Abstract
This paper proposed a novel secure localization algorithm based on confidence constraint for Underwater Wireless Sensor Networks (UWSNs). In recent years, UWSNs have attracted a rapidly growing interest from ocean battlefield surveillance. As essential technology, secure localization is crucial to the location-based applications. However, the localization process has been restricted by the adverse battlefield environments, e.g. the confidence problem of reference nodes and information due to disturbances or attacks, which lead to obvious degradation of localization security and accuracy. To solve this issue, we transformed the secure localization into a confidence constraint satisfaction problem. Zero-sum game method has been utilized to deal with the confidence problem of reference information. Simulation results show that our algorithm is an effective and efficient approach to localization for UWSNs.
Access provided by CONRICYT-eBooks. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
During the last few years, there has been a rapidly growing interest in Underwater Wireless Sensor Networks (UWSNs), which brought us a new way to sense and monitor the adverse battlefield environments [1]. As an essential technology, the localization performance significantly affects the location-based applications. In complex ocean battlefield, several kinds of adverse factors would lead to obvious degradation of localization security and accuracy [2], e.g. the potential malicious attacks, the unreliable reference nodes and reference information, etc. Extensive research has been conducted in this interesting area [3,4,5]. Therein, Alfao et al. considered the security of localization under limited trust anchor nodes [4]. It introduced three algorithms to enable the sensor nodes to determine their positions. But it would fail when the malicious anchor nodes are in colluding condition. Chen et al. proposed to make each locator build a conflicting-set and then the sensor can use all conflicting sets of its neighboring locators to exclude incorrect distance measurements of its neighboring locators [5]. However, the limitation of the scheme is that it only works properly when the system has no packet loss.
Actually, the substantial reason of the above problem is that the localization has been restricted by confidence constraint of reference information. Therefore, a novel secure localization algorithm based on confidence constraint has been proposed. We transformed the secure localization problem into a confidence constraint satisfaction problem (CSP) [6]. A confidence CSP, i.e. the determination problem of secure localization, has been defined by a constraint contractor C, with an interval domain [x]. Then, the localization issues will be tackled in a constraint CSP framework.
2 Confidence Constraint Based Secure Localization Algorithm
2.1 Confidence Constraint of Reference Nodes
In this phase, our primary objective is to find out which anchor nodes should be employed as reference nodes so that the utilization in localization is secure. To deal with the problem, zero-sum game method will be employed [7].
Formulate game domain. Firstly, the ordinary node N i initiates an inviting request to its neighbor or multi-hop anchor nodes, namely set X. If the anchors in X are overcommitted, they respond the abandoning ACK to N i . Otherwise, the nodes respond the joining ACK. Then the local game domain of node N i is created, and the anchors with joining ACK will become the game players. As a game player, there are two actions <keep, reject> to enforce for N i . Assume that the UWSN is composed by n nodes and m game domains acting on it. Note that the m game domains could co-exist over the network so that the game-plays could be calculated in the concurrent way.
Calculate cost functions. The node N i announces the localization information to all the players. Then, each player in the local game domain receiving the announcement calculates its cost function [8]. The cost function of game domain k is given by
with the running cost function
where x i describes the running states of N i , u k describe the control vectors of group k, V k is the node set and \( \varPsi^{k} \) is the terminal cost function. c i is control cost function of node N i . \( a_{i,j} e^{{ - \theta_{{_{i,j} }}^{k} }} \) are attack payoffs running functions and \( a_{i,j} e^{{ - \omega_{{_{i,j} }}^{k} }} \) are information loss running functions of node N i to N j .
Play game and make decision. At the first time of the play, all players make their action based on their payoffs, i.e. if the payoff is positive, broadcasting a ‘keep’ message to all players, or else broadcasting ‘reject’. All localization groups wish to maximize their payoffs, i.e. minimize the respective cost functions. Let group k’s admissible control set be u k. As the game repeats, the admissible control combination, i.e. the actions of game-play, can be denoted as a Nash equilibrium solution if it satisfies:
On this basis, the ordinary node can adopt the players with ‘keep’ as the reference anchors, and then broadcasts a message to all players to dismiss the game domain.
2.2 Confidence Constraint Satisfaction Problem
Solving the confidence CSP in an interval analysis approach consists of finding the intersection that contains all possible solutions. The set of the intervals regarding to ordinary node N i actually is the set of the constraints \( f_{1} ,f_{2} , \cdots ,f_{k} \). The location of node N i can be described by X i = [x i , y i , z i ]T. The distance from X u to X i can be denoted by \( \zeta_{ui}^{I} = \left[ {\zeta_{ui}^{I - } ,\,\zeta_{ui}^{I + } } \right] \). Consider the intersection of two intervals \( \zeta_{u1}^{I} \) and \( \zeta_{u2}^{I} \), it can be computed by \( \zeta_{u1}^{I} \cap \zeta_{u2}^{I} = \left[ {max\left\{ {\zeta_{u1}^{I - } ,\zeta_{u2}^{I - } } \right\}, min\left\{ {\zeta_{u1}^{I + } ,\zeta_{u2}^{I + } } \right\}} \right] \). The admissible solutions of node X u can be rewritten as \( F_{u} = \bigcap\limits_{i = 1}^{k} {\left\{ {\zeta \in \zeta^{I} :\zeta_{ui}^{I} = \left[ {\zeta_{ui}^{I - } ,\zeta_{ui}^{I + } } \right]} \right\}} \). Regarding the coordinates of all sub-boxes’ centers as samples of X u , we can get a sample set \( F_{u} = \left\{ {\Theta _{1} ,\Theta _{2} , \cdots ,\Theta _{n} } \right\} \), and the centre of \( \Theta _{n} \) can be found by \( \zeta_{n}^{*} = (\zeta_{n}^{ - } + \zeta_{n}^{ + } )/2 \). Then the optimum point estimate, i.e. the desired coordinates of ordinary node X u can be obtained by \( \hat{\varvec{W}}_{u} = \mathop {\arg \hbox{min} }\limits_{{W_{u} }} \sum\limits_{i = 1}^{k} {\left( {\left\| {\zeta_{n}^{*} - \varvec{W}_{i} } \right\|_{2} - d_{ui} } \right)}^{2} \).
3 Performance Evaluation
In our simulation experiments, 400 nodes with adjustable transmission range R are randomly distributed in a 3000 × 3000 × 200 region. For comparison with classical approaches relying on secure hypotheses, different effective reference anchor percentages are considered in our simulation by varying the malicious nodes percent. Moreover, the DV-distance localization scheme has been simulated for comparison.
Figure 1 shows the accuracy comparisons with different anchors. When we varied the effective anchor percentage from 4% to 12%, i.e. the number of effective anchor nodes varying from 16 to 48, the localization error decreased by 50%. However, the DV-distance scheme only decreased by 25%, when the network connectivity is 9 and the malicious nodes percent is 5%. This suggests that our scheme can achieve higher localization accuracy and security in same malicious nodes percentage.
Conclusion. Proposed is a novel confidence constraint based secure localization algorithm. The advantage of our framework is that both the malicious nodes and the reference information can be treated as information uncertainty and casted into game process. Simulation results show that it is an effective and efficient approach.
References
Erol-Kantarci, M., Mouftah, H.T., Oktug, S.: A survey of architectures and localization techniques for underwater acoustic sensor networks. Commun. Surv. Tutorials IEEE 13(3), 487–502 (2011)
Tan, H., Diamant, R., Seah, W.K.G., Waldmeyer, M.: A survey of techniques and challenges in underwater localization. Ocean Eng. 38(14–15), 1663–1676 (2011)
Xing, T., Jian, L.: Cooperative positioning in underwater sensor networks. IEEE Trans. Signal Process. 58(11), 5860–5871 (2010)
Alfao, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of 7th Annual Communication Networks and Services Research Conference, pp. 86–93 (2009)
Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing, pp. 296–309 (2009)
Jaulin, L., Kieffer, M., Didrit, O., Walter, E.: Applied Interval Analysis, with Examples in Parameter and State Estimation, Robust Control and Robotics. Springer, London (2001)
Cheng, G., Chen, H.: Game model for switch migrations in software-defined network. Electron. Lett. 50(23), 1699–1700 (2014)
Ning, G., Yang, D., Tie, L., Cai, K.-Y.: Nash equilibrium of time-delay interaction complex networks subject to persistent disturbances. IET Control Theory and Applications (2012)
Acknowledgment
This work was supported by the National Natural Science Foundation of China (grant no. 61501488).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, X., Wang, G., Ren, Y., Liu, X. (2017). A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-4154-9_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4153-2
Online ISBN: 978-981-10-4154-9
eBook Packages: EngineeringEngineering (R0)