Volume 30 Issue 4
Jul.  2021
Turn off MathJax
Article Contents
LI Peng, YU Xiaotian, XU He, et al., “Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks,” Chinese Journal of Electronics, vol. 30, no. 4, pp. 759-768, 2021, doi: 10.1049/cje.2021.05.019
Citation: LI Peng, YU Xiaotian, XU He, et al., “Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks,” Chinese Journal of Electronics, vol. 30, no. 4, pp. 759-768, 2021, doi: 10.1049/cje.2021.05.019

Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks

doi: 10.1049/cje.2021.05.019
Funds:

This work is supported by the National Natural Science Foundation of China (No.61672296, No.61872196, No.61872194, No.61902196), Scientific and Technological Support Project of Jiangsu Province (No.BE2017166, No.BE2019740), Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province (No.18KJA520008), and Six Talent Peaks Project of Jiangsu Province (No.RJFW-111).

  • Received Date: 2020-08-05
    Available Online: 2021-07-19
  • Publish Date: 2021-07-05
  • Wireless sensor networks have critical applications in various fields, and the algorithm of their secure localization has become a vital technology to support a network. In the light of the self-organization, random deployment and dynamic topology, the localization process is vulnerable to various kinds of malicious attacks. The model of dynamic trust management for a given node is proposed to deal with security concerns in wireless sensor networks. The trust computation is divided into three stages, which are the stage of trust initialization, trust establishment, and trust evolution. The initial value of a global trust relationship is established through a corresponding global trust relation graph in the initial stage of trust. The trust value of each node is calculated by the attribute value in the stage of trust establishment. In the evolution of trust, the iterative process of trust value is accelerated via the finite state machine. Compared with the existing wireless sensor networks, simulation results show that the proposed security localization technology method can resist many kinds of attacks with low communication and time consumption.

