Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Attack-Resistant Weighted Least Squares Localization Algorithm Based on RSSI

  • Conference paper
  • First Online:
Science and Technologies for Smart Cities (SmartCity360° 2020)

Included in the following conference series:

  • 1160 Accesses

Abstract

As an important part of the Internet of things (IoT), wireless sensor networks (WSNs) have been applied in many fields. Most applications require accurate location information, hence node localization is one of the important issues in WSNs. It is very important to ensure the security of localization when WSNs are under attack. A new attack-resistant weighted least squares (ARWLS) algorithm based on RSSI was proposed in the paper. The algorithm is oriented to the problem solution for the situation that the attacker influences the system by tampering with the transmitting power in the localization mechanism. The proposed algorithm can be used in the attack scenarios. Simulations results show that, compared with other algorithms, the proposed algorithm has merits in localization accuracy and robustness to resisting the tampering activities of attackers.

The work was supported by the Joint Key Program of the National Natural Science Foundation of China and Guangdong Province of China(Grant No. U2001204), by the National Natural Science Foundation of China (Grant Nos. 61873290, 61972431 and 61572534), and by the Science and Technology Program of Guangzhou, China (Grant No. 202002030470).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., Polakos, P.: Wireless sensor network virtualization: a survey. IEEE Commun. Surv. Tutor. 18(1), 553–576 (2016)

    Google Scholar 

  2. Liu, X., Li, W., Han, F., Xie, Y.: An optimization scheme of enhanced adaptive dynamic energy consumption based on joint network-channel coding in WSNs. IEEE Sens. J. 17(18), 6119–6128 (2017)

    Article  Google Scholar 

  3. Lu, W., Gong, Y., Liu, X., Wu, J., Peng, H.: Collaborative energy and information transfer in green wireless sensor networks for smart cities. IEEE Trans. Ind. Informat. 14(4), 1585–1593 (2018)

    Article  Google Scholar 

  4. Zhang, Y., Sun, L., Song, H., Cao, X.: Ubiquitous WSN for healthcare: recent advances and future prospects. IEEE Internet Things J. 1(4), 311–318 (2014)

    Article  Google Scholar 

  5. Zhou, B., Chen, Q.: On the particle-assisted stochastic search mechanism in wireless cooperative localization. IEEE Trans. Wirel. Commun. 15(7), 4765–4777 (2016)

    Google Scholar 

  6. Liu, D., Xu, Y., Huang, X.: Identification of location spoofing in wireless sensor networks in non-line-of-sight conditions. IEEE Trans. Ind. Informat. 14(6), 2375–2384 (2018)

    Article  Google Scholar 

  7. Liu, X., Yin, J., Zhang, S., Ding, B., Guo, S., Wang, K.: Range-based localization for sparse 3-D sensor networks. IEEE Internet Things J. 6(1), 753–764 (2019)

    Article  Google Scholar 

  8. Sun, Y., Zhang, F., Wan, Q.: Wireless sensor network-based localization method using TDOA measurements in MPR. IEEE Sens. J. 19(10), 3741–3750 (2019)

    Google Scholar 

  9. Xiong, H., Peng, M., Gong, S., Du, Z.: A Novel hybrid RSS and TOA positioning algorithm for multi-objective cooperative wireless sensor networks. IEEE Sens. J. 18(22), 9343–9351 (2018)

    Google Scholar 

  10. Wu, Y.I., Wang, H., Zheng, X.: WSN localization using RSS in three-dimensional space-a geometric method with closedform solution. IEEE Sens. J. 16(11), 4397–4404 (2016)

    Article  Google Scholar 

  11. Zhao, Y., Liu, X., Han, F., Han, G.: Recovery of hop count matrices for the sensing nodes in Internet of Things. IEEE Internet Things J. 7(6), 5128–5139 (2020)

