Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Node Localization Verification Model for WSN

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9567))

Included in the following conference series:

  • 1604 Accesses

Abstract

Localization is one of the most important technologies in wireless sensor networks. Range-based localization methods are widely used in many applications. However, traditional RSS-based methods cannot work well in scenarios with unreliable anchors. A reputation scheme based distributed location verification model called UNDA is proposed to solve the unreliable node recognizing issue in such scenarios. UNDA combines direct reputation and third-party reputation to recognize unreliable anchor. Furthermore, a credibility-updating scheme is presented to make the third-party reputation more accuracy. Extensive simulation experiments indicate that the location verification algorithm has relatively high accuracy as well as low communication overhead, and the convergence of UNDA is rapid. The UNDA can be a used as an underlayer for traditional RSS-based localization algorithms to realize reliable localization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Jang, W.S., Lee, D.E., Choi, J.H.: Ad-hoc performance of wireless sensor network for large scale civil and construction engineering applications. Autom. Constr. 26(10), 32–45 (2012)

    Article  Google Scholar 

  3. Hackmann, G., Sun, F., Castaneda, N., et al.: A holistic approach to decentralized structural damage localization using wireless sensor networks. Comput. Commun. 36(1), 29–41 (2012)

    Article  Google Scholar 

  4. Coluccia, A., Ricciato, F.: RSS-based localization via bayesian ranging and iterative least squares positioning. IEEE Commun. Lett. 18(5), 873–876 (2014)

    Article  Google Scholar 

  5. Safa, H.: A novel localization algorithm for large scale wireless sensor networks. Comput. Commun. 45, 32–46 (2014)

    Article  MathSciNet  Google Scholar 

  6. Zhang, S., Liu, X., Wang, J., et al.: Accurate range-free localization for anisotropic wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 11(3), 51 (2015)

    Google Scholar 

  7. Oliveira, L., Li, H., Almeida, L., et al.: RSSI-based relative localisation for mobile robots. Ad Hoc Netw. 13, 321–335 (2014)

    Article  Google Scholar 

  8. Zhong, S., Jadliwala, M., Upadhyaya, S., et al.: Towards a theory of robust localization against malicious beacon nodes. In: INFOCOM 2008, pp. 2065–2073 (2008)

    Google Scholar 

  9. Hwang, J., He, T., Kim, Y.: Detecting phantom nodes in wireless sensor networks. In: INFOCOM 2007, pp. 2391–2395 (2007)

    Google Scholar 

  10. Kuo, S.P., Kuo, H.J., Tseng, Y.C.: The beacon movement detection problem in wireless sensor networks for localization applications. IEEE Trans. Mob. Comput. 8(10), 1326–1338 (2009)

    Article  Google Scholar 

  11. Zeng, Y., Cao, J., Hong, J., et al.: Secure localization and location verification in wireless sensor networks: a survey. J. Supercomput. 64(3), 685–701 (2013)

    Article  Google Scholar 

  12. Yang, Z., Jian, L., Wu, C., et al.: Beyond triangle inequality: sifting noisy and outlier distance measurements for localization. ACM Trans. Sens. Netw. (TOSN) 9(2), 26 (2013)

    Google Scholar 

  13. Yang, Z., Wu, C., Chen, T., et al.: Detecting outlier measurements based on graph rigidity for wireless sensor network localization. IEEE Trans. Veh. Technol. 62(1), 374–383 (2013)

    Article  Google Scholar 

  14. Garg, R., Varna, A.L., Wu, M.: An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 7(2), 717–730 (2012)

    Article  Google Scholar 

  15. Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: distributed reputation-based beacon trust system. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283. IEEE (2006)

    Google Scholar 

  16. Wei, Y., Guan, Y.: Lightweight Location verification algorithms for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(5), 938–950 (2013)

    Article  Google Scholar 

  17. Xia, M., Sun, P., Wang, X., et al.: Distributed beacon drifting detection for localization in unstable environments. Math. Prob. Eng. (2013)

    Google Scholar 

  18. Moati, N., Otrok, H., Mourad, A., et al.: Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol. Wireless Pers. Commun. 75(3), 1747–1768 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Zhejiang Province Science Technology Department Public Welfare Technology Application Research Project (2015C33060), The National Natural Science Foundation of China (61379023) and Opening Fund of Zhejiang Provincial Top Key Discipline of Computer Science and Technology at Zhejiang Normal University, P.R. China (ZC323014074).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingzhang Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Miao, C., Dai, G., Chen, L., Jin, H., Chen, Q. (2016). A Node Localization Verification Model for WSN. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31854-7_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31853-0

  • Online ISBN: 978-3-319-31854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics