Skip to main content

Advertisement

Log in

A robust localization algorithm in wireless sensor networks

  • Research Article
  • Published:
Frontiers of Computer Science in China Aims and scope Submit manuscript

Abstract

Most of the state-of-the-art localization algorithms in wireless sensor networks (WSNs) are vulnerable to various kinds of location attacks, whereas secure localization schemes proposed so far are too complex to apply to power constrainedWSNs. This paper provides a distributed robust localization algorithm called Bilateration that employs a unified way to deal with all kinds of location attacks as well as other kinds of information distortion caused by node malfunction or abnormal environmental noise. Bilateration directly calculates two candidate positions for every two heard anchors, and then uses the average of a maximum set of close-by candidate positions as the location estimation. The basic idea behind Bilateration is that candidate positions calculated from reasonable (i.e., error bounded) anchor positions and distance measurements tend to be close to each other, whereas candidate positions calculated from false anchor positions or distance measurements are highly unlikely to be close to each other if false information are not collaborated. By using ilateration instead of classical multilateration to compute location estimation, Bilateration requires much lower computational complexity, yet still retains the same localization accuracy. This paper also evaluates and compares Bilateration with three multilateration-based localization algorithms, and the simulation results show that Bilateration achieves the best comprehensive performance and is more suitable to real wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Niculescu D, Nath B. Ad hoc positioning system (APS). In: Proceedings of the IEEE Global Communications Conference of GLOBECOM. San Antonio: IEEE Computer Society, 2001, 2926–2931

    Google Scholar 

  2. Bulusu N, Heidemann J, Estrin D. GPS-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 2000, 7(5): 28–34

    Article  Google Scholar 

  3. He T, Huang C. Range-free localization schemes for large scale sensor networks. In: Proceedings of the 9th annual international conference on Mobile computing and networking. San Diego: ACM, 2003, 81–95

    Chapter  Google Scholar 

  4. Niculescu D, Nath B. DV based positioning in ad hoc networks. Journal of Telecommunication Systems, 2003, 22(1–4): 267–280

    Article  Google Scholar 

  5. Nagpal R, et al. Organizing a global coordinate system from local information on an ad hoc sensor network. In: Proceedings of 2nd International Workshop on IPSN. Berlin: Springer, 2003, 333–348

    Google Scholar 

  6. Doherty L, Pister K. Convex position estimation in wireless sensor networks. In: Proceedings of 20th Annual Joint Conference of the IEEE Computer and Communications Societies. Anchorage, AK, USA: IEEE, 2001, 1655–1663

    Google Scholar 

  7. Bahl P, Padmanabhan V N. RADAR: an in-building RFbased user location and tracking system. In: Proceedings of 19th Annual Joint Conference of the IEEE Computer and Communications Societies. Tel-Aviv, Israel: IEEE Computer Society, 2000, 775–784

    Google Scholar 

  8. Niculescu D, NatB h. Ad hoc positioning system (APS) using AOA. In: Proceedings of 22 Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, CA: IEEE Press, 2003, 1734–1743

    Google Scholar 

  9. Lymberopoulos D, Lindsey Q. An Empirical Analysis of Radio Signal Strength Variability in IEEE 802.15.4 Networks using Monopole Antennas. ENALAB Technical Report 050501. Yale University, 2006

  10. Xu W, Wood T, Trappe W, et al. Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the ACM workshop on Wireless security. Philadelphia, PA, USA: ACM, 2004, 80–89

    Chapter  Google Scholar 

  11. Hu Y C, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. In: 22 Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, CA: IEEE, 2003, 1976–1986

    Google Scholar 

  12. Brands S, Chaum D. Distance-bounding protocols. In: Workshop on the theory and application of cryptographic techniques on Advances in cryptology. New York: Springer-Verlag, 1993, 344–359

    Google Scholar 

  13. Sastry N, Shankar U, Wagner D. Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on Wireless security. San Diego, CA, USA: ACM, 2003, 1–10

    Chapter  Google Scholar 

  14. Waters B, Felten E. Proving the Location of Tamper Resistant Devices. Technical Report. Princeton University, 2003

  15. Čapkun S, Buttyăn L, Hubaux J P. SECTOR: Secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. Fairfax, Virginia: ACM, 2003, 21–32

  16. Tao P, Rudys A, Ladd A M, et al. Wireless lan location-sensing for security applications. In: Proceedings of the ACM Workshop on Wireless Security. New York, NY, USA: ACM, 2003, 11–20

    Chapter  Google Scholar 

  17. Li Z, Trappe W, Zhang Y Y, et al. Robust statistical methods for securing wireless localization in sensor networks. In: Proceedings of Information Processing in Sensor Networks. Piscataway, NJ, USA: IEEE, 2005, 91–98

    Google Scholar 

  18. Gabber E, Wool A. How to prove where you are: tracking the location of customer equipment. In: Proceedings of Conference on Computer and Communications Security. New York, NY, USA: ACM, 1998, 142–149

    Chapter  Google Scholar 

  19. Lazos L, Poovendran R. SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security. New York, NY, USA: ACM, 2004, 21–30

    Chapter  Google Scholar 

  20. Kuhn M G. An asymmetric security mechanism for navigation signals. In: Proceedings of the Information Hiding Workshop. Berlin: Springer, 2004, 239–252

    Google Scholar 

  21. Liu D, Ning P, Du W. Attack-resistant location estimation in sensor networks. In: Proceedings of Information Processing in Sensor Networks. UCLALos Angeles, California, USA: IEEE, 2005, 99–106

    Google Scholar 

  22. Moore D, Leonard J, Rus D, et al. Robust distributed network localization with noisy range measurements. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2004, 50–61

    Chapter  Google Scholar 

  23. Przydatek B, Song D, Perrig A. SIA: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2003, 255–265

    Chapter  Google Scholar 

  24. Wagner D. Resilient aggregation in sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2004, 78–87

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bei Hua.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, X., Hua, B., Shang, Y. et al. A robust localization algorithm in wireless sensor networks. Front. Comput. Sci. China 2, 438–450 (2008). https://doi.org/10.1007/s11704-008-0018-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-008-0018-7

Keywords