| Literature DB >> 26891300 |
Guangjie Han1,2, Li Liu3, Jinfang Jiang4, Lei Shu5, Joel J P C Rodrigues6.
Abstract
Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio.Entities:
Keywords: collaborative secure localization; trust evaluation; underwater wireless sensor networks
Year: 2016 PMID: 26891300 PMCID: PMC4801605 DOI: 10.3390/s16020229
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The structure of network model.
Analysis on malicious attacks against localization in Underwater Wireless Sensor Networks (UWSNs).
| Layers | Attacks | Countermeasures | Attack Behaviors | Results |
|---|---|---|---|---|
| Physical Layer | Stealing | The perception mechanism for physical damage, encryption algorithm, | Signal eavesdropping and tampering | packet error and packet loss |
| Jamming | Multi-frequency communication, using different transmission priority, | Send jamming signal on the working frequency | packet loss | |
| Data Link Layer | Collision | Forward Error Correct (FEC) code. | Repeat to send messages | packet loss |
| Exhaustion | Limit the transmission speed and retransmission times of packets | Send a lot of useless messages | packet loss | |
| Unfairness | Avoid using long packets, redistributing transmission priority of packets, | Deliberately take up the channel | packet loss | |
| Network Layer | DoS attacks | Detection of energy consumption | Repeatedly send many messages to exhaust energy | packet loss |
| Selective forwarding | Multi-path routing, reputation and trust model, | Selectively forward packets | packet loss | |
| Sybil | Identity authentication of sensor nodes | Have multiple identities | packet error | |
| Wormhole | Construction of network topology | Shorten distance | packet error | |
| Sinkhole | Traffic monitoring, identity authentication, multi-path routing, | Maliciously tamper with routing | packet loss | |
| Transport Layer | Flooding | Limit the broadcast range of sensor nodes | Establish false connections | packet loss |
| Tampering | Data encryption and node authentication. | Tampering localization beacons | packet error |
Figure 2The five sub-processes in Collaborative Secure Localization algorithm based on Trust model (CSLT).
Figure 3A sliding time window.
Figure 4Trust calculation for one-hop neighbor nodes.
Figure 5Trust calculation for two-hop neighbor nodes.
Simulation Parameters.
| Parameters | Value |
|---|---|
| Simulation region size | 500 m × 500 m × 500 m |
| The number of unknown nodes | 500 |
| Communication range | 100 m |
| Node placement | Randomly deployed |
| Initial trust value | 1 |
| Acoustic channel bandwidth | 100 Kbps |
| The modulation mode for acoustic communication | BPSK modulation |
| Mobility model | The Meandering Current Mobility (MCM) model |
Figure 6The performance of detection ratio. (a) ; (b) .
Figure 7Comparison of detect ratio.
Figure 8Comparison of localization accuracy. (a) Impact of malicious node ratio; (b) Impact of anchor node ratio.
Figure 9Comparison of localization ratio. (a) Impact of malicious node ratio; (b) Impact of anchor node ratio.
Figure 10Comparison of energy consumption.