Loading

Secure and Robust 3D Localization in Wireless Sensor Networks
A.V. Kalpana1, D. Rukmani Devi2, G. Elangovan3, N. Indira4, S.Venkatesan5

1A.V. Kalpana, Assistant Professor, R.M.K Engineering College, Chennai (Tamil Nadu), India.

2Dr. D. Rukmani Devi, Professor, R.M.D Engineering College, (Tamil Nadu), India.

3N. Indira, Assistant Professor, Department of Computer Science and Engineering, Panimalar Engineering College, Chennai (Tamil Nadu), India.

4S.Venkatesan, Senior Manager, Tejas Networks Pvt. Ltd. Bangalore (Karnataka), India.

Manuscript received on 22 November 2019 | Revised Manuscript received on 03 December 2019 | Manuscript Published on 14 December 2019 | PP: 104-111 | Volume-9 Issue-1S November 2019 | Retrieval Number: A10241191S19/2019©BEIESP | DOI: 10.35940/ijitee.A1024.1191S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The fundamental capacity of a sensor system is to accumulate and forward data to the destination. It is crucial to consider the area of gathered data, which is utilized to sort information that can be procured using confinement strategy as a piece of Wireless Sensor Networks (WSNs).Localization is a champion among the most basic progressions since it agreed as an essential part in various applications, e.g., target tracking. If the client can’t gain the definite area information, the related applications can’t be skillful. The crucial idea in most localization procedures is that some deployed nodes with known positions (e.g., GPS-equipped nodes) transmit signals with their coordinates so as to support other nodes to localize themselves. This paper mainly focuses on the algorithm that has been proposed to securely and robustly decide thelocation of a sensor node. The algorithm works in two phases namely Secure localization phase and Robust Localization phase. By “secure”, we imply that malicious nodes should not effectively affect the accuracy of the localized nodes. By “robust”, we indicate that the algorithm works in a 3D environment even in the presence of malicious beacon nodes. The existing methodologies were proposed based on 2D localization; however in this work in addition to security and robustness, exact localization can be determined for 3D areas by utilizing anefficient localization algorithm. Simulation results exhibit that when compared to other existing algorithms, our proposed work performs better in terms of localization error and accuracy.

Keywords: Localization, Secure, Robust, 3D, Malicious Nodes, Cheating Nodes, Range-Based, Range-Free.
Scope of the Article: Wireless ad hoc & Sensor Networks