Abstract
Presently, wireless sensor network localization algorithms attracted various researchers toward research study and experiments . The location of nodes can be determined by various localization algorithms. These wireless sensor network localization algorithms are vulnerable and can be compromised for their security. There are various network security attacks like wormhole, impersonation, compromise, and duplicate attacks which degrade the performance of WSNs. In this research paper, under various network security attacks, we have tested wireless sensor network localization algorithms under certain performance matrices like mobility of WSN node’s, size of packets, temperature, and node density to find out the compromised WSN node’s residual energy. The simulation result shows how these localization algorithms are vulnerable to network security attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31, ACM (2016)
Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Secure localization algorithms for wireless sensor networks. IEEE Commun. Mag. 08, 96–101 (2008)
Güvenc, I., Chong, C.-C.: A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Commun. Surv. Tutor. 11(3), 107–124 (2009)
Nick, I., Paprotny, I.: Review and comparison of spatial localization methods for low power wireless sensor networks. IEEE Sens. J. 15(10), 5971–5987 (2015)
Goyal, S., Bhatia, T., Verma, A.K.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1463–1468, INDIACom (2015)
Meena, T., Nishanthy, M., Kamalanaban, E.: Cluster-based mechanism for multiple spoofing Attackers in WSN. In: International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–5 (2014)
Huang, X., Ahmed, M., Sharma, D.: Protecting from inside attacks in wireless sensor networks. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, NSW, pp. 186–191, IEEE, New York (2011)
Mesmoudi, Asma, Feham, Mohammed, Labraoui, Nabila: Wireless sensor networks localization algorithms: a comprehensive survey. Int. J. Comput. Netw. Commun. (IJCNC) 5(6), 45–64 (2013)
Yang, W., Zhu, W.T.: Voting-on-grid clustering for secure localization in wireless sensor networks. IEEE ICC 2010 Proceedings, pp. 01–05, IEEE, New York (2010)
Hong, S.H., Kim, B.K., Eom, D.S.: Localization algorithm in wireless Sensor networks with network mobility. IEEE Trans. Consum. Electron. 55(4), 1921–1928 (2009)
Dai, H., Chen, A.G., Gu, X.F., He, L.: Localization algorithm for large-scale and low-density Wireless sensor networks. Electron. Lett. 47(15), 881–883 (2011)
Yu, K., Guo, Y.J.: Anchor-free localization algorithm and performance analysis in wireless sensor Networks. IET Commun. 3(4), 549–560 (2009)
Zhang, Y., Wu, W., Chen, Y.: A range based localization algorithm for wireless sensor networks. J. Commun. Netw. 7(4), 429 (2005)
Shaukat, H.R., Hashim, F., Sali, A., Fadlee Abdul Rasid, M.: Node replication attacks in mobile wireless sensor network: a survey. Int. J. Distrib. Sens. Netw. 2014(Article ID 402541), 01–15 (2014)
Lin, Z.-T., Qu, Y.-G., Jing, L., Zhao, B.-H.: AP Web Workshops 2006 Compromised Nodes in Wireless Sensor Network, pp. 224–230, Springer, New York (2006)
https://www.codeproject.com/articles/606364/wireless-sensor-networkLocalization-simulator-v
Han, G., Jiang, J., Zhang, C., Duong, T.Q., Guizani, M., Karagiannidis, G.K.: A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(3), 2220–2243 (2016)
Chen, L.: Distributed range-free localization algorithm for Wireless Sensor networks. Electron. Lett. 50(12), 894–896 (2014)
Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: GLOBECOM 2009—2009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1–6, IEEE, New York (2009)
Messai, M.-L.: Classification of attacks in wireless sensor networks. In: International Congress on Telecommunication and Application’14 University of A.MIRA Bejaia, Algeria, pp. 23–24 (2014)
Bharath Srinivas, V.: Spoofing attacks in wireless sensor networks. IJCSET 3(6), 201–210 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Soni, S., Shrivastava, M. (2018). Impact of Various Networks Security Attacks on Wireless Sensor Localization Algorithms Based upon WSN Node’s Residual Energy. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds) Proceedings of International Conference on Recent Advancement on Computer and Communication . Lecture Notes in Networks and Systems, vol 34. Springer, Singapore. https://doi.org/10.1007/978-981-10-8198-9_1
Download citation
DOI: https://doi.org/10.1007/978-981-10-8198-9_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8197-2
Online ISBN: 978-981-10-8198-9
eBook Packages: EngineeringEngineering (R0)