  • loading
  • W. W. Chang, T. J. Sung, H. W. Huang, et al., "A smart medication system using wireless sensor network technologies", Sensors and Actuators A Physical, Vol.172, No.1, pp.315-321, 2011.
    A. S. Elqusy, S. E. Essa and A. Elsayed, "A survey of wireless sensor network attacks", Proceedings of the HICSS-33, Maui, HI, USA, pp.4-7, 2017.
    J. Chen and H. L. Zhang, "Survey on wireless sensor network security", Journal of Harbin Institute of Technology, Vol.43, No.7, pp.90-95, 2011.
    E. Q. Shahra, T. R. Sheltami and E. Shakshuki, "A comparative study of range-free and range-based localization protocols for wireless sensor network:using cooja simulator", Sensor Technology:Concepts, Methodologies, Tools, and Applications, Vol.2020, No.1, pp.1522-1537, 2020.
    M. Venkatakrishnan and A. K. Yuvashree, "Survey and comparison on range free-localization schemes based on anchors count in WSN model", International Journal for Innovative Research in Science and Technology, Vol.1, No.9, pp.186-192, 2015.
    B. B. Das and S. K. Ram, "Localization using beacon in wireless sensor networks to detect faulty nodes and accuracy improvement through DV-Hop algorithm", 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, pp.1-5, 2016.
    S. Shen, B. Yang, K. Qian, et al., "An improved amorphous localization algorithm for wireless sensor networks", 2016 International Conference on Networking and Network Applications (NaNA), Hakodate City, Hokkaido, Japan, pp.69-72, 2016.
    G. Oddi, A. Pietrabissa, F. Liberati, et al., "An any-sink energy-efficient routing protocol in multi-hop wireless sensor networks for planetary exploration", International Journal of Communication Systems, Vol.30, No.7, pp.1-5, 2017.
    G. Han, L. Liu, J. Jiang, et al., "A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks", Sensors, Vol.16, No.2, pp.229, 2016.
    W. Luo, W. Ma and Q. Gao, "A dynamic trust management system for wireless sensor networks", Security and Communication Networks, Vol.9, No.7, pp.613-621, 2016.
    A. Diaz and P. Sanchez, "Simulation of attacks for security in wireless sensor network", Sensors, Vol.16, No.11, pp.1932, 2016.
    D. Amulya and C. Chinnaswamy, "Sinkhole attack:A security vulnerability in wireless sensor networks", International Journal for Advance Research and Development, Vol.2, No.2, pp.993-998, 2017.
    S. P. Marsh, "Formalising trust as a computational concept", Ph.D. Thes.s University of Stirling, UK, 1994.
    M. Blaze, J. Feigenbaum and J. Lacy, "Decentralized trust management", IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp.164-173, 1996.
    I. Thielmann and B. E. Hilbig, "Trust:An integrative review from a person-situation perspective", Review of General Psychology, Vol.19, No.3, pp.249-277, 2015.
    S. Ganeriwal, L. K. Balzano and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks", ACM Transactions on Sensor Networks (TOSN), Vol.4, No.3, pp.1-37, 2008.
    J. Liu and B. L. Jiao, "Point-to-multipoint temperature sensor network based on wireless", Instrument Technique and Sensor, Vol.2009, No.8, pp.105-107, 2009.
    M. Erol-Kantarci, H. T. Mouftah and S. Oktug, "A survey of architectures and localization techniques for underwater acoustic sensor", IEEE Communications Surveys and Tutorials, Vol.13, No.3, pp.487-502, 2011.
    J. Guo, M. A. Jianfeng and T. Wan, "A mutual evaluation based trust management method for wireless sensor networks", Chinese Journal of Electronics, Vol.26, No.2, pp.407-415, 2017.
    S. Guo, V. Leung and Z. Qian, "A permutation-based multi-polynomial scheme for pairwise key establishment in sensor networks", IEEE International Conference on Communications, Cape Town, South Africa, pp.1-5, 2010.
    J. Lee, W. Chung and E. Kim, "A new kernelized approach to wireless sensor network localization", Information Sciences, Vol.243, No.9, pp.20-38, 2013.
    J. Hwang, T. He and Y. Kim, "Secure localization with phantom node detection", Ad Hoc Networks, Vol.6, No.7, pp.1031-1050, 2008.
    M. M. Patel and A. Aggarwal, "Security attacks in wireless sensor networks:a survey", International Conference on Intelligent Systems and Signal Processing (ISSP), Florida State, USA, pp.329-333, 2013.
    A. Singhal, P. Bansal, M. D. Mourya, et al., "Secure localization in wireless sensor networks survey", Journal of Communications, Vol.6, No.6, pp.460-470, 2011.
    M. Jadliwala, S. Zhong, S. J. Upadhyaya, et al., "Secure distance-Based localization in the presence of cheating beacon nodes", IEEE Transactions on Mobile Computing, Vol.9, No.6, pp.810-823, 2010.
    N. I. Mohd and M. Z. Abdullah, "Network analyzer development:independent data OPNET simulation tool and real network comparison", Management and Technology, Vol.1, No.1, pp.97-105, 2010.
    C. Duma, N. Shahmehri and G. Caronni, "Dynamic trust metrics for peer-to-peer systems", Proceedings of Sixteenth International Workshop on Database and Expert Systems Applications, Copenhagen, Denmark, pp.776-781, 2005.
    C. M. Yu, Y. T. Tsou, C. S. Lu, et al., "Localized algorithms for detection of node replication attacks in mobile sensor networks", IEEE Transactions on Information Forensics and Security, Vol.8, No.5, pp.754-768, 2013.
    P. Guo, J. Wang, X. H. Geng, et al., "A variable threshold-value authentication architecture for wireless mesh networks", Journal of Internet Technology, Vol.15, No.6, pp.929-935, 2014.
    Z. Yan, P. Zhang and A. V. Vasilakos, "A survey on trust management for Internet of Things", Journal of Network and Computer Applications, Vol.2014, No.42, pp.120-134, 2014.
    A. Ahmed, K. A. Bakar and M. I. Channa, "Performance analysis of Ad hoc on demand distance vector protocol with blackhole attack in WSN", Journal of Computer Science, Vol.10, No.8, pp.1466-1472, 2014.
    A. B. Can and B. Bhargava, "A self-organizing trust model for peer-to-peer systems", IEEE Transactions on Dependable and Secure Computing, Vol.10, No.1, pp.14-27, 2013.
    W. Yang, J. Duan, Y. Liu, et al., "Research and application on improved fuzzy clustering algorithm", Journal of Computational and Theoretical Nanoscience, Vol.13, No.7, pp.4362-4367, 2016.
    R. Huang and G. V. Zaruba, "Static path planning for mobile beacons to localize sensor networks", Fifth Annual IEEE International Conference on Pervasive Computing And Communications Workshops (PerComW'07), White Plains, New York, USA, pp.323-33, 2007.
    S. Ganeriwal, L. K. Balzano and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks", ACM Transactions on Sensor Networks, Vol.4, No.3, pp.1-37, 2008.
    H. Shen and X. G. Ye, "Research on the Location Attack Based on Multiple Counterfeit Identities Technology in Sensor Networks", International Conference on Wireless Communication and Sensor Network, Wuhan, China, pp.213-216, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (632) PDF downloads(42) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return