You are on page 1of 10

Cluster Comput

DOI 10.1007/s10586-017-1057-3

An adaptive signal strength based localization approach


for wireless sensor networks
G. Kiruthiga1 · M. Mohanapriya2

Received: 21 March 2017 / Revised: 15 June 2017 / Accepted: 15 July 2017


© Springer Science+Business Media, LLC 2017

Abstract In wireless sensor networks (WSNs), frequent value · Delivery ratio · Overall delay and location detection
update of node location becomes very difficult to estimate efficiency of sensor nodes
while nodes are moving with high speed. In such cases, it
is not able to find the location due to excessive overhead. If
a sensor node wants to communicate with neighbor node, 1 Introduction
geographical location of node is required. In hierarchical
structure of WSN, it is very difficult to deploy the sensor node 1.1 Impact of location in wireless sensor network
in accurate position. In previous schemes, there are several
methods which were proposed to achieve location accuracy. wireless sensor networks (WSN) contains sensor nodes with
However, it suffered from excessive overhead during local- having low or high mobility to watch corporal or ecologi-
ization process. In this research work, an adaptive signal cal situations [1]. These nodes together forward the packets
strength based localization approach (ASSLA) is proposed through the specific paths to the intended node location. In
for increasing location accuracy with node update method. the architecture of WSN, a few or many nodes are connected
In this approach, the stable paths are found with the deter- to other sensor nodes that, topology may be varied i.e. static
mination of bit error rate, signal strength and packet delivery or dynamic depends on mobility of sensor nodes. In general.
ratio. Once the paths are found, a cluster is formed with mini- sender node is connected to gateway which is called base
mal hop count value. Node location update value is estimated station. This station provides a connection to world though
using revised vector concept and trilateration method. From WiMax, WiFi, 2G and 3G standards.
the extensive simulation results and analysis using network Sensor nodes are limited with various resources, so there
simulation tool (NS 2.34), the proposed approach ASSLA is a requirement of efficient and energy sensible protocol to
outperforms than existing schemes in terms of delay, loca- increase the network lifetime of WSN. All the sensor nodes
tion accuracy, overhead, delivery ratio, location detection are not kept with the common ID due to redundancy at the
efficiency. destination. If we design the routing protocol, there is some
kind of metrics to be kept i.e. scalability, fault tolerance,
Keywords WSN · Localization scheme · Stable path latency and QoS.
determination · Cluster routing · Node location update The main purpose of a sensor network is to gather data,
process the data and forward it to the sink. The problem
of location estimation or temporal coordinates of wireless
sensor node is called localization. Nowadays, localization
B G. Kiruthiga
kiruthiga_g532@rediffmail.com becomes a major research and development area in WSN.
M. Mohanapriya
Based on node positions, the geographical location of nodes
mohanapriyaasaithambi@gmail.com can be easily tracked and identified. Some kind of localiza-
tion algorithm is required for random node distribution and
1 Karpagam University, Coimbatore, India mobility. The major feature of WSN is self-localization. In
2 Coimbatore Institute of Technology, Coimbatore, India some applications, the collected information may be useless

123
Cluster Comput

whereas the status of node location is unknown. Localiza- Khedr [4] has developed range free approach with sectored
tion plays a major role in WSN to increase the delivery antennas to identify and locate mobile sensor nodes. Sensor
rate and to prolong the network lifetime. It is necessary for nodes and seeds were deployed with mobility to increase
inventory management intrusion detection, precision agri- the efficiency of antenna. According to mobility of neighbor
culture, health monitoring, environmental monitoring, bush nodes, seeds are used to find the location sector of antenna.
fire surveillance, road traffic monitoring, and water quality The central arc of coverage area and crossed intersection area
monitoring etc. are the key parts of location estimation.
In previous localization schemes [2], Anchor based local- Liu et al. [5] developed a localization scheme with more
ization [anchor nodes: nodes with known location are security to withstand the attack on the DV-Hop scheme. The
termed as anchor nodes], centralized localization, range efforts were made to reduce the impact of these attacks. In this
based localization and mobile sensor node localization has scheme, authentication was done on flooding packets in the
been discussed. Anchor node localization is essential in DV—Hop as well as beacon nodes weight was estimated to
every localization technique in WSN. The aim of our reduce the effect of capture attack in each sensor node. The
method is determining exact position of nodes instead of position of unknown nodes was affected from the weights
using GPS devices. Hybrid localization was proved through assigned in the beacon nodes.
simulation results for better accuracy and packet delivery Anuj and Sumit [6] have surveyed the two algorithms i.e.
rate. In the proposed approach, stable path is constructed Received signal strength based and genetic algorithm based
initially and cluster is formed through the representative localization in wireless sensor networks. However, some of
paths. In every route maintenance process, node loca- these algorithms were consuming more time for calculat-
tion accuracy is improved based on node location update ing location information of the nodes. Hybrid localization
value. schemes were also discussed to increase the location accu-
racy but it needs more computational time.
1.2 Main requirements and characteristics of WSN In this method [7], the enhanced voting based secure local-
ization approach was developed to calculate the location
Compared to ad hoc networks and other wireless networks, of sensor nodes with anchor nodes using bilateration and
WSN has some specific features i.e small size, limited energy trilateration methods. The energy spent for location determi-
consumption etc. The performance of the system can be var- nation is reduced with this approach and the communication
ied based on network size, power and cost. The following cost was also decreased. But the security of the data is not
points that affect the performance of WSN design [1], is enhanced with any one of localization scheme.
given below. Bajaj [8] introduced the new algorithm for connecting the
Operation The operation policy depends on the type of sen- WSN nodes during the network initialization phase. There
sors used for variable applications. are three phases involved i.e. neighbor formation, group
Localization scheme It is a method to estimate the accurate formation and localization error corrections. The neighbor
position of sensor nodes in WSN environment. tables are maintained on each routing table for the nodes
Scalability It can be applied to any network with any level of within the coverage region. The non anchor nodes are con-
scaling without increasing the overhead. nected with anchor nodes to generate the group creation mod-
Consistency Data transmission between node is authenticated ule and are planned to design the WSN network. The process
that can be adapted to network structure. of recollecting the missing nodes was to reduce the error. Ini-
Receptiveness Ability of network can be adapted to dynamic tially nodes are connected before the route maintenance pro-
environment. cess, and get disconnected after the disconnectivity process.
Dynamic nature It is the capability of the network to keep Go and Chong [9] have proposed time of arrival (TOA)
track of mobile nodes and unbalanced data paths. method for WSN where the location estimation between
more than three base stations (BS) and mobile station (MS).
Optimum location estimation was found to reduce location
2 Related work errors. The non line of sight (LOS) was also obtained between
two nodes to improve location accuracy.
Atul and Prashant [3] have proposed a localized scheme for Miao et al. [10] have first identified unreliable sensor
mobile anchor node based on the path planning concept. This nodes with observation method. In this method, anchor node
concept was mainly focused for virtual beacon point creation election scheme was adopted to re-locate the partial nodes.
with alterative movement position trajectory. The chord con- To represent the localization error, reality model was used to
jecture procedure was adopted to locate toe sensor node and observe the distance between intermediate nodes.
to increase the location accuracy. However, due to non linear Singh et al. [11] have proposed a new localization
topology, this scheme suffered from localization error. approach where error analysis has been made to identify the

123
Cluster Comput

behavior of the errors. Error estimation and signal strength Gepshtein and Keller [19] developed as-synchronized-as-
analysis of entire network were done with minimum AoA possible (ASAP) scheme to incorporate the location of sensor
method and Minimum RSSI method. nodes with mobile anchors. Based on global synchroniza-
Mazinani and Farnia [12] developed localization scheme tion and spectral synchronization scheme, this scheme was
with mobile anchor nodes to find exact location of sensor developed with linear equations. The concept of dual spectral
nodes using Global Positioning System (GPS). All mobile embedding technique was adopted to find the global local-
anchor nodes pass the information to its nearby coordinates ization through regression techniques. The noisy distances
in the sensing region. If the sensor nodes and mobile anchor was obtained and corrected to increase the robustness and
nodes are overlapped in certain region, beacon messages will location accuracy.
be received at static sensor nodes. Based on beacon mes- In [20], the Tabu search technique was proposed to obtain
sages, node can obtain its coordinates with maximum signal location of neighbor nodes and its mobility towards new
strength. location. The main goal is to balance energy efficiency and
Wu et al. [13] have introduced the localization algorithm hop count. Several formula techniques were adopted to com-
for WSN. Here all the sensor nodes are integrated with pensate the routing price, energy consumption and network
random communication range and it can be altered during period.
transmission of packets. The data packets were occupied by In [21], domicile time dynamic adjustment technique
the unknown sensor nodes from anchor nodes. A symmet- was suggested that takes the case those completely dif-
ric tetrahedron has been formed based on the three anchor ferent areas could generate different quantity of knowl-
nodes to compute the estimated node position with high edge into consideration, leading to high energy efficiency
accuracy and robustness. Low time and power consump- and network lifetime. The information gathering protocol
tion has been spent for unknown node position discovery permits information routing with less information send-
in WSN. ing time delay and balance energy consumption among
Vinoth and Bhavani [14] have presented a path designing node.
scheme to ensure the minimum localization error and max- In [22], an intrusion detection system (IDS) was designed
imum mobility of anchor node. The location of unknown for the ultra-wideband (UWB) radio technology. This tech-
nodes was verified using this scheme to achieve accuracy nology can be utilized for low power consumption and high
with minimum error and LEACH protocol was deployed to mobility period. Anomaliy detection and location distribu-
protect the energy during the unknown node search phase. tion was adopted in cluster region to satisfy the re-clustering,
Zhang et al. [15] proposed the localization scheme with cluster member observation issues and security require-
secure encryption algorithm to obtain misbehaving nodes ments etc. Table 1. Shows the literature survey of previous
with low overhead and communication cost. Including this, works with their laggings and advantages of proposed
location update procedure was also deployed to meet the work.
requirements and goals of WSNs.
Usha et al. [16] proposed the localized energy aware-
2.1 Problems found in existing schemes
ness restricted neighborhood to provide energy efficiency
during localized routing. All the sensor nodes are randomly
In previous approaches, methods, schemes and protocols,
deployed to obtain location of nodes without depending on
the main target was to achieve node location status with
anchor nodes. The critical transmission radius in distributed
periodic updates with security. However, these schemes
networks was also studied that calculates the minimum dis-
are suffered from high control overhead while updating
tance with less hop count.
node location to source node. The routing table of neigh-
Bhuiyan et al. [17] introduced target tracking (t-tracking)
bor nodes is periodically updated and heavy overflow may
to obtain mobile node and track its exact location. In dis-
be likely to occur. Sometimes energy conservation on
tributed tracking systems, target node remains in specific area
location update will lead to dry state. Hence there are
with maximum radio connectivity and node interactions. If
assumptions to be made in network model and mobility
target node moves out of coverage range, sequence of target
model.
node mobility can be easily determined.
Lee et al. [18] proposed novel three-dimensional (3D)
localization algorithm based on linear least squares estima- 2.2 Motivation
tion (LLSE). The concept of Heron’s formula was used for
target height calculation and conversion from 2D to 3D loca- The proposed work aims to attain balance between loca-
tion. This scheme requires distance measurements associated tion accuracy and stability in network. The analysis is taken
with only three anchor nodes for a 3D location estimation from network simulator tool and it is given in the following
using (LLSE). It used section.

123
Cluster Comput

Table 1 Analysis of previous work


S. no. Author & year Methodology Metrics Laggings found/proposed
scheme advantages

1. Md Zakirul [17], 2015 Mobile target tracking QoS, energy efficiency, More link failures, heavy
location tracking packet flow
2. Lee [18], 2014 Three-dimensional Location error, location High position error, high
localization scheme using accuracy transmission loss
trilateration
3. Gepshtein [19], 2015 Localization using Robustness, accuracy Disorganized random
augmented dual location status
embedding information
4. Orojloo and Haghighat Tabu search based routing Routing price, energy Lagging in integration of
[20], 2016 algorithm consumption and network energy consumption and
period hop count
5. Zhu [21], 2014 A location prediction based Energy consumption, time High delay in route
data gathering delay discovery
6. Karapistoli [22], 2014 Anomaly detection and Anomaly detection rate and Less intruder detection rate
location-attribution delay
algorithm
7. Bajaj [8], 2015 Three-dimensional adaptive Neighbor formation, group High location error during
localization formation and localization the discovery of non
error correction anchor nodes
8. Go [8], 2015 TOA-based localization Localization error More energy spent on
method finding localization error
9. Kiruthiga and Mohanapriya Cluster based location Location accuracy, end to Quick location update, easy
(2017) update end delay, data availability discovery of stable paths,
ratio, detection efficiency, hybrid cluster routing is
control overhead, delivery possible
ratio

3 An adaptive signal strength based localization the network model while the nodes are moving inside or
approach for wireless sensor networks (ASSLA) outside of the region. Only the fixed size packets are transmit-
ted with deterministic route discovery time. The Markovian
In the proposed approach, the stable paths are constructed method is applied to packet transmission in discrete time
based on signal strength, bit error rate (BER) and location period in the form of (DBMAP/D/1/N). N is buffer size of
update value (LUV). Initially the cluster group is formed to the sink node. Packet loss probability is within the transmis-
increase the overall network performance. Cluster is formed sion matrix ((K + 1) (N + 1) × (K + 1) (N + 1)).
with cluster member nodes and anchor nodes. Cluster mem-
ber nodes are neighbor node which communicates with 3.2 Mobility model
anchor node and cluster head (CH). In the second phase, sta-
ble paths are discovered by destination node to source node. In the proposed approach, Random waypoint mobility model
The stable paths are chosen from each hop using the stability is used by varying the pause times with respect to time or
metric. This stability metric indicates the successful packet speed. In this model, node stays in particular position at cer-
delivery rate, location accuracy of nodes, and message count tain point of time. If the pause time is over, a node can choose
between neighbor nodes. Anchor sensor node is chosen with a new destination with uniform speed between 0 and 100
high stability metric. MAXSPEED.

3.1 Network model 3.3 Stable path formation

In the proposed network model, it’s assumed that K+1 mobile Paths are constructed by transferring the control messages
node square measure within the network whereas source node between source and sink nodes. In this proposed approach,
is S and destination node is D. The packets are received stable paths are discovered by the sink node based on suc-
in an exceedingly queuing order from the remainder of P cessful packet delivery rate, location update value and signal
nodes. A symmetric and synthetic model is implemented in strength. If the path is discovered with low packet dropping

123
Cluster Comput

rate around 10% of the total transmitted packets, it is consid- range at the lowest boundary of the network. It is denoted as
ered as stable path. In general, path with high connectivity is SSopt and it is given as,
also referred as stable path. If paths are discovered with low

fault tolerant rate, it is called as unstable paths.
−ln(1 − p 1/Nt )
In this proposed approach, stable paths are constructed SSopt = Pr p − (3)
from the determination of fault tolerant rate, packet delivery σπ
rate and connectivity value. These three metrics are combined
together to estimate the path between two nodes. where p is the probability of non isolated nodes. Nt is the
The first metric is fault tolerant rate. It is used to determine total number of sensor nodes inside the cluster region and σ
how well the path can tolerate the dynamic environment and is the cluster nodes density.
protect the message from the unknown node i.e. attacker. It The BER is estimated from signal to noise ratio (SNR)
is denoted as (P f r ) and it is estimated as, and it is denoted as,


N 1
BE R = (4)
Pf r = H Ns + L BE R + RH D (1) SN R
n=1
Step 5: If anchor node with high hop count value, its
where H P s is the high signal strength of network, LBER is message will be ignored and it will not be broadcasted.
the low bit error rate and RHD is the regulated hop distance Step 6: Anchor node records the location and id of neigh-
with minimum hop count value. bor nodes in its routing table.
Packet delivery rate should be high and it is denoted as Step 7: Cluster head broadcasts the announcement of
(Pdr ). It is given as, minimum hop count value to all nodes and instruct them
to maintain the same.
N o·o f packets r eceived
Pdr = × 100 (2) Step 8: The regulated hop count distance (RHD) between
N o·o f packets sent each nodes is estimated as,
Connectivity value is defined as the combination of packet
n 
k=l ( pk − pl ) + ( pk − pl )
delivery rate, minimum hop count of each nodes and low bit 2 2

error rate. R H D kl = n (5)


k=l Hkl

3.4 Cluster construction


where ( pk − qk ) and ( pl − ql ) are the coordinates of the
anchor nodes k, l and Hkl is the minimum hop count and
Cluster is formed with anchor nodes and neighbor nodes.
it is announced to all nodes by the anchor nodes.
Cluster head is chosen from anchor sensor nodes with more
Step 8: Once the nodes are joined, overall coverage region
connectivity and stability. To minimize the control over-
distance will be estimated.
head, the distance between cluster heads is minimized. It is
achieved through the hop minimum hop count metric. Cluster
head sends cluster joint request (CJR) message to all cluster In Fig. 1, Cluster formation is illustrated. Cluster head is
members inside its zone. If any node wants to join through communicated with cluster member nodes or neighbor nodes
the stable path, it will send joint reply (JR) to cluster head. via stable paths. The high stable paths are represented with
The minimum hop count computation is represented in the minimum hop count value. Node location update value is
following steps. announced by anchor node to all cluster head and cluster
members. It is recorded in all the routing table of nodes.
Step 1: Anchor node sends a beacon packets with a hop Successful packet delivery rate is measured once the route
count value of one to the neighbor nodes. maintenance process finished. If hop count value is increased
Step 2: Neighbor node receives the packet through the randomly, the path between the nodes is kept idle and it will
stable paths with more connectivity. not be used for any transmission process.
Step 3: Neighbor node records the location of anchor
node and increase the hop count value with 1. 3.5 Estimation of node location update value
Step 4: Signal strength and bit error rate is estimated
between anchor node and neighbor node. Once the cluster is created, each node will get more connec-
tivity and packet delivery rate. Before that if an unknown
The optimum signal strength of network is estimated from the node wants to join a cluster, there is a procedure to be fol-
power measured from the reference point (Pr p ) and the radio lowed. It is given as,

123
Cluster Comput

Initialize all nodes

Construct the stable path using fault


tolerant rate and packet delivery rate

Anchor node records the location id of


all neighbors

Fig. 1 Cluster formation through anchor nodes Cluster head broadcast the hop count
and compute RHD
Step 1: Unknown should send a request to join packet to
cluster head with its id. If the id of unknown node is not
matching with cluster head routing table, it will request
the previous routing history and location coordinate of the No
nodes. If the routes the node travelled with low dropping If nodes are joined
rate, it will be added to the cluster by sending the Cluster with minimum RHD
Joint Acceptance (CJA) to unknown node.
Step 2: After calculating the stability and connectivity Search until
information, the location of the nodes is estimated. Each Yes
minimum hop
anchor node broadcasts the packet id, its geographical count found
Form the cluster
location and zero hop count value to remaining nodes
region and choose
inside the cluster region.
cluster head
Step 3: The improved distance vectors (Vkl ) are used to
find the location update by the following equations.

dkl − |u k (i) − u kl (i)|


Vkl = , (6) Compute the distance vector
|u l (i) − u kl (i)| and node location update
where u k (i) and u l (i) are the location information from value
neighbor nodes. dkl is the signal strength based distance
between node k and node l and i is the iteration number.
Step 4: The location update value (LUV) of node k is
Estimated the location
updated as,
accuracy of node
 
Nt 
1
u k (i + 1) = u k (i) + (Vkl + Uk (i)) (7) Fig. 2 Flow chart of process involved in ASSLA
Nt
i=1
Node is connected to all the member nodes with least hop,
This is a single iteration and it will be repeated upt to it is considered as CH. CH announces the information about
R times to achieve high location accuracy. At the final location update value to find the unknown node location. The
iteration, the location update indicates accurate location ID is stored in all members to find the accuracy value in easy
of the nodes (Fig. 3). manner.

Figure 2 shows the process involved in the ASSLA to find the 3.5.1 Packet format of proposed approach
location update value. There are three phases involved here
i.e. Setup the stable path before forming the cluster region. In Fig. 3. packet format of ASSLA is shown. Here the anchor
Nodes are joined with minimum hop count and elect the CH. node and cluster member ID carries 2 bytes.

123
Cluster Comput

Anchor Cluster Locaon Locaon error BER CRC


node ID Member ID accuracy

2 2 4 4 4 2

Fig. 3 Proposed packet format

Table 2 Simulation settings and parameters of ASSLA

No. of nodes 50 and 100


Network size 1200 × 1200 m2
Mac 802.15.4
Radio range 200 m
Simulation time 750 s
Traffic source CBR
Packet size 512 bytes
Mobility model Random way point
Protocol LEACH Fig. 4 Detection efficiency versus no. of nodes

The simulation results are presented in the upcoming


The next field is location accuracy field which indicates the
session. The proposed approach ASSLA is compared with
accurate location update value. It is obtained through stable
t-tracking [17], with LM scheme [18] and ASAP [19] in pres-
paths only. In the fourth field, the location error is calculated
ence of location error environment.
to indicate the deviation in signal strength or geographical
location. Bit error rate indicates the packet contains error
due to dislocation of sensor nodes. CRC is cyclic redundancy 4.3 Results
check to find the error correction during packet transmission
process In the first analysis, the no. of sensor nodes is varied as 10,
20, 30, 40 and 50.
Figure 4 shows the results of detection efficiency for the
4 Simulation model and results nodes 10, 20…50 nodes scenarios. The proposed approach
achieves more detection efficiency than previous schemes.
4.1 Simulation model and parameters Around 90% of detection of unknown nodes location is
achieved in ASSLA. In the proposed approach, But in pre-
ASSLA is evaluated with network simulator tool (NS 2.34). vious schemes, due to non linear topology it is achieved low
In this simulation, 100 sensor nodes move in a 1200 × 1200 location detection efficiency. Stable path is first initialized to
square region for 75 s simulation time. The transmission achieve maximum detection efficiency of nodes. Path should
range of sensor nodes is 250 m. The simulated traffic is con- be stable with maximum capacity and accuracy to identify
stant bit rate (CBR). The simulation settings and parameters the node mobility with maximum velocity. ASSLA has sev-
are summarized in Table 2. eral advantages i.e. location update and cluster construction.
In cluster construction phase, it is the responsibility of cluster
4.2 Performance metrics head to group all members inside the region with maximum
location accuracy. To achieve maximum level, bridge mem-
The performance is evaluated according to the following met- bers are also tutored to give location information about cluster
rics. members to the cluster head.
Location accuracy It defines that how much mobile nodes Figure 5 shows the results of control overhead versus
are easily identified and located with respect to static sensor mobility. From the results, we can see that proposed ASSLA
nodes. achieves less overhead than previous schemes. Paths are rep-
Detection efficiency It defines the ratio of detected unknown resented by the sink node with minimum hop count and
sensor nodes to deployed sensor nodes. it leads to low overhead in proposed approach. ASSLA
End-to-end delay The delay occurs from source to destination achieves (86–43) control packets than previous schemes.
node while taking an account for propagation and accessing Overhead is a major issue while identifying the location of
the information. nodes. Nodes are easily compromised by third parties. Hence
Packet delivery ratio It defines the ratio of packet delivered the travelling of packets may get disturbed which leads to
to packet sent from source. flooding. Due to flooding, the packets are randomly moving

123
Cluster Comput

Fig. 5 Control overhead versus mobility Fig. 7 End to end delay versus no. of nodes

Fig. 8 Data Availability ratio versus time


Fig. 6 Packet delivery ratio versus no. of nodes

Figure 7 illustrates the results of end to end delay ver-


without following the path regulations. To reduce overhead, sus no. of nodes. From the results, it is seen that proposed
the proposed scheme has location update mechanism with approach ASSLA has less end to end delay (0.2–0.05 ms)
stable path approach. than the existing schemes. The proposed system reduces the
Figure 6 shows the results of packet delivery ratio while delay by means of localization routing. Packets arrived at
varying the number of nodes. Clearly ASSLA achieves more the destination with less delay in proposed approach. Delay
packet delivery ratio (21–90%) than previous schemes. Sta- includes propagation delay, queuing delay and process delay.
ble paths are constructed based on delivery rate, Signal In the proposed approach, we use the concept of prior route
strength and bit error rate. The packets are successfully deliv- strategy to forward the packets efficiently with less propa-
ered to the destination. Once the nodes are located with gation delay. To minimize the delay, the effort was made on
proper channel, the omni directional antenna located in all construction of cluster and stable path.
nodes will try to monitor other nodes activities. Node will Figure 8 shows the results of data availability ratio versus
try to capture the packet information and route information Time. From the results, we can see that proposed system has
towards the destination node. Paths are formed with more sta- Data availability ratio (2500–4562) packets than the previ-
bility and adaptable to any environment situations. Hence the ous schemes. The proposed system increases data availability
nodes are receiving maximum packets with minimum loss. rate by clustering topology. Data should be always available

123
Cluster Comput

results, the ASSLA outperforms than existing schemes. This


work can be extended with secure scheme to protect node
location and to provide confidentiality in future.

