Abstract
This paper proposed a novel secure localization algorithm based on confidence constraint for Underwater Wireless Sensor Networks (UWSNs). In recent years, UWSNs have attracted a rapidly growing interest from ocean battlefield surveillance. As essential technology, secure localization is crucial to the location-based applications. However, the localization process has been restricted by the adverse battlefield environments, e.g. the confidence problem of reference nodes and information due to disturbances or attacks, which lead to obvious degradation of localization security and accuracy. To solve this issue, we transformed the secure localization into a confidence constraint satisfaction problem. Zero-sum game method has been utilized to deal with the confidence problem of reference information. Simulation results show that our algorithm is an effective and efficient approach to localization for UWSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Erol-Kantarci, M., Mouftah, H.T., Oktug, S.: A survey of architectures and localization techniques for underwater acoustic sensor networks. Commun. Surv. Tutorials IEEE 13(3), 487–502 (2011)
Tan, H., Diamant, R., Seah, W.K.G., Waldmeyer, M.: A survey of techniques and challenges in underwater localization. Ocean Eng. 38(14–15), 1663–1676 (2011)
Xing, T., Jian, L.: Cooperative positioning in underwater sensor networks. IEEE Trans. Signal Process. 58(11), 5860–5871 (2010)
Alfao, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of 7th Annual Communication Networks and Services Research Conference, pp. 86–93 (2009)
Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing, pp. 296–309 (2009)
Jaulin, L., Kieffer, M., Didrit, O., Walter, E.: Applied Interval Analysis, with Examples in Parameter and State Estimation, Robust Control and Robotics. Springer, London (2001)
Cheng, G., Chen, H.: Game model for switch migrations in software-defined network. Electron. Lett. 50(23), 1699–1700 (2014)
Ning, G., Yang, D., Tie, L., Cai, K.-Y.: Nash equilibrium of time-delay interaction complex networks subject to persistent disturbances. IET Control Theory and Applications (2012)
Acknowledgment
This work was supported by the National Natural Science Foundation of China (grant no. 61501488).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, X., Wang, G., Ren, Y., Liu, X. (2017). A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-4154-9_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4153-2
Online ISBN: 978-981-10-4154-9
eBook Packages: EngineeringEngineering (R0)