Skip to main content
Log in

Information-theoretic approach for secure localization against sybil attack in wireless sensor network

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The sensed data have limited or no use without knowing the location. So, estimating the location of sensors is an issue in Wireless Sensor Networks (WSNs). However, WSNs are vulnerable to malicious attacks like sybil attack affecting the accuracy of localization by forging one or many anchor identities. In this paper, an information-theoretic approach is used to detect if anchors are compromised by sybil attack. This technique can be adopted by any localization algorithm to yield secure localization against sybil attack in WSNs. Simulation results claim that it improves accuracy of localization even with sybil attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Available on request.

Code availability

Available on request.

References

  • Angappan A, Saravanabava TP, Sakthivel P, Vishvaksenan KS (2020) Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN. J Ambient Intell Human Comput, pp 1–12

  • Calvaresi D, Cesarini D, Sernani P, Marinoni M, Dragoni AF, Sturm A (2017) Exploring the ambient assisted living domain: a systematic review. J Ambient Intell Humaniz Comput 8:239–257

    Article  Google Scholar 

  • Daiya V, Ebenezer J, Murty SAVS, Raj B (2011) Experimental analysis of RSSI for distance and position estimation. In: Proceedings of the IEEE International Conference on Recent trends in information technology (ICRTIT), pp 1093–1098

  • Demirbas M, Song Y (2006) An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06), pp 5-pp

  • Dong S, Zhang X-g, Zhou W-g (2020) A security localization algorithm based on DV-hop against sybil attack in wireless sensor networks. J Electr Eng Technol 15:919–926

    Article  Google Scholar 

  • Fu B, Kirchbuchner F, von Wilmsdorff J, Grosse-Puppendahl T, Braun A, Kuijper A (2019) Performing indoor localization with electric potential sensing. J Ambient Intell Humaniz Comput 10:731–746

    Article  Google Scholar 

  • Giri A, Dutta S, Neogy S (2016) Enabling agricultural automation to optimize utilization of water, fertilizer and insecticides by implementing Internet of Things (IoT). In: Proceedings of the IEEE International Conference on Information Technology (InCITe)-The Next Generation IT Summit on the Theme-Internet of Things: Connect your Worlds, pp 125–131

  • Giri A, Dutta S, Neogy S (2020) Fuzzy logic-based range-free localization for wireless sensor networks in agriculture. In: Advanced computing and systems for security. Springer, pp 3–12

  • Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11:1799–1808

    Article  Google Scholar 

  • He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of the ACM 9th annual international conference on Mobile computing and networking, pp 81–95

  • Jamshidi M, Ranjbari M, Esnaashari M, Darwesh AM, Meybodi MR (2019) A new algorithm to defend against sybil attack in static wireless sensor networks using mobile observer sensor nodes. Adhoc Sens Wirel Networks 43

  • Jan MA, Nanda P, He X, Liu RP (2018) A Sybil attack detection scheme for a forest wildfire monitoring application. Futur Gener Comput Syst 80:613–626

    Article  Google Scholar 

  • Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of the 3rd ACM workshop on Wireless security, pp 21–30

  • Lazos L, Poovendran R (2006) HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J Sel areas Commun 24:233–246

    Article  Google Scholar 

  • Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: Proceedings of the IEEE 4th international symposium on Information processing in sensor networks, pp 324–331

  • Lee S, Moon N (2018) Location recognition system using random forest. J Ambient Intell Humaniz Comput 9:1191–1196

    Article  Google Scholar 

  • Li S, Wang X, Zhao S, Wang J, Li L (2013) Local semidefinite programming-based node localization system for wireless sensor network applications. IEEE Syst J 8:879–888

    Article  Google Scholar 

  • Liu Y, Wu Y (2019) An enhanced RSSI-based detection scheme for sybil attack in wireless sensor networks. In: Future of Information and Communication Conference. Springer, pp 87–102

  • Park T, Shin KG (2009) Attack-tolerant localization via iterative verification of locations in sensor networks. ACM Trans Embed Comput Syst 8:1–24

    Google Scholar 

  • Perazzo P, Sorbelli FB, Conti M, Dini G, Pinotti CM (2016) Drone path planning for secure positioning and secure position verification. IEEE Trans Mob Comput 16:2478–2493

    Article  Google Scholar 

  • Perazzo P, Taponecco L, D’Amico AA, Dini G (2016) Secure positioning in wireless sensor networks through enlargement miscontrol detection. ACM Trans Sens Networks 12:1–32

    Article  Google Scholar 

  • Vaishnavi S, Sethukarasi T (2020) SybilWatch: a novel approach to detect Sybil attack in IoT based smart health care. J Ambient Intell Human Comput, pp 1–15

  • Wang X, Qian L, Jiang H (2009) Tolerant majority-colluding attacks for secure localization in wireless sensor networks. In: IEEE 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp 1–5

  • Wen M, Li H, Zheng Y-F, Chen K-F (2008) TDOA-based sybil attack detection scheme for wireless sensor networks. J Shanghai Univ (English Edition) 12:66–70

    Article  Google Scholar 

  • Yuan Y, Huo L, Wang Z, Hogrefe D (2018) Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks. IEEE Access 6:27629–27636

    Article  Google Scholar 

  • Zhang Y, Fan KF, Zhang S-B, Mo W (2010) AOA based trust evaluation scheme for sybil attack detection in WSN. Appl Res Comput 27:1847–1849

    Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

All authors equally contributed in this research.

Corresponding author

Correspondence to Arindam Giri.

Ethics declarations

Conflicts of interest

There is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Giri, A., Dutta, S. & Neogy, S. Information-theoretic approach for secure localization against sybil attack in wireless sensor network. J Ambient Intell Human Comput 12, 9491–9497 (2021). https://doi.org/10.1007/s12652-020-02690-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02690-9

Keywords

Navigation