Skip to main content

A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Information Science and Applications 2017 (ICISA 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Included in the following conference series:

  • 2752 Accesses

Abstract

This paper proposed a novel secure localization algorithm based on confidence constraint for Underwater Wireless Sensor Networks (UWSNs). In recent years, UWSNs have attracted a rapidly growing interest from ocean battlefield surveillance. As essential technology, secure localization is crucial to the location-based applications. However, the localization process has been restricted by the adverse battlefield environments, e.g. the confidence problem of reference nodes and information due to disturbances or attacks, which lead to obvious degradation of localization security and accuracy. To solve this issue, we transformed the secure localization into a confidence constraint satisfaction problem. Zero-sum game method has been utilized to deal with the confidence problem of reference information. Simulation results show that our algorithm is an effective and efficient approach to localization for UWSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Erol-Kantarci, M., Mouftah, H.T., Oktug, S.: A survey of architectures and localization techniques for underwater acoustic sensor networks. Commun. Surv. Tutorials IEEE 13(3), 487–502 (2011)

    Article  Google Scholar 

  2. Tan, H., Diamant, R., Seah, W.K.G., Waldmeyer, M.: A survey of techniques and challenges in underwater localization. Ocean Eng. 38(14–15), 1663–1676 (2011)

    Article  Google Scholar 

  3. Xing, T., Jian, L.: Cooperative positioning in underwater sensor networks. IEEE Trans. Signal Process. 58(11), 5860–5871 (2010)

    Article  MathSciNet  Google Scholar 

  4. Alfao, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of 7th Annual Communication Networks and Services Research Conference, pp. 86–93 (2009)

    Google Scholar 

  5. Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing, pp. 296–309 (2009)

    Google Scholar 

  6. Jaulin, L., Kieffer, M., Didrit, O., Walter, E.: Applied Interval Analysis, with Examples in Parameter and State Estimation, Robust Control and Robotics. Springer, London (2001)

    MATH  Google Scholar 

  7. Cheng, G., Chen, H.: Game model for switch migrations in software-defined network. Electron. Lett. 50(23), 1699–1700 (2014)

    Article  Google Scholar 

  8. Ning, G., Yang, D., Tie, L., Cai, K.-Y.: Nash equilibrium of time-delay interaction complex networks subject to persistent disturbances. IET Control Theory and Applications (2012)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the National Natural Science Foundation of China (grant no. 61501488).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongji Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Xu, X., Wang, G., Ren, Y., Liu, X. (2017). A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics