Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack

Seyed Saber BANİHASHEMİAN, [1] , Fazlollah ADİBNİA [2] , Mehdi Agha SARRAM [3]


 Different range-free algorithms are proposed for location estimation in Wireless Sensor Networks. In these algorithms, the network is assumed to have no error and false data. This article attempts to evaluate and compare the effect of malicious data produced by node compromised attacks in some of the range-free algorithms: DV-hop, LSVM, and NN. The false data may be produced by the malicious anchor nodes or compromised sensor nodes. The resistance of these algorithms against node compromise attacks is compared. The results show that although DV-hop has less localization error compared to the two other algorithms in a normal condition, in the case of attacks LSVM has less localization error. Further, in this research work, a new criterion is proposed for studying and comparing the border problem issue in the localization algorithms. Using the simulation results from various algorithms, the outcomes have been used for comparison, where it can be considered that LSVM has better performance in the border problem compared with the other studied algorithms.

Localization, Wireless Sensor Networks, Range-free, Node compromise attack, border problem
  • [1] C. Y. Chong, S. Kumar, Sensor networks: Evolution, opportunities, and challenges. Proceedings ofthe IEEE, 91(8), (2003), 1247-1256.
  • [2] C. Savarese, J. Rabay, Robust Positioning Algorithms for Distributed Ad-Hoc Wireless SensorNetworks, General Track of the annual conference on USENIX Annual Technical Conference, (2002),317-327.
  • [3] A. Savvides, C. C. Han, M. Srivastava, Dynamic Fine-Grained Localization in Ad-Hoc Networks ofSensors, 7th annual international conference on Mobile computing and networking, (2001), 166-179.
  • [4] D. Niculescu, B. Nath, Ad Hoc Positioning System (APS), Global Telecommunications Conference,(2001), 2926-2931.
  • [5] S. Capkun, M. Cagalj, M. Srivastava, Securing Localization with Hidden and Mobile Base Stations,25th IEEE Conference on Computer Communications, (2006), 1-10.
  • [6] S. Capkun, K. Rasmussen, M. Cagalj, M. Srivastava, Secure Location Verification with Hidden andMobile Base Stations, IEEE Transactions on Mobile Computing, 7(4), (2008), 470-483.
  • [7] T. He, C. Huang, B. M. Blum, J. A. Stankovic, T. Abdelzaher, Range-Free Localization Schemesfor Large Scale Sensor Networks, 9th Annual International Conference on Mobile Computing andNetworking, (2003), 81-95.
  • [8] L. Lazos, R. Poovendran, SeRLoc: Secure Range-Independent Localization for Wireless SensorNetworks, 3rd ACM workshop on Wireless security, (2004), 21-30.
  • [9] Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localizationin Sensor Networks, 4th international symposium on Information processing in sensor networks,(2005), 1-8.
  • [10] Y. Zhang, W. Liu, Y. Fang, D. Wu, Secure Localization and Authentication in Ultra-WidebandSensor Networks, IEEE Journal on Selected Areas in Communications, 24(4), (2006), 829-835.
  • [11] Y. Zhang, W. Liu, W. Lou, Y. Fang, Location-Based Compromise-Tolerant Security Mechanismsfor Wireless Sensor Networks, IEEE Journal on Selected Areas in Communications, 24(2), (2006), 247-260.
  • [12] R. Garg, A. Varna, M. Wu, An Efficient Gradient Descent Approach to Secure Localization inResource Constrained Wireless Sensor Networks, IEEE Transactions on Information Forensics andSecurity, 7(2), (2012), 717-730.
  • [13] Y. Zeng, J. Cao, J. Hong, S. Zhang, L. Xie, Secure Localization and Location Verification inWireless Sensor Networks: A Survey, The Journal of Supercomputing, 64(3), (2010), 685-701.
  • [14] G. Han, J. Jiang, L. Shu, M. Guizani, S. Nishio, A Two-Step Secure Localization for WirelessSensor Networks, The Computer Journal, 56(10), (2012), 1154-1166.
  • [15] H. Chen, W. Lou, Z. Wang, J. Wu, Z. Wang, A. Xia, Securing DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks, Pervasive and Mobile Computing, 16(1), (2015), 22-35.
  • [16] D. Tran, T. Nguyen, Localization in Wireless Sensor Networks Based on Support VectorMachines, IEEE Transactions on Parallel and Distributed Systems, 19(7), (2008), 981-994.
  • [17] A. Chatterjee, A Fletcher-Reeves Conjugate Gradient Neural-Network-Based LocalizationAlgorithm for Wireless Sensor Networks, IEEE Transactions on Vehicular Technology, 59(2), (2010),823-830.
  • [18] C. Wang, J. Chen, Y. Sun, Sensor Network Localization Using Kernel Spectral Regression,Wireless Communications and Mobile Computing, 10(8), (2009), 1045-1054.
  • [19] V. Chaurasiya, N. Jain, G. Nandi, A Novel Distance Estimation Approach for 3D Localization inWireless Sensor Network Using Multi Dimensional Scaling, Information Fusion, 15(1), (2014), 5-18.
  • [20] S. Afzal, H. Beigy, A Localization Algorithm for Large Scale Mobile Wireless Sensor Networks:A Learning Approach, The Journal of Supercomputing, 69(1), (2014), 98-120.
  • [21] J. Chen, C. Wang, Y. Sun, X. Shen, Semi-supervised Laplacian Regularized Least SquaresAlgorithm for Localization in Wireless Sensor Networks, Computer Networks, 55(10), (2011), 2481-2491.
  • [22] J. Lee, B. Choi, E. Kim, Novel Range-Free Localization Based on Multidimensional SupportVector Regression Trained in the Primal Space, IEEE Transactions on Neural Networks and LearningSystems, 24(7), (2013), 1099-1113.
  • [23] V. S. Feng, T. C. Wang, S. Y. Chang, H. P. Ma, Location Estimation in Indoor Wireless Networksby Hierarchical Support Vector Machines with Fast Learning Algorithm, International Conference onSystem Science and Engineering, (2010), 321-326.
  • [24] S. Yun, J. Lee, W. Chung, E. Kim, S. Kim, A Soft Computing Approach to Localization inWireless Sensor Networks, Expert Systems with Applications, 36(4), (2009), 7552-7561.
  • [25] A. Velimirovic, G. Djordjevic, M. Velimirovic, M. Jovanovic, Fuzzy Ring-Overlapping RangeFree(FRORF) Localization Method for Wireless Sensor Networks, Computer Communications, 35(13),(2012), 1590-1600.
  • [26] A. Boukerche, H. Oliveira, E. Nakamura , A. Loureiro, Secure Localization Algorithms forWireless Sensor Networks, IEEE Communications Magazine, 46(4), (2008), 96-101.
  • [27] M. M. Hamed, M.G Khalafallah, E.A. Hassanien, Prediction of Wastewater Treatment PlantPerformance using Artificial Neural Networks, Environmental Modelling & Software, 19(10), (2004),919-928.
  • [28] W. S. Sarle, Neural Network FAQ, Part 1 of 7: Introduction, Periodic Posting to the UsenetNewsgroup Comp. Ai. Neural-Nets. (2002), URL: ftp://ftp.sas.com/pub/neural/FAQ.html.
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Yazar: Seyed Saber BANİHASHEMİAN,

