Secure Localization Model in Wireless Sensor Networks | ||||
The International Conference on Electrical Engineering | ||||
Article 105, Volume 7, 7th International Conference on Electrical Engineering ICEENG 2010, May 2010, Page 1-13 PDF (305.53 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/iceeng.2010.33276 | ||||
View on SCiNiTO | ||||
Authors | ||||
Mostafa Sami1; Ashraf Hussein2 | ||||
1Prof.Dr., Computer Science Department - Helwan University. | ||||
2Eng., Egyptian Armed Forces. | ||||
Abstract | ||||
Abstract: Wireless Sensor Networks (WSNs) are the key of gathering the information in a smart environment. This environment could be a building, utilities, an industrial firm, etc. WSNs have an endless list of potential applications in both military and civilian fields. One common feature shared by all of these critical applications, is the vitality of sensor location. Many techniques have been discussed for sensor localization, the simple one is based on using a Global Positioning System (GPS). Yet, it's not a feasible solution from an economic perspective. Therefore, other techniques use the known location beacon (special sensors) (BNs) to help the other sensors (SNs) to compute there location. Secure localization in WSNs has become a major focus for researchers in recent years. Since many intruders exploit the WSNs localization technique. Many secure localization techniques have been implemented, where the most recent one depends on a smart node monitoring to exclude any malicious nodes. This paper proposes an applicable Secure Localization Model (SLM) for excluding malicious BNs to ensure secure localization of SNs, by enabling BNs to monitor their neighbors, establishing a Neighbor Reputation table (NRT), and then publish it as a response of the sensor location requests, so as the SNs can avoid the malicious BNs false location. Our simulation shows that the proposed SLM provides a simple and applicable secure localization model for WSNs. | ||||
Keywords | ||||
Wireless Sensor Networks; Beacon; malicious; Secure Localization | ||||
Statistics Article View: 99 PDF Download: 139 |
||||