Skip to main content

A Distributed Secured Localization Scheme for Wireless Sensor Networks

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 309))

Abstract

Nowadays, location-aware security policies play a key role in wireless sensor networks. In this paper, we propose to develop a distributed secured localization scheme that validates the reliability of location information associated with event reports. We make the anchor nodes are deployed such that they form connected sensor coverage and their routing information to these anchor nodes, thereby avoiding the sink overload problem. Since this scheme involves distributed anchor nodes for verification, it has less overhead and delay. By simulation results, we show that our proposed scheme attains good delivery ratio with reduced delay and overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alfaro, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of the Seventh Annual Communication Networks and Services Research Conference (2009)

    Google Scholar 

  2. Chen, H., et al.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wireless Commun. Networking 2010, 8 (2010)

    Google Scholar 

  3. Soosahabi, R., Naraghi-Pour, M., Perkins, D., Bayoumi, M.A.: Optimal probabilistic encryption for secure detection in wireless sensor networks information forensics and security. IEEE Transactions on Digital Object Identifier, vol. 9, PP. 375–385 (2014). doi: 10.1109/TIFS.2014.2298813

  4. Shih, K.P., Deng, D.J., Chang, R.S., Chen, H.C.: On connected target coverage for wireless heterogeneous sensor networks with multiple sensing units. Sensors 2009(9), 5173–5200 (2009). doi:10.3390/s90705173

    Article  Google Scholar 

  5. Elbasi, E., Ozdemir, S.: Secure data aggregation in wireless multimedia sensor networks via watermarking. In: Application of Information and Communication Technologies (AICT), 2012 6th International Conference on Digital Object Identifier, PP. 1–6 (2012). doi: 10.1109/ICAICT.2012.6398501

  6. Ben Othman, S., Alzaid, H., Trad, A., Youssef, H.: An efficient secure data aggregation scheme for wireless sensor networks. In: Information, Intelligence, Systems and Applications (IISA), 2013 4th International Conference on Digital Object Identifier, PP. 1–4 (2013). doi: 10.1109/IISA.2013.6623701

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lakshmana Phaneendra Maguluri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Maguluri, L.P., Basha, S.M., Ramesh, S., Amanatulla, M. (2015). A Distributed Secured Localization Scheme for Wireless Sensor Networks. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2009-1_14

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2008-4

  • Online ISBN: 978-81-322-2009-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics