1 / 13

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. Under Guidance- Internal Guide- Ms. Shruti T.V External Guide- Ms. Parkavi. By- Pranshul Maheshwari(1ew07is063) Prashant Kumar(1ew07is064) Rohit Rana(1ew07iso84). Abstract.

faye
Télécharger la présentation

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes Under Guidance- Internal Guide- Ms. Shruti T.V External Guide- Ms. Parkavi By- Pranshul Maheshwari(1ew07is063) Prashant Kumar(1ew07is064) Rohit Rana(1ew07iso84)

  2. Abstract • Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad-hoc and sensor networks. • Despite significant research efforts in this direction, some fundamental questions still remain unaddressed:- • In the presence of cheating beacon nodes, what are the necessary and sufficient conditions to guarantee a bounded error during a two-dimensional distance-based location estimation? • Under these necessary and sufficient conditions, what class of localization algorithms can provide this error bound? • In this paper, we attempt to answer these and other related questions by following a careful analytical approach.

  3. Introduction (1) • Localization or location discovery in distributed wireless networks can be broadly classified into range-based and range-free techniques. • Range-based techniques are further classified into two broad categories, viz., - Beacon-based techniques and - Beacon-free techniques. • Beacon-based algorithms require the presence of special nodes called Beacon or Anchor nodes, which know their own location and are strategically placed in the network. • other nodes first compute the distance (or angle) estimates to a set of neighboring beacons and then estimates their locations.

  4. (2) • Nodes B1, B2, B3, and B4 located at positions (x1,y1), (x2,y2), (x3,y3), (x4,y4) respectively, act as beacon nodes. • The target node T estimates distances z1, z2, z3 and z4 respectively, to these beacon nodes and computes its own location (xT,yT) by trilateration (or triangulation). • Beacon nodes B1, B2, and B4 behave honestly, whereas beacons B’3,and B3 cheat. This causes the target node T to compute its location incorrectly as (x’T,y’T) instead of (xT,yT) Distance-based (range-based) localization. (a) Trilateration. (b) Cheating beacons

  5. Approach • Specifically, we make the following contributions: • First, we prove that if the no. of malicious beacons >= n-2/2 where n is the total number of beacons then no algorithm can guarantee a bounded localization error. • Algorithms provide a guaranteed degree of localization accuracy, if the no. of malicious beacons <= n-3/2 • proposing illustrative algorithms that belong to this class of robust distance-based algorithms i- Polynomial-Time algorithm (with a polynomial (cubic) runtime complexity) j- Heuristic algorithm(using centriod formula)

  6. Software Requirements • Java1.4 or higher • Java Swing – front end • JDBC –Database connectivity • Networking-Socket programming • MS-Access : - Back end • Operating system : - Windows XP Professional. • Front End : - Visual Studio 2005. • Tool used : - Eclipse

  7. Hardware Requirements • System : Pentium P4 Processor 2.8Ghz(min) • Hard Disk : 10 GB(min). • Monitor : 15 VGA Colour. • Ram : 128 Mb(min).

  8. Modules • Detection and elimination cheating beacon nodes • Localization

  9. Module 1 Detection • Technique used: i. RSSI(Received Signal Strength Indicator) j. Time of Arrival (ToA) k. Time Difference of Arrival (TDoA) In this module a node is checked whether it is a cheating node or normal node based on bandwidth calculation.

  10. Module 2 Localization • Heuristic algorithm(using centriodformula) In this module secure position of node is detected based on heuristic formula.

  11. Conclusion • By means of sound analysis, we have derived the conditions for secure and robust distance-based localization in the presence of cheating beacons. • We have outlined the necessary and sufficient conditions for achieving a bounded localization error and defined a non-empty class of algorithms. • Although the analytical results and bounds presented here are very general and have been verified for simple error models, it would be worthwhile to observe how these results would extend to specific wireless environments and systems. • This will be undertaken as future research on this topic…..

  12. Future Enhancements • An open question is, what is the best algorithm to find the intersection of rings, in terms of worst-case complexity and in terms of average computational time? • We can make the algorithm still simpler to implement. If no. of target nodes increases then little bit congestion in the network occurs, this can be avoided by researching new technologies.

  13. Thank you

More Related