Secure localization against malicious attacks on wireless sensor network

Abstract:

Wireless sensor networks (WSN) are very susceptible to location errors due to malicious attacks on

sensor nodes that distort the position of the sensor nodes, which will lead to an error during unknown

node localization. In this paper, we propose a localization algorithm to defend against independent

attacks and collusion attacks. In the algorithm, we first select three random reference nodes, then use the

trilateral detection method and the confidence interval to get rid of the malicious nodes. We then use the

PSO optimization algorithm to locate the unknown node, is called (Secure localization algorithm against

advanced attacks-SL4A). Through the simulation results, we prove that our proposed algorithm outperforms the existing algorithms, in terms of the variability of malicious nodes and noise, average localization error and degree computational complexity.

Secure localization against malicious attacks on wireless sensor network trang 1

Trang 1

Secure localization against malicious attacks on wireless sensor network trang 2

Trang 2

Secure localization against malicious attacks on wireless sensor network trang 3

Trang 3

Secure localization against malicious attacks on wireless sensor network trang 4

Trang 4

Secure localization against malicious attacks on wireless sensor network trang 5

Trang 5

Secure localization against malicious attacks on wireless sensor network trang 6

Trang 6

Secure localization against malicious attacks on wireless sensor network trang 7

Trang 7

pdf 7 trang xuanhieu 2960
Bạn đang xem tài liệu "Secure localization against malicious attacks on wireless sensor network", để tải tài liệu gốc về máy hãy click vào nút Download ở trên

Tóm tắt nội dung tài liệu: Secure localization against malicious attacks on wireless sensor network

Secure localization against malicious attacks on wireless sensor network
e. 
Assume, in an N-dimensional objective search 
space. Three N-dimensional vectors are used to 
describe a particle i: (1) current location Xi = [xi1, 
xi2,  xiN]; (2) the previous location Pbesti = [pi1, pi2, 
, piN] of the best fitness; and (3) current velocity 
Vi = [Vi1, Vi2, , ViN] . Besides, Gbest = [G1, G2, , 
GN] denotes the position of the best particle so far 
(ie, Gbestd is the smallest of all Pbestid). At each 
iteration k, the velocity vid and position Xid of each 
particle are updated according to the following 
equations.
1 1 2 2( 1) ( ) ( ) ( )id id id id d idV k V k c r Pbest X c r Gbest Xw
(3) 
( 1) ( ) ( 1)id id idX k X k V k (4)
where, d =1,2, , N; i=1, 2, , K; and K is the 
size of the swarm population, it is denotes iteration 
number, r
1
 and r
2
 are random numbers between 
[0,1], and c
1
=c
2
=2 are respectively the cognitive and 
social learning parameters, ω is the inertia weight.
The inertial weight is added to element w of 
the original PSO algorithm as in Eq. (5). The bigger 
value of ω is beneficial for particles to jump out 
of local minimum points, the smaller value of ω 
is favor the algorithm convergence. As originally 
developed, ω often decreases linearly with the 
number of iterations. Therefore, ω can be set 
according to the following equation.
max
max
( )
(5)ini end end
T t
T
w ww w
where iniw is the initial weigh. endw is the final 
weight value, maxT is the total number of iterations, 
and t is the current number of iterations. In previous 
experimental studies, ω was often set from 0.9 
reducing linearly to 0.4.
4. Secure Localization Algorithm Against 
Advanced Attacks (SL4A)
Existing algorithms for estimating attack 
resistance positions often use as many beacon nodes 
as possible to estimate unknown node coordinates 
[12], [8]. The idea behind the algorithm LS4A is that 
we select three random points for an initial subset, 
using the trilateral detection paradigm and the PSO 
optimization algorithm to identify measurements in 
confidence intervals. 
To find the coordinates of a node requires 
at least 3 distance measurements. Therefore, to 
estimate the position of an unknown node from a 
randomly chosen subset of 3 nodes, Ωi (Step 4). In 
ISSN 2354-0575
Khoa học & Công nghệ - Số 27/Tháng 9 - 2020 Journal of Science and Technology 57
an attack network model, any node can be attacked, 
so that to detect an attack beacon node, (Step 5) uses 
the trilateral detection method to detect whether a 
set Ωi has been maliciously attacked. If the set Ωi 
is not attacked (Step 6) use the PSO algorithm to 
find the location estimate. Next (Step 7), calculate 
the K value by the Equations (7), of all cases falling 
into the confidence interval e. When K = N, the 
estimated location ofc 0Z is within the confidence 
interval of all the beacons, and its coordinates are 
completely removed by malicious attacks.
1
( 1.96 1.96),1
where (7)
,0
N
i
i i
i
if e
K u u
otherwise=
 − ≤ ≤ = = =    
∑
If the value of K is greater than the threshold value 
of t given (Step 8). Once a consistency set has 
been identified, the algorithm uses all points in the 
confidence interval set to form the final estimate ofc 

0Z and it terminates (Steps 9). In our experiments, 
we use the PSO optimization algorithm to calculate 
the initial estimate from the Zi subset and for the 
final estimate obtained from the set within the 
confidence interval.
If the algorithm performs all iterations 
and does not find the confidence interval have a 
minimum size t. Then it will either declare a failure 
or give an 0Z position estimate acceptable from the 
largest confidence interval (Steps 13).
Algorithm Secure Localization Algorithm Against 
Advanced Attacks (SL4A)
1: Input: unknown node Z
0
, maximum number of 
interations imax, Set L, confidence interval CI, 
threshold t; 
2: Ouput: estimated positionc 0Z  0 0( , )x y ; 
3: for iter=0 to imax do 
4: Randomly select a subset Ωi of size 3 from L;
5: if TriEdgeCheck(Ωi) then 
6: Call PSO-Based Localization Algorithm;
7: Calculate K, the number of points in the 
confidence interval with to the estimatedc 

0Z in e;
8: if K > t then
9: return  0 0( , )x y ;
10: end if
11: end if
12: end for
13: return  0 0( , )x y ;
4.1. The Trilateral Detection Method: [13] is 
derived from a beacon node detection method 
developed from the theorem of a triangle. The 
total 2 sides of the triangle are larger than the third 
side, and the subtraction of 2 sides of the triangle is 
smaller than the third side. Given a triangle ∆ABC 
and the corresponding edges are a, b, c, the three 
sides must satisfy a + b > c, a + c > b, b + c > a, 
a − b < c, a − c < b and b − c< a. 
Figure 4. The trilateral detection method
For example, in Figure 4 M is called an 
unknown node or a measured node, A and B are 
anchor nodes that provide positioning information. 
M node is measured uses RSSI signal strength to 
convert the distance between A and B anchor nodes 
into dAM distance and dBM, and then use the known 
distance dAB to perform trilateral detection, then 
assess whether or not to meet the principles of a 
triangle. 
4.2. Confidence Interval (CI): We assume that not 
all beacon nodes are attacked by malicious nodes, 
meaning that non-toxic distance measurement 
errors are Gaussian random variables distributed 
according to N(0,σ2), error variance is the RSSI 
distance measurement technique in this paper. The 
distance measurement error e computes the distance 
between the actual position of with the reference 
position (xi , yi) according to the Equations (8).

2 2
0 0( ) ( ) (8)i i ie d x x y y= − − + −
In statistics, the confidence interval of the 
probability sample means estimating the interval of 
some of the overall parameters of the sample [17]. 
The confidence interval is a distance estimation 
method that uses a range to estimate a parameter. 
This shows that the true value of this parameter 
is likely to fall into the measurement result, the 
ISSN 2354-0575
Journal of Science and Technology58 Khoa học & Công nghệ - Số 27/Tháng 9 - 2020
probability is called the level of Confidence 1 - α, 
α is the probability of not falling into the range. 
For example, as shown in Figure 5 we apply the 
confidence interval method to measure errors in the 
estimated position coordinates, 95% CI are a given 
level taken from the Normal distribution N(0,σ2), 
be within the standard deviation [-1.96e, 1.96e], of 
which 1 - α = 95%; α = 5%. In other words, e is 
in the CI confidence interval with a probability of 
more than 95%. 
Figure 5. Example of 95% confidence interval
5. Simulation Evaluations
Two types of the simulation scenario with 
network environment are 50x50. Total of 15 beacon 
nodes including 3 to 7 malicious nodes; and 1 
unknown node. Let α = 1.1 and β = - 10. Scenario 
1, evaluates the influence of the collusion attacks 
by changing malicious nodes, and Scenario 2, 
evaluates the influence of the independent attacks 
by changing Gaussian noise intensity. The program 
is simulated for 10,000 times.
We compare the performance of the new SL4A 
algorithm with current algorithms: LMS [16], 
RANLD [15], IDM [11] and Cluster-NLS [14]. 
First, compare the secure location in the collusion 
attack environment, in which the number of attack 
nodes in the environment ranges from 3 to 7 nodes. 
Next, compare the safe position in the collusion 
attack environment, where the noise variation is 
1, the attack intensity Alpha varies from 0.6 to 1.4 
and β = 0. With α have strength from 0.7 to 1 is a 
weakening attack, and α from 1 to 1.4 is a signal 
booster attack.
5.1. Collusion Attack: Figure 6(a), under the 
scenario of collusion attack by changing malicious 
nodes. The average localization error of the 
algorithm increases as the number of malicious 
nodes increases. Because the number of malicious 
nodes directly affects the power of collusion attacks. 
When the number of malicious nodes is 3 and 4, the 
Cluster-NLS algorithms have the smallest average 
localization error. When the number of malicious 
nodes is 5, 6 and 7, the SL4A and RANLD 
algorithms are best against collusion attacks. Based 
on the empirical results, it can be concluded that 
when the number of malicious nodes is small in 
collusion attack, the secure location algorithm using 
group combination shows better localization ability.
Fig 6. Comparing secure localization algorithms against attacks: 
Fig. 6(a) is collusion attack and Fig. 6(b-f) are independent attacks
ISSN 2354-0575
Khoa học & Công nghệ - Số 27/Tháng 9 - 2020 Journal of Science and Technology 59
5.2. Independent attack: Figure 6(b) to Figure 
6(f) with the scenario of independent attacks by 
changing Gaussian noise intensity. In the cases of 
number of attack nodes changer from 3 to 7 nodes. 
We can see that when the attack intensity α = 0.9 
and α = 1.1, all algorithms are affected by the worst 
attacks power. With different attack intensities, the 
SL4A and RANLD algorithms have the smallest 
average localization error. IDM algorithm randomly 
chooses 5 nodes to estimate position. Therefore, 
the average localization error in the middle. As 
the signal strength increased, the Cluster-NLS and 
LMS algorithms had average localization errors 
increased accordingly.
6. Conclusions
In WSNs there is practically a lot of noise 
caused by malicious attacks on anchor nodes. Most 
localization algorithms are suffer from malicious 
attacks, resulting in a large difference between 
the estimated location and the actual location 
of an unknown node. However, there are a few 
localization algorithms that considers independent 
attack mechanisms, due to inappropriate algorithmic 
architectural design, the ability to resist malicious 
attacks is limited and the complexity of the algorithm 
is too high compared to hardware devices. In this 
paper, we have proposed a anti-attack security 
algorithms SL4A with stability and robustness, 
algorithm focused on combating independent 
attacks and collusion attacks. Compared to existing 
secure localization algorithms, our two algorithms 
resist malicious attacks and calculate the location 
coordinates of the unknown node more accurately.
References
[1]. Y.S.I.F.Akyildiz,W.SuandE.Cayirci,“Asurveyonsensornetworks,” IEEE Communications Magazine, 
2002, vol. 40, no. 8, pp. 102–114. 
[2]. L.Doherty and K. Pister, “Convex position estimation in wireless sensor networks,” in Proceeding 
of IEEE International Conference on Computer and Communications Societies (INFOCOM), 2001, 
vol. 3, pp. 1655–1663. 
[3]. T. He and C. Huang, “Range-free localization schemes for large scale sensor networks,” ACM 
MobiCom, San Diego, 2003, pp. 81–95.
[4]. D. Niculescu and B. Nath, “Dv based positioning in ad hoc networks,” Telecommunication 
Systems, 2003, vol. 22, no. 1, pp. 267–280. 
[5]. C. H. Chang and W. Liao, “A probabilistic model for relative location estimation in wireless 
sensor networks,” IEEE Communications Letters, 2009, vol. 13, no. 12, pp. 893–895. 
[6]. O.M.R.Weber,E.MademannandS.Zeisberg,“Localizationtechniques for traffic applications based 
on robust wecols positioning in wireless sensor networks,” Proceedings of Workshop on Positioning 
Navigation and Communication (WPNC), 2012, pp. 215–219. 
[7]. J. Cao, “A localization algorithm based on particle swarm optimization and quasi-newton 
algorithm for wireless sensor networks,” Journal of Communication and Computer 12, 2015, pp. 
85–90. 
[8]. J. M.-S. . E. R.-I. . A. E.-R. . L. Rizo-Dominguez, “A comparative of range free localization 
algorithms and dv-hop using the particle swarm optimization algorithm,” in 2017 IEEE 8th Annual 
Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017, no. 
17489361, pp. 150–157. 
[9]. W. T. Y. Chen and R. Martin, “Attack detection in wireless localization,” in Proceeding of IEEE 
International Conference on Computer Communications (INFOCOM), 2007, pp. 1964–1972. 
[10]. S. U. M. Jadliwala, S. Zhong and C. Qiao, “Secure distance-based localization in the presence of 
cheating beacon nodes,” IEEE Transactions on Mobile Computing, 2010, vol. 9, no. 6, pp. 810–823. 
[11]. C. C. C. S. H. Fang and C. Wang, “Attack-resistant wireless localization using an inclusive 
ISSN 2354-0575
Journal of Science and Technology60 Khoa học & Công nghệ - Số 27/Tháng 9 - 2020
disjunction model,” IEEE Transactions on Communications, 2012, vol. 60, no. 5, pp. 1209–1214. 
[12]. L. S. J. Jiang, G. Han and H. C. Chao, “A novel secure localization scheme against collaborative 
collusion in wireless sensor networks,” Proceedings of Wireless Communications and Mobile 
Computing Conference (IWCMC), 2011, pp. 308–303. 
[13]. J. H. N. Bulusu and D. Estrin, “Gps-less low cost outdoor localization for very small devices,” 
GPS-less low cost outdoor localization for very small devices, 2000, vol. 7, no. 5, pp. 28–34. 
[14]. V. B. L. J. Yang, Y. Chen and V. Swaminathan, “Robust wireless localization to attacks on access 
points,” Proceeding of IEEE Sarnoff Symposium, 2009, pp. 208–212.
[15]. N. Kiyavash and F. Koushanfar, “Anti-collusion position estimation in wireless sensor networks,” 
in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2007, pp. 
1–9. 
[16]. Y. Z. Z. Li, W. Trappe, “Robust statistical methods for securing wireless localization in sensor 
networks,” in IPSN 2005. Fourth International Symposium on Information Processing in Sensor.
[17]. Wikipedia, Confidence interval, 2008, https://en.wikipedia.org/wiki/ Confidence interval.
BẢN ĐỊA HÓA AN TOÀN CHỐNG LẠI CÁC CUỘC TẤN CÔNG ĐỘC HẠI
VÀO MẠNG CẢM BIẾN KHÔNG DÂY
Tóm tắt:
Mạng cảm biến không dây (WSN) rất dễ bị lỗi vị trí do các cuộc tấn công độc hại vào các nút cảm biến 
làm sai lệch vị trí của các nút cảm biến, điều này sẽ dẫn đến lỗi trong quá trình nội địa hóa nút không xác 
định. Trong bài báo này, chúng tôi đề xuất thuật toán bản địa hóa để chống lại các cuộc tấn công độc lập 
và các cuộc tấn công thông đồng. Trong thuật toán, đầu tiên chúng tôi chọn ba nút tham chiếu ngẫu nhiên, 
sau đó sử dụng phương pháp phát hiện ba bên và khoảng tin cậy để loại bỏ các nút độc hại. Sau đó chúng 
tôi sử dụng thuật toán tối ưu hóa PSO để xác định vị trí nút không xác định, được gọi là (Secure localization 
algorithm against advanced attacks-SL4A). Thông qua kết quả mô phỏng, chúng tôi chứng minh rằng thuật 
toán đề xuất của chúng tôi có hiệu suất tốt hơn các thuật toán hiện có, về sự thay đổi của các nút độc hại 
và nhiễu, lỗi cục bộ hóa trung bình và độ phức tạp tính toán. 
Từ khóa: Wireless sensor network (WSNs), Secure Location, Independent Attack, Collusion Attack.

File đính kèm:

  • pdfsecure_localization_against_malicious_attacks_on_wireless_se.pdf