Lightweight Secure Localization Approach in Wireless Sensor Networks

Abstract : This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme often introduce high communication overhead and their security relies on the capability of the attackers. In this paper, we propose a lightweight secure ToA-based localization scheme in a WSN by exploiting the noise feature caused by external distance attacks. In comparison with the prior scheme, our scheme provides lower communication overhead and a higher level of security. We theoretically analyze the performance of the proposed scheme over fading channels and derive the closed-form expressions. We implemented our scheme and conducted extensive performance comparisons through simulations. Our experimental results show that the closed-form expressions for the detection performance perfectly match with their simulation results as we expected. The communication overhead of the proposed scheme is saved by 72.8% than that of the prior scheme for different numbers of anchors and is independent of the times of measurements.
 EXISTING SYSTEM :
 ? When a WSN is deployed in hostile environments, it is vulnerable to threats and risks. Many attacks exist, e.g., wormhole, sinkhole and sybil attacks, to make the estimated positions incorrect. ? Roughly speaking, existing localization schemes of WSNs are classified into two categories: range-based schemes and range-free schemes. ? In this phase, frequency hopping and RTS/CTS mechanism are used to confirm the existence of a wormhole and repair the neighbor lists. After eliminating the illegal connections, the DV-Hop localization procedure can be successfully conducted. ? Usually, the localization process can be divided into two steps: 1) information acquisition and 2) position determination.
 DISADVANTAGE :
 ? Most of the security solutions available in literature address a specific security problem in sensor networks ignoring other issues. ? Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. ? The fundamental problem we realize in wireless sensor network security is to initialize the secure communication between sensor nodes by setting up secret keys between communicating nodes. ? Because of the randomness of deployment, it is not feasible to know the exact location of neighbors, but knowing the set of likely neighbors is realistic, this issue is addressed using the random key pre-distribution.
 PROPOSED SYSTEM :
 • In, based on an attack-driven model specified with the Petri net, an enhanced secure localization scheme (ESLS) is proposed, which extends the idea in and defends against not only distance reduction attacks but also distance enlargement attacks. • A number of schemes have been proposed to secure the positions of unknown nodes, which are called secure localization for unknown nodes. • In, the authors propose a distributed range-free localization algorithm called SeRLoc, which does not require any communication among unknown nodes. • Several Verification schemes are proposed based on the distance bounding protocol.
 ADVANTAGE :
 ? In contrast, the active attackers’ goal is to disrupt the function of the network and degrade its performance. ? This idea later converged to pseudo random generation of keys which is energy efficient as compared to previous key management schemes. ? They presented a technique to reduce the computation at sensors so that their schemes can be implemented efficiently. ? We adapt the energy efficient secure data transmission algorithms by and modify it with our secure triple-key management scheme to make it resilient against attacks in wireless sensor networks. ? The beacon nodes are used to provide location information to the sensor nodes as well as to perform detect signals from other beacon nodes.

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com