol. 23, no. 4, pp. 303–316, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. W.-W. Chang, T.-J. Sung, H.-W. Huang et al., “A smart medication system using wireless sensor network technologies,” Sensors and Actuators, vol. 172, no. 1, pp. 315–321, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Wang, R. K. Ghosh, and S. K. Das, “A survey on sensor localization,” Journal of Control Theory and Applications, vol. 8, no. 1, pp. 2–11, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  7. K. Jeril, V. Amruth, and N. N. Swathy, “A survey on localization of Wireless Sensor nodes,” in Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES '14), pp. 1–6, Chennai, India, February 2014. View at Publisher · View at Google Scholar
  8. M. M. Patel and A. Aggarwal, “Security attacks in wireless sensor networks: a survey,” in Proceedings of the International Conference on Intelligent Systems and Signal Processing (ISSP '13), pp. 329–333, Anand, India, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Ahmed, K. Abu Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, “A trust aware routing protocol for energy constrained wireless sensor network,” Telecommunication Systems, vol. 61, no. 1, pp. 123–140, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. E. Goldoni, A. Savioli, M. Risi, and P. Gamba, “Experimental analysis of RSSI-based indoor localization with IEEE 802.15.4,” in Proceedings of the European Wireless Conference (EW '10), pp. 71–77, IEEE, Pavia, Italy, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. R. Garg, A. L. Varna, and M. Wu, “An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 717–730, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. P. Guo, J. Wang, X. H. Geng, C. S. Kim, and J.-U. Kim, “A variable threshold-value authentication architecture for wireless mesh networks,” Journal of Internet Technology, vol. 15, no. 6, pp. 929–935, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management,” in Proceedings of the IEEE Symposium on Security and Privacy, vol. 30, pp. 164–173, 1996.
  14. S. Guo, V. Leung, and Z. Qian, “A permutation-based multi-polynomial scheme for pairwise key establishment in sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, Cape Town, South africa, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Dong, M. Li, Y. Liu, X.-Y. Li, and X. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks,” IEEE/ACM Transactions on Networking, vol. 19, no. 6, pp. 1787–1796, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Ye and Y.-P. Wang, “A new malicious nodes attack-resistant security location method in wireless sensor network,” Chinese Journal of Computers, vol. 36, no. 3, pp. 532–545, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. Y. Guo and X. Liu, “A research on the localization technology of wireless sensor networks employing TI's CC2530 instrument,” in Proceedings of the 11th International Conference on Computational Intelligence and Security (CIS '15), pp. 446–449, Shenzhen, China, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Lewandowski and C. Wietfeld, “A comprehensive approach for optimizing ToA-localization in harsh industrial environments,” in Proceedings of the IEEE/ION Position, Location and Navigation Symposium (PLANS '10), pp. 516–525, Indian Wells, Calif, USA, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. F. G. Mármol and G. M. Pérez, “TRMSim-WSN, trust and reputation models simulator for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '09), pp. 1–5, IEEE, Dresden, Germany, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Bshara, U. Orguner, F. Gustafsson, and L. Van Biesen, “Fingerprinting localization in wireless networks based on received-signal-strength measurements: a case study on wimax networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 1, pp. 283–294, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. S. M. Lasassmeh and J. M. Conrad, “Time synchronization in wireless sensor networks: a survey,” in Proceedings of the Energizing Our Future, IEEE Southeast Con (SOUTHEASTCON '10), pp. 242–245, Charlotte-Concord, NC, USA, March 2010. View at Publisher · View at Google Scholar
  22. S. Mohammad Ali and W. Tat-Chee, “Message passing based time synchronization in wireless sensor networks: a survey,” International Journal of Distributed Sensor Networks, vol. 12, no. 4, pp. 1–21, 2016. View at Google Scholar
  23. E. Kim and K. Kim, “Distance estimation with weighted least squares for mobile beacon-based localization in wireless sensor networks,” IEEE Signal Processing Letters, vol. 17, no. 6, pp. 559–562, 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, vol. 16, no. 1, pp. 171–178, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Hwang, T. He, and Y. Kim, “Secure localization with phantom node detection,” Ad Hoc Networks, vol. 6, no. 7, pp. 1031–1050, 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. X. Chen, N. C. Rowe, J. Wu, and K. Xiong, “Improving the localization accuracy of targets by using their spatial–temporal relationships in wireless sensor networks,” Journal of Parallel and Distributed Computing, vol. 72, no. 8, pp. 1008–1018, 2012. View at Publisher · View at Google Scholar
  27. J. Lee, W. Chung, and E. Kim, “A new kernelized approach to wireless sensor network localization,” Information Sciences, vol. 243, no. 1, pp. 20–38, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. S. Bohidar, S. Behera, and C. R. Tripathy, “A comparative view on received signal strength (RSS) based location estimation in WSN,” in Proceedings of the IEEE International Conference on Engineering and Technology (ICETECH '15), pp. 2–5, IEEE, Coimbatore, India, March 2015. View at Publisher · View at Google Scholar · View at Scopus
  29. L. Mu, X. Qu, and Z. Zhou, “SARL: a flexible simulation architecture of range-based location in WSN,” in Proceedings of the 35th Chinese Control Conference (CCC '16), pp. 8412–8417, Chengdu, China, July 2016. View at Publisher · View at Google Scholar
  30. S. Ganeriwal and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks, vol. 4, no. 4, pp. 66–77, 2004. View at Google Scholar
  31. D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du, “Attack-resistant location estimation in wireless sensor networks,” ACM Transactions on Information and System Security, vol. 11, no. 4, article 22, 2008. View at Publisher · View at Google Scholar · View at Scopus