Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 8/2020

08-04-2020 | Research Article-Computer Engineering and Computer Science

Blockchain Powered Secure Range-Free Localization in Wireless Sensor Networks

Authors: Rekha Goyat, Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha, Reji Thomas, Tai Hoon Kim

Published in: Arabian Journal for Science and Engineering | Issue 8/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A novel trust-based range-free secure algorithm using blockchain technology is considered in hostile WSNs for localization. The trust values of beacon nodes are evaluated against reputation value, mobility, residual energy and neighbor node list. The blockchain technology is implemented then to share the beacon nodes trust value with neighbor nodes. The highly trustworthy beacon nodes are subsequently elected as a miner for the mining process of blocks so that unknown nodes get information from highly honest beacon nodes to perform the localization process correctly. A set of simulations is conducted to validate the effectiveness of the proposed algorithm compared to the existing one.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Perkins, D.D.; Tumati, R.; Wu, H.; Ajbar, I.: Localization in wireless ad hoc networks. In Resource Management in Wireless Networking, pp. 507–542. Springer, Boston (2005) Perkins, D.D.; Tumati, R.; Wu, H.; Ajbar, I.: Localization in wireless ad hoc networks. In Resource Management in Wireless Networking, pp. 507–542. Springer, Boston (2005)
2.
go back to reference Chintalapudi, K.K.; Dhariwal, A.; Govindan, R; Sukhatme, G.: On the feasibility of ad-hoc localization systems. Techinal Report. (2003) Chintalapudi, K.K.; Dhariwal, A.; Govindan, R; Sukhatme, G.: On the feasibility of ad-hoc localization systems. Techinal Report. (2003)
3.
go back to reference Jiang, N.; Jin, S.; Guo, Y.; He, Y.: Localization of wireless sensor network based on genetic algorithm. Int. J. Comput. Commun. Control 8(6), 825–837 (2013)CrossRef Jiang, N.; Jin, S.; Guo, Y.; He, Y.: Localization of wireless sensor network based on genetic algorithm. Int. J. Comput. Commun. Control 8(6), 825–837 (2013)CrossRef
4.
go back to reference Meguerdichian, S.; Slijepcevic, S.; Karayan, V.; Potkonjak, M.: Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing 2001 Oct 1, pp. 106–116. ACM Meguerdichian, S.; Slijepcevic, S.; Karayan, V.; Potkonjak, M.: Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing 2001 Oct 1, pp. 106–116. ACM
5.
go back to reference Boushaba, M.; Hafid, A.; Benslimane, A.: High accuracy localization method using AoA in sensor networks. Comput. Netw. 53(18), 3076–88 (2009)CrossRef Boushaba, M.; Hafid, A.; Benslimane, A.: High accuracy localization method using AoA in sensor networks. Comput. Netw. 53(18), 3076–88 (2009)CrossRef
6.
go back to reference Sugihara, R.; Gupta, R.K.: Sensor localization with deterministic accuracy guarantee. In: INFOCOM, 2011 Proceedings IEEE 2011 Apr 10, pp. 1772–1780. IEEE (2011) Sugihara, R.; Gupta, R.K.: Sensor localization with deterministic accuracy guarantee. In: INFOCOM, 2011 Proceedings IEEE 2011 Apr 10, pp. 1772–1780. IEEE (2011)
7.
go back to reference Guvenc, I.; Chong, C.C.: A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Commun. Surv. Tutor. 11(3), 107 (2009)CrossRef Guvenc, I.; Chong, C.C.: A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Commun. Surv. Tutor. 11(3), 107 (2009)CrossRef
8.
go back to reference Savvides, A.; Han, C.C.; Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking 2001 Jul 16, pp. 166–179. ACM (2001) Savvides, A.; Han, C.C.; Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking 2001 Jul 16, pp. 166–179. ACM (2001)
9.
go back to reference Bahl, P.; Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: Proceedings INFOCOM 2000 Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, vol. 2, pp. 775–784. IEEE (2000) Bahl, P.; Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: Proceedings INFOCOM 2000 Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, vol. 2, pp. 775–784. IEEE (2000)
10.
go back to reference Niculescu, D.; Nath, B.: Ad hoc positioning system (APS) using AOA. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies 2003 Mar 30, vol. 3, pp. 1734–1743. IEEE (2003) Niculescu, D.; Nath, B.: Ad hoc positioning system (APS) using AOA. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies 2003 Mar 30, vol. 3, pp. 1734–1743. IEEE (2003)
11.
go back to reference Zhang, Y.; Bao, L.; Yang, S.H.; Welling, M.; Wu, D.: Localization algorithms for wireless sensor retrieval. Comput. J. 53(10), 1594–605 (2010)CrossRef Zhang, Y.; Bao, L.; Yang, S.H.; Welling, M.; Wu, D.: Localization algorithms for wireless sensor retrieval. Comput. J. 53(10), 1594–605 (2010)CrossRef
12.
go back to reference Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 660–670 (2002)CrossRef Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 660–670 (2002)CrossRef
13.
go back to reference Lazos, L.; Poovendran, R.; Čapkun, S.: ROPE: robust position estimation in wireless sensor networks. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks 2005 Apr 24. pp. 43. IEEE Press (2005) Lazos, L.; Poovendran, R.; Čapkun, S.: ROPE: robust position estimation in wireless sensor networks. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks 2005 Apr 24. pp. 43. IEEE Press (2005)
14.
go back to reference Perazzo, P.; Taponecco, L.; D’amico, A.A.; Dini, G.: Secure positioning in wireless sensor networks through enlargement miscontrol detection. ACM Trans. Sensor Netw. 12(4), 27 (2016) Perazzo, P.; Taponecco, L.; D’amico, A.A.; Dini, G.: Secure positioning in wireless sensor networks through enlargement miscontrol detection. ACM Trans. Sensor Netw. 12(4), 27 (2016)
15.
go back to reference Han, G.; Liu, L.; Jiang, J.; Shu, L.; Rodrigues, J.J.: A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors. 16(2), 229 (2016)CrossRef Han, G.; Liu, L.; Jiang, J.; Shu, L.; Rodrigues, J.J.: A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors. 16(2), 229 (2016)CrossRef
16.
go back to reference Zhang, Y.; Liu, W.; Fang, Y.; Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Selected Areas Commun. 24(4), 829–35 (2006)CrossRef Zhang, Y.; Liu, W.; Fang, Y.; Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Selected Areas Commun. 24(4), 829–35 (2006)CrossRef
17.
go back to reference Liu, D.; Ning, P.; Du, W.K.: Attack-resistant location estimation in sensor networks. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks 2005 Apr 24, pp. 13. IEEE Press (2005) Liu, D.; Ning, P.; Du, W.K.: Attack-resistant location estimation in sensor networks. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks 2005 Apr 24, pp. 13. IEEE Press (2005)
18.
go back to reference Zhang, T.; He, J.; Li, X.; Wei, Q.: A signcryption-based secure localization scheme in wireless sensor networks. Phys. Proc. 33, 258–64 (2012)CrossRef Zhang, T.; He, J.; Li, X.; Wei, Q.: A signcryption-based secure localization scheme in wireless sensor networks. Phys. Proc. 33, 258–64 (2012)CrossRef
19.
go back to reference Chen, H.; Lou, W.; Wang, Z.; Wu, J.; Wang, Z.; Xia, A.: Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive Mobile Comput. 16, 22–35 (2015)CrossRef Chen, H.; Lou, W.; Wang, Z.; Wu, J.; Wang, Z.; Xia, A.: Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive Mobile Comput. 16, 22–35 (2015)CrossRef
20.
go back to reference Kumar, A.: A hybrid fuzzy system based cooperative scalable and secured localization scheme for wireless sensor networks. Int. J. Wirel. Mobile Netw. 10(3), 51–68 (2018)CrossRef Kumar, A.: A hybrid fuzzy system based cooperative scalable and secured localization scheme for wireless sensor networks. Int. J. Wirel. Mobile Netw. 10(3), 51–68 (2018)CrossRef
21.
go back to reference Li, X.; Yan, L.; Pan, W.; Luo, B.: Secure and robust DV-Hop localization based on the vector refinement feedback method for wireless sensor networks. Comput. J. 60, 810 (2017)CrossRef Li, X.; Yan, L.; Pan, W.; Luo, B.: Secure and robust DV-Hop localization based on the vector refinement feedback method for wireless sensor networks. Comput. J. 60, 810 (2017)CrossRef
22.
go back to reference Shi, W.; Barbeau, M.; Corriveau, J.P.; Garcia-Alfaro, J.; Yao, M.: Secure localization in the presence of colluders in WSNs. Sensors. 17(8), 1892 (2017)CrossRef Shi, W.; Barbeau, M.; Corriveau, J.P.; Garcia-Alfaro, J.; Yao, M.: Secure localization in the presence of colluders in WSNs. Sensors. 17(8), 1892 (2017)CrossRef
23.
go back to reference Kumar, G.; Rai, M.K.; Kim, H.J.; Saha, R.: A secure localization approach using mutual authentication and insider node validation in wireless sensor networks. Mobile Inf. Syst. 2017, 1–12 (2017)CrossRef Kumar, G.; Rai, M.K.; Kim, H.J.; Saha, R.: A secure localization approach using mutual authentication and insider node validation in wireless sensor networks. Mobile Inf. Syst. 2017, 1–12 (2017)CrossRef
24.
go back to reference Kumar, G.; Rai, M.K.; Saha, R.: Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. J. Netw. Comput. Appl. 99, 1–17 (2017)CrossRef Kumar, G.; Rai, M.K.; Saha, R.: Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. J. Netw. Comput. Appl. 99, 1–17 (2017)CrossRef
26.
go back to reference Chen, D., Zhang, Q., Wang, N., Wan, J.: An Attack-resistant RSS-based localization algorithm with L1 regularization for wireless sensor networks. In: 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2018 May 25, pp. 1048–1051. IEEE (2018) Chen, D., Zhang, Q., Wang, N., Wan, J.: An Attack-resistant RSS-based localization algorithm with L1 regularization for wireless sensor networks. In: 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2018 May 25, pp. 1048–1051. IEEE (2018)
27.
go back to reference Yuan, Y.; Huo, L.; Wang, Z.; Hogrefe, D.: Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks. IEEE Access. 6, 27629–36 (2018)CrossRef Yuan, Y.; Huo, L.; Wang, Z.; Hogrefe, D.: Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks. IEEE Access. 6, 27629–36 (2018)CrossRef
28.
go back to reference Lu, Z.; Liu, W.; Wang, Q.; Qu, G.; Liu, Z.: A privacy-preserving trust model based on blockchain for vanets. IEEE Access. 6, 45655–64 (2018)CrossRef Lu, Z.; Liu, W.; Wang, Q.; Qu, G.; Liu, Z.: A privacy-preserving trust model based on blockchain for vanets. IEEE Access. 6, 45655–64 (2018)CrossRef
29.
go back to reference Tanuja, R.; Anoosha, V.; Manjula, S.H.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M.: Secure reputation update for target localization in wireless sensor networks. In: Wireless Networks and Computational Intelligence, pp. 109–118. Springer, Berlin (2012) Tanuja, R.; Anoosha, V.; Manjula, S.H.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M.: Secure reputation update for target localization in wireless sensor networks. In: Wireless Networks and Computational Intelligence, pp. 109–118. Springer, Berlin (2012)
36.
go back to reference Li, L.; Liu, J.; Cheng, L.; Qiu, S.; Wang, W.; Zhang, X.; Zhang, Z.: Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 19(7), 2204–2220 (2018)CrossRef Li, L.; Liu, J.; Cheng, L.; Qiu, S.; Wang, W.; Zhang, X.; Zhang, Z.: Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 19(7), 2204–2220 (2018)CrossRef
37.
go back to reference Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things J. 6(2), 1495–1505 (2018)CrossRef Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things J. 6(2), 1495–1505 (2018)CrossRef
38.
go back to reference Heinzelman, Wendi B.; Chandrakasan, Anantha P.; Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Tran. Wirel. Commun. 1(4), 660–670 (2002) Heinzelman, Wendi B.; Chandrakasan, Anantha P.; Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Tran. Wirel. Commun. 1(4), 660–670 (2002)
39.
go back to reference Yu-Ping, Y.E.; Miao, W.: A new malicious nodes attack-resistant security location method in wireless sensor network. Chin. J. Comput. 36, 532 (2013) Yu-Ping, Y.E.; Miao, W.: A new malicious nodes attack-resistant security location method in wireless sensor network. Chin. J. Comput. 36, 532 (2013)
40.
go back to reference Bshara, M.; Orguner, U.; Gustafsson, F.; Van Biesen, L.: Fingerprinting localization in wireless networks based on received-signal-strength measurements: a case study on WiMAX networks. IEEE Trans. Veh. Technol. 59(1), 283–294 (2010)CrossRef Bshara, M.; Orguner, U.; Gustafsson, F.; Van Biesen, L.: Fingerprinting localization in wireless networks based on received-signal-strength measurements: a case study on WiMAX networks. IEEE Trans. Veh. Technol. 59(1), 283–294 (2010)CrossRef
Metadata
Title
Blockchain Powered Secure Range-Free Localization in Wireless Sensor Networks
Authors
Rekha Goyat
Gulshan Kumar
Mritunjay Kumar Rai
Rahul Saha
Reji Thomas
Tai Hoon Kim
Publication date
08-04-2020
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 8/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-04493-8

Other articles of this Issue 8/2020

Arabian Journal for Science and Engineering 8/2020 Go to the issue

Research Article-Computer Engineering and Computer Science

Chaotic Atom Search Optimization for Feature Selection

Premium Partners