Secure Authentication Technique for Localization in Wireless Sensor Networks

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


In wireless sensor networks (WSN), the secure localization is extremely significant for enhancing the accuracy of localization and robustness against security threats. Also most the existing literature works lacks the security approach towards localization mechanism which may affect the secure communication of the data. Hence in this paper, we propose a secure authentication technique for localization in WSN. Initially the position of sensor nodes is estimated using proximity distance map computation. The anchor nodes then generate a location based key pair for each sensor node. This ensures that the attackers cannot exploit the positions and location based keys of compromised nodes. Then the mutual authentication of neighbor nodes is performed based on location information. By simulation results we show that the proposed approach offers improved security in WSN
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Wireless Sensor Networks (WSN); Sensor Nodes; Anchor Nodes

Full Text:



Seapahn Megerian and Miodrag Potkonjak, “Wireless Sensor Networks”.

John A. Stankovic, “Wireless Sensor Networks”, University of Virginia, June 19, 2006.

F. L. LEWIS, “Wireless Sensor Networks”, Smart Environments: Technologies, Protocols, and Applications, New York, 2004.

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey”, Elsevier, Page No: 393–422, 2002.

Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”, IJCIT, VOLUME 02, ISSUE 01.

Chris Karlof *, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Elsevier, Ad Hoc Networks 1 (2003) 293–315, 2003.

David Boyle and Thomas Newe, ” Securing Wireless Sensor Networks: Security Architectures”, Journal of Networks, Vol. 3, No. 1, January 2008.

Hemanta Kumar Kalita and Avijit Kar, “Wireless Sensor Network Security Analysis”, International Journal of Next-Generation Networks (IJNGN),Vol.1, No.1, December 2009.

Ansgar Kellner, Omar Alfandi, and Dieter Hogrefe, “A Survey on Measures for Secure Routing in Wireless Sensor Networks”, Research Article, International Journal of Sensor Networks and Data Communications, Vol. 1 (2012).

Guoqiang Mao, Baris Fidan and Brian D.O. Anderson, “Wireless sensor network localization techniques”, Ellservie, 2007.

Amitangshu Pal, “Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges”, Network Protocols and Algorithms, ISSN 1943-3581, 2010.

Avinash Srinivasan and Jie Wu, “A Survey on Secure Localization in Wireless Sensor Networks”.

Lingxuan Hu and David Evans, “Localization for Mobile Sensor Networks”, University of Virginia, Charlottesville, VA.

Koen Langendoen and Niels Reijers, “Distributed localization in wireless sensor networks: a quantitative comparison”, Elsevier, Computer Networks 43, Page No:499–518, 2003.

Qi Mi , John A. Stankovic and Radu Stoleru, “Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks”, WiSec’10, March 22–24, 2010.

Donggang Liu, Peng Ning, An Liu, Cliff Wang and Wenliang Kevin Du, “Attack-Resistant Location Estimation in Wireless Sensor Networks”, ACM Transactions on Information and System Security (TISSEC), Volume 11 Issue 4, July 2008.

Honglong Che, Wei Lou, Junchao Ma and Zhi Wang, “TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks”, Sensor Technologies and Applications, SENSORCOMM '08, Aug25-31, 2008.

Honglong Chen, Wei Lou and ZhiWang, “Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks”, Springer, pp. 296–309, 2009.

Honglong Chen, Wei Lou, Zhi Wang, “Secure Localization Against Wormhole Attacks Using Conflicting Sets”, IEEE, 2010.

P. S. Velumani and S.Murugappan, “Ant based Target Tracking and Localization Technique for Wireless Sensor Networks”, European Journal of Scientific Research, Vol.70, No.4, pp. 554-568, (2012).

Lu, C., Xiong, H., Liu, Z., An asymmetric encryption algorithm for wireless sensor networks based on elliptic curve cryptosystem, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2290-2297.

Qian, P., Wu, M., Privacy preserving in data aggregation of WSN, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2489-2494.

Network Simulator: http:///

Said Ben Alla, Abdellah Ezzati, A Qos-Guaranteed Coverage and Connectivity Preservation Routing Protocol for Heterogeneous Wireless Sensor Networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize