• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization


Abstract

In this paper a three-phase secure compressive sensing (CS) and received signal strength (RSS) based target localization approach is proposed to mitigate the effect of malicious node attack. RSS measurements are first arranged into a group of subsets where the same measurement can be included in multiple subsets. Intermediate target position estimates are then produced using individual subsets of RSS measurements and the CS technique. From the intermediate position estimates, the residual error vector and residual error square vector are formed. The least median of residual error square is utilized to define a verifier parameter. The selected residual error vector is utilized along with a threshold to determine whether a node or measurement is under attack. The final target positions are estimated by using only the attack-free measurements and the CS technique. Further, theoretical analysis is performed for parameter selection and computational complexity evaluation. Extensive simulation studies are carried out to demonstrate the advantage of the proposed CS-based secure localization approach over the existing algorithms.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
JunYan, Kegen Yu, Yangqin Cao and Liang Chen, "Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization," KSII Transactions on Internet and Information Systems, vol. 11, no. 9, pp. 4418-4437, 2017. DOI: 10.3837/tiis.2017.09.013

[ACM Style]
JunYan, , Yu, K., Cao, Y., and Chen, L. 2017. Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization. KSII Transactions on Internet and Information Systems, 11, 9, (2017), 4418-4437. DOI: 10.3837/tiis.2017.09.013