Yazar: Fazlollah ADİBNİA

Yazar: Mehdi Agha SARRAM

Tarihler

Yayımlanma Tarihi : 1 Mayıs 2017

Bibtex @araştırma makalesi { cankujse344446, journal = {Cankaya University Journal of Science and Engineering}, issn = {}, eissn = {2564-7954}, address = {}, publisher = {Çankaya Üniversitesi}, year = {2017}, volume = {14}, pages = { - }, doi = {}, title = {Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack}, key = {cite}, author = {Bani̇hashemi̇an,, Seyed Saber and Adi̇bni̇a, Fazlollah and Sarram, Mehdi Agha} }
APA Bani̇hashemi̇an,, S , Adi̇bni̇a, F , Sarram, M . (2017). Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack . Cankaya University Journal of Science and Engineering , 14 (1) , . Retrieved from https://dergipark.org.tr/tr/pub/cankujse/issue/31470/344446
MLA Bani̇hashemi̇an,, S , Adi̇bni̇a, F , Sarram, M . "Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack" . Cankaya University Journal of Science and Engineering 14 (2017 ): <https://dergipark.org.tr/tr/pub/cankujse/issue/31470/344446>
Chicago Bani̇hashemi̇an,, S , Adi̇bni̇a, F , Sarram, M . "Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack". Cankaya University Journal of Science and Engineering 14 (2017 ):
RIS TY - JOUR T1 - Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack AU - Seyed Saber Bani̇hashemi̇an, , Fazlollah Adi̇bni̇a , Mehdi Agha Sarram Y1 - 2017 PY - 2017 N1 - DO - T2 - Cankaya University Journal of Science and Engineering JF - Journal JO - JOR SP - EP - VL - 14 IS - 1 SN - -2564-7954 M3 - UR - Y2 - 2020 ER -
EndNote %0 Cankaya University Journal of Science and Engineering Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack %A Seyed Saber Bani̇hashemi̇an, , Fazlollah Adi̇bni̇a , Mehdi Agha Sarram %T Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack %D 2017 %J Cankaya University Journal of Science and Engineering %P -2564-7954 %V 14 %N 1 %R %U
ISNAD Bani̇hashemi̇an,, Seyed Saber , Adi̇bni̇a, Fazlollah , Sarram, Mehdi Agha . "Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack". Cankaya University Journal of Science and Engineering 14 / 1 (Mayıs 2017): - .
AMA Bani̇hashemi̇an, S , Adi̇bni̇a F , Sarram M . Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack. Cankaya University Journal of Science and Engineering. 2017; 14(1): -.
Vancouver Bani̇hashemi̇an, S , Adi̇bni̇a F , Sarram M . Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack. Cankaya University Journal of Science and Engineering. 2017; 14(1): -.

Makalenin Yazarları
Seyed Saber BANİHASHEMİAN, [1]
Fazlollah ADİBNİA [2]
Mehdi Agha SARRAM [3]