Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 308341, 10 pages
http://dx.doi.org/10.1155/2014/308341
Research Article

Reputation-Based Secure Sensor Localization in Wireless Sensor Networks

1School of Software Engineering, Beijing University of Technology, Beijing 100124, China
2College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China
3Information Center, SINOPEC Research Institute of Petroleum Processing, Beijing 100083, China

Received 7 March 2014; Accepted 25 April 2014; Published 20 May 2014

Academic Editor: Yuxin Mao

Copyright © 2014 Jingsha He et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. F. Golen, B. Yuan, and N. Shenoy, “An evolutionary approach to underwater sensor deployment,” International Journal of Computational Intelligence Systems, vol. 2, no. 10, pp. 184–201, 2009. View at Google Scholar · View at Scopus
  2. J. C. Augusto, J. Liu, P. McCullagh, H. Wang, and J.-B. Yang, “Management of uncertainty and spatio-temporal aspects for monitoring and diagnosis in a smart home,” International Journal of Computational Intelligence Systems, vol. 1, no. 4, pp. 361–378, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. S.-K. Yang and K.-F. Ssu, “An energy efficient protocol for target localization in wireless sensor networks,” World Academy of Science, Engineering and Technology, vol. 56, no. 8, pp. 398–407, 2009. View at Google Scholar · View at Scopus
  4. M. Boushaba, A. Hafid, and A. Benslimane, “High accuracy localization method using AoA in sensor networks,” Computer Networks, vol. 53, no. 18, pp. 3076–3088, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Sugihara and R. K. Gupta, “Sensor localization with deterministic accuracy guarantee,” in Proceedings of the IEEE INFOCOM, pp. 1772–1780, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Park, Y. Lim, K. Lee, and Y.-H. Choi, “A polygonal method for ranging-based localization in an indoor wireless sensor network,” Wireless Personal Communications, vol. 60, no. 3, pp. 521–532, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. W. E. Chan and B. H. Soong, “A new lower bound on range-free localization algorithms in wireless sensor networks,” IEEE Communications Letters, vol. 15, no. 1, pp. 16–18, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less low-cost outdoor localization for very small devices,” IEEE Personal Communications, vol. 7, no. 5, pp. 28–34, 2000. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Wu, M. Deng, L. Xiao, W. Wei, and A. Gao, “Cosine theorem-based DV-hop localization algorithm in wireless sensor networks,” Information Technology Journal, vol. 10, no. 2, pp. 239–245, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. I. Güvenç and C.-C. Chong, “A survey on TOA based wireless localization and NLOS mitigation techniques,” IEEE Communications Surveys and Tutorials, vol. 11, no. 3, pp. 107–124, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 166–179, July 2001. View at Scopus
  12. P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system,” in Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 775–784, March 2000. View at Scopus
  13. D. Niculescu and B. Nath, “Ad hoc positioning system (APS) using AOA,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies, pp. 1734–1743, April 2003. View at Scopus
  14. Y. Zhang, L. Bao, S.-H. Yang, M. Welling, and D. Wu, “Localization algorithms for wireless sensor retrieval,” Computer Journal, vol. 53, no. 10, pp. 1594–1605, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Čapkun, K. B. Rasmussen, M. Čagalj, and M. Srivastava, “Secure location verification with hidden and mobile base stations,” IEEE Transactions on Mobile Computing, vol. 7, no. 4, pp. 470–483, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Chen, W. Lou, and Z. Wang, “A novel secure localization approach in wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2010, pp. 1–12, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du, “Attack-resistant location estimation in wireless sensor networks,” ACM Transactions on Information and System Security, vol. 11, no. 7, pp. 22–39, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. T. Park and K. G. Shin, “Attack-tolerant localization via iterative verification of locations in sensor networks,” Transactions on Embedded Computing Systems, vol. 8, no. 12, pp. 1–24, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Srinivasan, J. Teitelbaum, and W. Jie, “DRBTS: distributed reputation-based beacon trust system,” in Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC '06), pp. 277–283, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  20. X. Xu, H. Jiang, L. Huang, H. Xu, and M. Xiao, “A reputation-based revising scheme for localization in wireless sensor networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '10), pp. 1–6, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. R.-I. Rusnac and A. Ş. Gontean, “Maximum Likelihood Estimation Algorithm evaluation for wireless sensor networks,” in Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC '10), pp. 95–98, September 2010. View at Publisher · View at Google Scholar · View at Scopus