CFP last date
20 December 2024
Reseach Article

Secured GPS based Localization Protocol

by Himani Joshi, Ankur Chaudhary, Anuj Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 20
Year of Publication: 2018
Authors: Himani Joshi, Ankur Chaudhary, Anuj Saxena
10.5120/ijca2018917907

Himani Joshi, Ankur Chaudhary, Anuj Saxena . Secured GPS based Localization Protocol. International Journal of Computer Applications. 181, 20 ( Oct 2018), 24-28. DOI=10.5120/ijca2018917907

@article{ 10.5120/ijca2018917907,
author = { Himani Joshi, Ankur Chaudhary, Anuj Saxena },
title = { Secured GPS based Localization Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 20 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number20/30002-2018917907/ },
doi = { 10.5120/ijca2018917907 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:29.995603+05:30
%A Himani Joshi
%A Ankur Chaudhary
%A Anuj Saxena
%T Secured GPS based Localization Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 20
%P 24-28
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Smart cities, smart villages, everything getting smart and so are the hackers. Networking has an important significance in the modern world of technology and securing it is as important as implementing it. The authors have proposed a Secured GPS Localization(SGPSL) protocol for the purpose of securing the location of the sensor nodes without compromising the resources. SGPSL provides two level security, first at the network authentication level and other at sensor level. To minimize the resource utilization mitigation is carried out. SGPSL is compared with existing GDOP[17] technique. It is observed that the bandwidth, and the energy consumed by the proposed work is 16%, and 19% respectively lesser then GDOP. The time secured is 5.3% lesser too.

References
  1. L. Location and W. S. Network, “Chapter 2,” pp. 12–33.
  2. B. Nemade, “Automatic Traffic Surveillance Using Video Tracking,” Procedia Comput. Sci., vol. 79, pp. 402–409, 2016.
  3. Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust statistical methods for securing wireless localization in sensor networks,” in 2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005, 2005.
  4. D. Liu, P. Ning, and W. K. Du, “Attack-resistant location estimation in sensor networks,” IPSN 2005. Fourth Int. Symp. Inf. Process. Sens. Networks, 2005., 2005.
  5. E. D. Manley, H. Al Nahas, and J. S. Deogun, “Localization and Tracking in Sensor Systems,” IEEE Int. Conf. Sens. Networks, Ubiquitous, Trust. Comput. - Vol 2 - Work., vol. 2, pp. 237–242, 2006.
  6. Y. Wei, Z. Yu, and Y. Guan, “Location Verification Algorithms for Wireless Sensor Networks,” pp. 0–7, 2007.
  7. A. Boukerche, H. A. B. F. Oliveira, E. F. Nakamura, and A. A. F. Loureiro, “Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems,” Comput. Commun., vol. 31, no. 12, pp. 2838–2849, 2008.
  8. D. He, L. Cui, H. Huang, and M. Ma, “Design and verification of enhanced secure localization scheme in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 7, pp. 1050–1058, 2009.
  9. I. Amundson and X. D. Koutsoukos, “A Survey on Localization for Mobile Wireless Sensor Networks,” Mob. Entity Localization Track. GPS-less Environnments, pp. 235–254, 2009.
  10. H. Guo, “Research on a new secure localization technology,” ICCET 2010 - 2010 Int. Conf. Comput. Eng. Technol. Proc., vol. 6, pp. 527–530, 2010.
  11. T. Zhang, J. He, and H. Yu, “Secure localization in wireless sensor networks with mobile beacons,” Int. J. Distrib. Sens. Networks, vol. 2012, 2012.
  12. R. Dwlrq et al., “The Research and improvement of Indoor Localization Algorithm Based on RSSI,” pp. 178–181, 2013.
  13. R. Sharma and R. Sushil, “Security Framework in WSNs : Location,” vol. 9, no. May, pp. 1–8, 2014.
  14. T. Bao, J. Wan, K. Yi, and Q. Zhang, “A game-based secure localization algorithm for mobile wireless sensor networks,” Int. J. Distrib. Sens. Networks, vol. 2015, 2015.
  15. P. Kriz, F. Maly, and T. Kozel, “Improving Indoor Localization Using Bluetooth Low Energy Beacons,” Mob. Inf. Syst., vol. 2016, 2016.
  16. Y. Liu and Y. Zhang, “A Better Range-Free Localization Algorithm in Wireless Sensor Networks,” 2016 Int. Symp. Comput. Consum. Control, pp. 132–135, 2016.
  17. G. Laveti, G. S. Rao, D. E. Chaitanya, and M. N. V. S. S. Kumar, “TDOA Measurement Based GDOP Analysis for Radio Source Localization,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 740–747, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

GPS Localization WSN GDOP Encrypt Secured Localization