2017
DOI: 10.1155/2017/6102780
|View full text |Cite
|
Sign up to set email alerts
|

Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks

Abstract: Secure localization has become very important in wireless sensor networks. However, the conventional secure localization algorithms used in wireless sensor networks cannot deal with internal attacks and cannot identify malicious nodes. In this paper, a localization based on trust valuation, which can overcome a various attack types, such as spoofing attacks and Sybil attacks, is presented. The trust valuation is obtained via selection of the property set, which includes estimated distance, localization perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…• Secure Localization: In several applications, sensor networks are designed to locate faults. Consequently, the network must be able to accurately and automatically locate each sensor node that is why location information must be handled in a secure manner to avoid attacks taking advantage of the security weaknesses of this information [19].…”
Section: Specific Security Requirementsmentioning
confidence: 99%
“…• Secure Localization: In several applications, sensor networks are designed to locate faults. Consequently, the network must be able to accurately and automatically locate each sensor node that is why location information must be handled in a secure manner to avoid attacks taking advantage of the security weaknesses of this information [19].…”
Section: Specific Security Requirementsmentioning
confidence: 99%
“…A trust valuation based secured localization scheme has been proposed in [15] which was studied to be robust against spoofing, node duplication and Sybil attacks. The proposed scheme comprised of different types of trusts: Comprehensive trust (derived from average localization error and latency of anchors); direct trust (derived from belief of unknown sensor node in that beacon); and indirect trust (derived from location information an unknown node receives from its neighbors).…”
Section: Related Workmentioning
confidence: 99%
“…However, there is still great room for improving the rationality of clustering, especially cluster head communication, without obvious increase in computing load [14]. For instance, the hierarchical design model can be introduced to consider the energy consumption, density and centrality of nodes prior to selecting cluster head.…”
Section: Fig 2 Classical Multi-hop Clustering Routing Algorithmmentioning
confidence: 99%