Skip to main content

Impact of Various Networks Security Attacks on Wireless Sensor Localization Algorithms Based upon WSN Node’s Residual Energy

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Advancement on Computer and Communication

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 34))

  • 1001 Accesses

Abstract

Presently, wireless sensor network localization algorithms attracted various researchers toward research study and experiments . The location of nodes can be determined by various localization algorithms. These wireless sensor network localization algorithms are vulnerable and can be compromised for their security. There are various network security attacks like wormhole, impersonation, compromise, and duplicate attacks which degrade the performance of WSNs. In this research paper, under various network security attacks, we have tested wireless sensor network localization algorithms under certain performance matrices like mobility of WSN node’s, size of packets, temperature, and node density to find out the compromised WSN node’s residual energy. The simulation result shows how these localization algorithms are vulnerable to network security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31, ACM (2016)

    Google Scholar 

  2. Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Secure localization algorithms for wireless sensor networks. IEEE Commun. Mag. 08, 96–101 (2008)

    Google Scholar 

  3. Güvenc, I., Chong, C.-C.: A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Commun. Surv. Tutor. 11(3), 107–124 (2009)

    Article  Google Scholar 

  4. Nick, I., Paprotny, I.: Review and comparison of spatial localization methods for low power wireless sensor networks. IEEE Sens. J. 15(10), 5971–5987 (2015)

    Article  Google Scholar 

  5. Goyal, S., Bhatia, T., Verma, A.K.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1463–1468, INDIACom (2015)

    Google Scholar 

  6. Meena, T., Nishanthy, M., Kamalanaban, E.: Cluster-based mechanism for multiple spoofing Attackers in WSN. In: International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–5 (2014)

    Google Scholar 

  7. Huang, X., Ahmed, M., Sharma, D.: Protecting from inside attacks in wireless sensor networks. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, NSW, pp. 186–191, IEEE, New York (2011)

    Google Scholar 

  8. Mesmoudi, Asma, Feham, Mohammed, Labraoui, Nabila: Wireless sensor networks localization algorithms: a comprehensive survey. Int. J. Comput. Netw. Commun. (IJCNC) 5(6), 45–64 (2013)

    Google Scholar 

  9. Yang, W., Zhu, W.T.: Voting-on-grid clustering for secure localization in wireless sensor networks. IEEE ICC 2010 Proceedings, pp. 01–05, IEEE, New York (2010)

    Google Scholar 

  10. Hong, S.H., Kim, B.K., Eom, D.S.: Localization algorithm in wireless Sensor networks with network mobility. IEEE Trans. Consum. Electron. 55(4), 1921–1928 (2009)

    Article  Google Scholar 

  11. Dai, H., Chen, A.G., Gu, X.F., He, L.: Localization algorithm for large-scale and low-density Wireless sensor networks. Electron. Lett. 47(15), 881–883 (2011)

    Article  Google Scholar 

  12. Yu, K., Guo, Y.J.: Anchor-free localization algorithm and performance analysis in wireless sensor Networks. IET Commun. 3(4), 549–560 (2009)

    Article  Google Scholar 

  13. Zhang, Y., Wu, W., Chen, Y.: A range based localization algorithm for wireless sensor networks. J. Commun. Netw. 7(4), 429 (2005)

    Article  Google Scholar 

  14. Shaukat, H.R., Hashim, F., Sali, A., Fadlee Abdul Rasid, M.: Node replication attacks in mobile wireless sensor network: a survey. Int. J. Distrib. Sens. Netw. 2014(Article ID 402541), 01–15 (2014)

    Google Scholar 

  15. Lin, Z.-T., Qu, Y.-G., Jing, L., Zhao, B.-H.: AP Web Workshops 2006 Compromised Nodes in Wireless Sensor Network, pp. 224–230, Springer, New York (2006)

    Google Scholar 

  16. https://www.codeproject.com/articles/606364/wireless-sensor-networkLocalization-simulator-v

  17. Han, G., Jiang, J., Zhang, C., Duong, T.Q., Guizani, M., Karagiannidis, G.K.: A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(3), 2220–2243 (2016)

    Article  Google Scholar 

  18. Chen, L.: Distributed range-free localization algorithm for Wireless Sensor networks. Electron. Lett. 50(12), 894–896 (2014)

    Article  Google Scholar 

  19. Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: GLOBECOM 2009—2009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1–6, IEEE, New York (2009)

    Google Scholar 

  20. Messai, M.-L.: Classification of attacks in wireless sensor networks. In: International Congress on Telecommunication and Application’14 University of A.MIRA Bejaia, Algeria, pp. 23–24 (2014)

    Google Scholar 

  21. Bharath Srinivas, V.: Spoofing attacks in wireless sensor networks. IJCSET 3(6), 201–210 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santosh Soni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soni, S., Shrivastava, M. (2018). Impact of Various Networks Security Attacks on Wireless Sensor Localization Algorithms Based upon WSN Node’s Residual Energy. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds) Proceedings of International Conference on Recent Advancement on Computer and Communication . Lecture Notes in Networks and Systems, vol 34. Springer, Singapore. https://doi.org/10.1007/978-981-10-8198-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8198-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8197-2

  • Online ISBN: 978-981-10-8198-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics