International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.7, No.12, Nov. 2015

Enhanced Voting based Secure Localization for Wireless Sensor Networks

Full Text (PDF, 531KB), PP.52-59

Views:178   Downloads:0


M. B. Nirmala, A. S. Manjunatha

Index Terms

Wireless Sensor Networks (WSNs);Secure Localization;Trilateration;Bilateration


Development of location estimation algorithms with improvement in location precision with lower cost, less energy consumption and less hardware support has become more important for many applications in Wireless Sensor Networks (WSNs). This paper addresses the problem of secure location determination, known as secure localization in WSNs using voting based technique which gives a search region in presence of anchor nodes. From the obtained search region trilateration is applied to know the position of sensor nodes. To avoid the involvement of sensor nodes in further location estimation process, bilateration is applied. Experimental analysis shows that the maximum number of nodes can be localized and accurate location of a node can be determined efficiently with low estimation error. To avoid the attacks and involvement of malicious nodes in the localization process, we implement an improved authentication and security algorithm. Using few location reference points in the localization process reduces the communication cost. The proposed scheme also provides very good localization accuracy. 

Cite This Paper

M. B. Nirmala, A. S. Manjunatha,"Enhanced Voting based Secure Localization for Wireless Sensor Networks", IJCNIS, vol.7, no.12, pp.52-59, 2015.DOI: 10.5815/ijcnis.2015.12.06


[1]I.F. Akyildiz, Weilian Su,Y. Sankarasubramaniam, and E. Cayirci. A survey on Sensor Networks.Communications Magazine, IEEE, 40(8):102-114, 2002.

[2]Lowell J.R. Military applications of localization, tracking, and targeting, IEEE Wireless Communications, Volume 18 issue2, pp1536-1284, 2011.

[3]Srinivasan, Avinash, and Jie Wu. A survey on secure localization in wireless sensor networks. Encyclopedia of Wireless and Mobile communications(2007).

[4]D. Liu, p. Ning, a. Liu, c. Wang, and w. K. Du. Attack-resistant location estimation in wireless sensor networks. ACM trans. Inf. Syst. security, vol. 11, no. 4, pp. 1–39, 2008.

[5]L. Lazos and R. Poovendran. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. In Proceedings of WISE, Philadelphia, PA, Oct. 2004, pp.21–30.

[6]Nirmala M B, A S Manjunath and Rajani M. Secure and Efficient Voting Based Localization Scheme for Wireless Sensor Networks. BIJIT -2014, BVICAM's International Journal of Information Technology. July - December, 2014, Vol. 6 No. 2, ISSN 0973 – 5658. 

[7]L. Lazos, R. Poovendran, and S. Capkun. ROPE: Robust position estimation in wireless sensor networks. In Proceedings of IPSN, April 2005.

[8]Srdjan Capkun and Jean Pierre Hubaux. Secure Positioning in Sensor Networks. IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Security in Wireless Ad Hoc Networks, February 2006.

[9]L. Lazos and R. Poovendran. HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, VOL. 24, NO. 2, February 2006.

[10]T. Zhang, J. He and Y. Zhang. Trust Based Secure Localization in Wireless Sensor Networks. In International Symposium on Intelligence Information Processing and Trusted Computing, 2011.

[11]Jianqing Ma, Shiyong Zhang, Yi-Ping Zhong and Xiaowen Tong. SeLoc: Secure Localization for Wireless Sensor and Actor Network. Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference. pp.864-869, Oct. 2006.

[12]Wenbo Yang; Wen Tao Zhu, "Voting-On-Grid Clustering for Secure Localization in Wireless Sensor Networks," Communications (ICC), 2010 IEEE International Conference. pp.1-5, 23-27 May 2010.

[13]Ning Yu, Liru Zhong and Yongji Ren. BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks, Volume 2013, doi:10.1155/2013/107024. 

[14]Jie Chen, An Improved Downhill Simplex-Genetic Multiple-Source Localization in Wireless Sensor Networks. Journal of Computational Information Systems 7:11(2011) 4007-4014.

[15]Amit gupta, shashikala tapaswi," Recurrent grid based voting approach for location Estimation in wireless sensor networks," IEEE Doi 10.1109/uic-atc.2009.43.

[16]Ravi garg , Avinash varna and Min wu "An efficient gradient descent approach to secure localization in resource constrained Wireless sensor networks," IEEE transactions on information forensics and security, vol. 7, no. 2, april 2012.

[17]Feng li and jie wu "A probabilistic voting-based filtering scheme in wireless Sensor networks,"iwcmc'06, july 3–6, 2006, vancouver, british columbia, canada.

[18]Juan Cota-Ruiz, Jose-Gerardo Rosiles, Ernesto Sifuentes and Pablo Rivas-Perea." A Low-Complexity Geometric Bilateration Method for Localization in Wireless Sensor Networks and Its Comparison with Least-Squares Methods", Sensors 2012, 12, 839-862.

[19]Sohail Jabbar, Rabia Iram, Abid Ali Minhas, Imran Shafi and Shahzad Khalid, Intelligent Optimization of Wireless Sensor Networks through Bio-inspired Computing; survey and Future Directions. International Journal of Distributed Sensor Networks, Volume 2013, Article ID 421084, 13 pages.

[20]L. Hu And D. Evans, "Localization For Mobile Sensor Networks", In Proc. 10th ACM ANNU. Int. Conf. Mobile Comput. Netw. (Mobicom), Philadelphia, Pa, 2004, Pp. 45–57.

[21]Han, Guangjie, Huihui Xu, Trung Q. Duong, Jinfang Jiang, and Takahiro Hara. Localization algorithms of wireless sensor networks: a survey." Telecommunication Systems 52, no. 4 (2013): 2419-2436.

[22]Gonzalez-Tablas Ferreres, A.I.; Ramos Alvarez, B.; Garnacho, A.R., "Guaranteeing the Authenticity of Location Information," Pervasive Computing, IEEE , vol.7, no.3, pp.72,80, July-Sept. 2008.

[23]BELKADI, Malika, Rachida AOUDJIT, Mehammed DAOUI, and Mustapha LALAM. "Mobile Localization Based on Clustering." International Journal of Computer Network and Information Security (IJCNIS) 5, no. 9 (2013): 37.

[24]Verma, Seema. "A Comparative Study of Key Management Protocols for WSN." International Journal of Computer Network and Information Security (IJCNIS) 6.4 (2014): 29.

[25]Diop, Abdoulaye, Yue Qi, and Qin Wang. "Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks." International Journal of Computer Network and Information Security (IJCNIS) 6.8 (2014): 9.