    Article  Google Scholar 

  12. Ahmadi, Y., Neda, N., Ghazizadeh, R.: Range free localization in wireless sensor networks for homogeneous and non-homogeneous environment. IEEE Sens. J. 16(22), 8018–8026 (2016)

    Article  Google Scholar 

  13. Fan, J., Hu, Y., Luan, T.H., Dong, M.: DisLoc: a convex partitioning based approach for distributed 3-D localization in wireless sensor networks. IEEE Sens. J. 17(24), 8412–8423 (2017)

    Article  Google Scholar 

  14. Liu, X., Su, S., Han, F., Liu, Y., Pan, Z.: A range-based secure localization algorithm for wireless sensor networks. IEEE Sens. J. 19(2), 785–796 (2019)

    Google Scholar 

  15. Garg, R., Varna, A.L., Wu, M.: An Efficient gradient descent approach to secure localization in resource constrained wireless sensor networks. IEEE Trans. Inf. Forens. Secur. 7(2), 717–730 (2012)

    Google Scholar 

  16. Liu, D., Ning, P., Wenliang, D.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 609–619, Columbus (2005)

    Google Scholar 

  17. Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_30

    Chapter  Google Scholar 

  18. Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust statistical methods for securing wireless localization in sensor networks. In: Fourth International Symposium Information Processing in Sensor Networks, pp. 91–98, April 2005

    Google Scholar 

  19. Mukhopadhyay, B., Srirangarajan, S., Kar, S.: Robust range-based secure localization in wireless sensor networks. In: IEEE Global Communications Conference (GLOBECOM). Abu Dhabi, United Arab Emirates 2008, pp. 1–6 (2018)

    Google Scholar 

  20. Liu, D., Ning, P., Du, W.K.: Attack-resistant location estimation in sensor networks. In: IPSN: Fourth International Symposium on Information Processing in Sensor Networks, 2005, Boise, ID, USA 2005, pp. 99–106 (2005)

    Google Scholar 

  21. Capkun, S., Rasmussen, K., Cagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)

    Article  Google Scholar 

  22. Capkun, S., Hubaux, J.: Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 221–232 (2006)

    Google Scholar 

  23. Du, W., Fang, L., Ningi, P.: LAD: localization anomaly detection for wireless sensor networks. In: 19th IEEE International Parallel and Distributed Processing Symposium, pp. 1–15, CO, Denver (2005)

    Google Scholar 

  24. Jin, L., Zhang, Y.: Discrete-time zhang neural network for online time-varying nonlinear optimization with application to manipulator motion generation. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1525–1531 (2015)

    Article  MathSciNet  Google Scholar 

  25. Rappaport, T.S.: Wireless Communications: Principles and Practice. Prentice-Hall, Upper Saddle River (2002)

    MATH  Google Scholar 

  26. Koh, J.Y., Nevat, I., Leong, D., Wong, W.: Geo-spatial location spoofing detection for Internet of Things. IEEE Internet Things J. 3(6), 971–978 (2016)

    Article  Google Scholar 

  27. Zhang, P., Nagarajan, S.G., Nevat, I.: Secure location of things (SLOT): mitigating localization spoofing attacks in the Internet of Things. IEEE Internet Things J. 4(6), 2199–2206 (2017)

    Article  Google Scholar 

  28. Ho, J., Wright, M., Das, S.K.: ZoneTrust: fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Dependable Secure Comput. 9(4), 494–511 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingcheng Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y., Peng, J., Liu, X., Xie, Y., Tang, Z. (2021). An Attack-Resistant Weighted Least Squares Localization Algorithm Based on RSSI. In: Paiva, S., Lopes, S.I., Zitouni, R., Gupta, N., Lopes, S.F., Yonezawa, T. (eds) Science and Technologies for Smart Cities. SmartCity360° 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 372. Springer, Cham. https://doi.org/10.1007/978-3-030-76063-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-76063-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-76062-5

  • Online ISBN: 978-3-030-76063-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics