Abstract
As an important part of the Internet of things (IoT), wireless sensor networks (WSNs) have been applied in many fields. Most applications require accurate location information, hence node localization is one of the important issues in WSNs. It is very important to ensure the security of localization when WSNs are under attack. A new attack-resistant weighted least squares (ARWLS) algorithm based on RSSI was proposed in the paper. The algorithm is oriented to the problem solution for the situation that the attacker influences the system by tampering with the transmitting power in the localization mechanism. The proposed algorithm can be used in the attack scenarios. Simulations results show that, compared with other algorithms, the proposed algorithm has merits in localization accuracy and robustness to resisting the tampering activities of attackers.
The work was supported by the Joint Key Program of the National Natural Science Foundation of China and Guangdong Province of China(Grant No. U2001204), by the National Natural Science Foundation of China (Grant Nos. 61873290, 61972431 and 61572534), and by the Science and Technology Program of Guangzhou, China (Grant No. 202002030470).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., Polakos, P.: Wireless sensor network virtualization: a survey. IEEE Commun. Surv. Tutor. 18(1), 553–576 (2016)
Liu, X., Li, W., Han, F., Xie, Y.: An optimization scheme of enhanced adaptive dynamic energy consumption based on joint network-channel coding in WSNs. IEEE Sens. J. 17(18), 6119–6128 (2017)
Lu, W., Gong, Y., Liu, X., Wu, J., Peng, H.: Collaborative energy and information transfer in green wireless sensor networks for smart cities. IEEE Trans. Ind. Informat. 14(4), 1585–1593 (2018)
Zhang, Y., Sun, L., Song, H., Cao, X.: Ubiquitous WSN for healthcare: recent advances and future prospects. IEEE Internet Things J. 1(4), 311–318 (2014)
Zhou, B., Chen, Q.: On the particle-assisted stochastic search mechanism in wireless cooperative localization. IEEE Trans. Wirel. Commun. 15(7), 4765–4777 (2016)
Liu, D., Xu, Y., Huang, X.: Identification of location spoofing in wireless sensor networks in non-line-of-sight conditions. IEEE Trans. Ind. Informat. 14(6), 2375–2384 (2018)
Liu, X., Yin, J., Zhang, S., Ding, B., Guo, S., Wang, K.: Range-based localization for sparse 3-D sensor networks. IEEE Internet Things J. 6(1), 753–764 (2019)
Sun, Y., Zhang, F., Wan, Q.: Wireless sensor network-based localization method using TDOA measurements in MPR. IEEE Sens. J. 19(10), 3741–3750 (2019)
Xiong, H., Peng, M., Gong, S., Du, Z.: A Novel hybrid RSS and TOA positioning algorithm for multi-objective cooperative wireless sensor networks. IEEE Sens. J. 18(22), 9343–9351 (2018)
Wu, Y.I., Wang, H., Zheng, X.: WSN localization using RSS in three-dimensional space-a geometric method with closedform solution. IEEE Sens. J. 16(11), 4397–4404 (2016)
Zhao, Y., Liu, X., Han, F., Han, G.: Recovery of hop count matrices for the sensing nodes in Internet of Things. IEEE Internet Things J. 7(6), 5128–5139 (2020)
Ahmadi, Y., Neda, N., Ghazizadeh, R.: Range free localization in wireless sensor networks for homogeneous and non-homogeneous environment. IEEE Sens. J. 16(22), 8018–8026 (2016)
Fan, J., Hu, Y., Luan, T.H., Dong, M.: DisLoc: a convex partitioning based approach for distributed 3-D localization in wireless sensor networks. IEEE Sens. J. 17(24), 8412–8423 (2017)
Liu, X., Su, S., Han, F., Liu, Y., Pan, Z.: A range-based secure localization algorithm for wireless sensor networks. IEEE Sens. J. 19(2), 785–796 (2019)
Garg, R., Varna, A.L., Wu, M.: An Efficient gradient descent approach to secure localization in resource constrained wireless sensor networks. IEEE Trans. Inf. Forens. Secur. 7(2), 717–730 (2012)
Liu, D., Ning, P., Wenliang, D.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 609–619, Columbus (2005)
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_30
Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust statistical methods for securing wireless localization in sensor networks. In: Fourth International Symposium Information Processing in Sensor Networks, pp. 91–98, April 2005
Mukhopadhyay, B., Srirangarajan, S., Kar, S.: Robust range-based secure localization in wireless sensor networks. In: IEEE Global Communications Conference (GLOBECOM). Abu Dhabi, United Arab Emirates 2008, pp. 1–6 (2018)
Liu, D., Ning, P., Du, W.K.: Attack-resistant location estimation in sensor networks. In: IPSN: Fourth International Symposium on Information Processing in Sensor Networks, 2005, Boise, ID, USA 2005, pp. 99–106 (2005)
Capkun, S., Rasmussen, K., Cagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)
Capkun, S., Hubaux, J.: Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 221–232 (2006)
Du, W., Fang, L., Ningi, P.: LAD: localization anomaly detection for wireless sensor networks. In: 19th IEEE International Parallel and Distributed Processing Symposium, pp. 1–15, CO, Denver (2005)
Jin, L., Zhang, Y.: Discrete-time zhang neural network for online time-varying nonlinear optimization with application to manipulator motion generation. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1525–1531 (2015)
Rappaport, T.S.: Wireless Communications: Principles and Practice. Prentice-Hall, Upper Saddle River (2002)
Koh, J.Y., Nevat, I., Leong, D., Wong, W.: Geo-spatial location spoofing detection for Internet of Things. IEEE Internet Things J. 3(6), 971–978 (2016)
Zhang, P., Nagarajan, S.G., Nevat, I.: Secure location of things (SLOT): mitigating localization spoofing attacks in the Internet of Things. IEEE Internet Things J. 4(6), 2199–2206 (2017)
Ho, J., Wright, M., Das, S.K.: ZoneTrust: fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Dependable Secure Comput. 9(4), 494–511 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Liu, Y., Peng, J., Liu, X., Xie, Y., Tang, Z. (2021). An Attack-Resistant Weighted Least Squares Localization Algorithm Based on RSSI. In: Paiva, S., Lopes, S.I., Zitouni, R., Gupta, N., Lopes, S.F., Yonezawa, T. (eds) Science and Technologies for Smart Cities. SmartCity360° 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 372. Springer, Cham. https://doi.org/10.1007/978-3-030-76063-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-76063-2_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76062-5
Online ISBN: 978-3-030-76063-2
eBook Packages: Computer ScienceComputer Science (R0)