References

1. Fulara, Y.K.: Some aspects of wireless sensor networks. Int. J.


AdHoc Netw. Syst. (IJANS) 5(1), 15–24 (2015)
2. Singh, S., Shakya, R., Singh, Y.: Localization techniques in wireless
sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(1), 844–850
(2015)
3. Atalkar, A.D., Wankhade, P.S.: Mobile anchor based localization
scheme in wireless sensor network. Int. J. Electr. Electron. Eng.
7(1), 75–80 (2015)
4. Khedr, A.M.: New localization technique for mobile wireless sen-
sor networks using sectorized antenna. Int. J. Commun. Netw. Syst.
Sci. 8, 329–341 (2015)
5. Liu, X., Yang, R., Cui, Q.: An efficient secure DV-Hop localization
for wireless sensor network. Int. J. Secur. Its Appl. 9(7), 275–284
Fig. 9 Location accuracy versus time (2015)
6. Kumar, A., Chaudhary, S.: Improved range localization in wireless
sensor networks: a survey. Int. J. Adv. Res. Comput. Sci. Softw.
whenever the user wants. Here the packets are forwarded and Eng. 5(5), 1199–1208 (2015)
stored in the buffer of node with maximum capacity. Packets 7. Nirmala, M.B., Manjunatha, A.S.: Enhanced voting based secure
localization for wireless sensor networks. Int. J. Comput. Netw.
are replicated to the node if any packets are lost. To avoid such
Inf. Secur. 12, 25–59 (2015)
scenario, data availability metric is measured in all schemes. 8. Bajaj, H.D.R.: A novel three-dimensional adaptive localization (T-
ASSLA achieves more value compared to others. dial) algorithm for wireless sensor networks. IOSR J. Comput. Eng.
Figure 9 shows the results of location accuracy versus 17(3), 58–64 (2015)
9. Go, S., Chong, J.-W.: Improved TOA-based localization method
time. From the analytical results, it is seen that ASSLA has
with BS selection scheme for wireless sensor networks. ETRI J.
more accuracy (78–98) degree than the previous schemes. 37(4), 707–716 (2015)
The proposed system increases network accuracy based 10. Miao, C., Dai, G., Ying, K., Chen, Q.: Collaborative localiza-
on improved vectors of geographical geometry parameters. tion and location verification in WSNs. Sensors 15, 10631–10649
(2015)
Accuracy of node can be easily improved in ASSLA because
11. Singh, A., Kumar, S., Kaiwartya, O.: A hybrid localization algo-
of node location update mechanism. To achieve maximum rithm for wireless sensor networks. Int. Conf. Recent Trends
accuracy, the metric called location update will intimate node Comput. 57(2015), 1432–1439 (2015)
about other node location. 12. Mazinani, S.M., Farnia, F.: Localization in wireless sensor network
using a mobile anchor in obstacle environment. Int. J. Comput.
Commun. Eng. 2(4), 438–441 (2013)
13. Hua, W., Xing, J., Liu, Y.: High efficient localization algorithm
5 Conclusion and future work applied in complicated 3D wireless sensor networks (ELCV). J.
Inf. Comput. Sci. 12(2), 455–466 (2015)
14. Kumar, K.V., Bhavani, S.: An effective localization based opti-
In non linear structure of WSN, location finding is a major mized energy routing for wireless sensor networks. Middle East
issue which may lead to more overhead and less location J. Sci. Res. (MEJSR), pp. 915–923, doi:10.5829/idosi.mejsr.2015.
accuracy. Hence the network performance may be degraded. 23.05.22244, ISSN 1990-9233 (2015)
From the proposed approach ASSLA, localization is imple- 15. Zhang, T., He, J., Li, X., Wei, Q.: A signcryption-based secure
localization scheme in wireless sensor networks. Int. Conf. Med.
mented using cluster region. High network size can also be Phys. Biomed. Eng. 33, 258–264 (2012)
adopted to achieve global connectivity. Location accuracy is 16. Usha, S., Tamilarasi, A., Anbuthiruvarangan, K.: Energy-efficient
improved based on location update procedure. Hop count is localized routing in wireless sensor networks. Int. J. Eng. Trends
reduced to support shortest path routing. To find non anchor Technol. (IJETT) 4(5), 1–5 (2013)
17. Bhuiyan, M.Z.A., Wang, G., Vasilakos, A.V.: Local area prediction-
node in a stipulated period, cluster construction is adopted to based mobile target tracking in wireless sensor networks. IEEE
minimize location error. The formation of stable path is used Trans. Comput. 64(7), 1968–1982 (2015)
to support location error estimation and network overhead 18. Lee, J.-K., Kim, Y., Lee, J.-H., Kim, S.-C.: An efficient three-
reduction. The distance between cluster members is used to dimensional localization scheme using trilateration in wireless
sensor networks. IEEE Commun. Lett. 18(9), 1591–1594 (2014)
reduce error. From the stable path discovery and location 19. Gepshtein, S., Keller, Y.: Sensor network localization by aug-
update, the energy consumption can be reduced for the pre- mented dual embedding. IEEE Trans. Signal Process. 63(9),
diction of non anchor nodes. From the extensive simulation 2420–2431 (2015)

123
Cluster Comput

20. Orojloo, H., Haghighat, A.T.: A Tabu search based routing algo- M. Mohanapriya received her
rithm for wireless sensor networks. Wirel. Netw. 22(5), 1711–1724 B.E degree in CSE from Sri
(2016) Krishna College of Engineering
21. Zhu, C., Wang, Y., Han, G., Rodrigues, J.P.C., Guo, H.: A loca- and Technology, Coimbatore in
tion prediction based data gathering protocol for wireless sensor 2002, received M.E degree in
networks using a mobile sink. Ad hoc Netw. Wirel. Netw. 8629, CSE from Crescent Engineering
152–164 (2014) College affiliated to Anna Uni-
22. Karapistoli, E.: Anastasios A economides, ADLU: a novel anomaly versity in 2004 and completed
detection and location-attribution algorithm for UWB wireless sen- her Doctorate Anna University,
sor networks. EURASIP J. Inf. Secur. 3, 1–12 (2014) Chennai, Under the title Detec-
tion and Elimination of Black
Hole Attack in Mobile Ad Hoc
Networks. She is working as an
G. Kiruthiga received the B.E Associate Professor in the Dept
degree in CSE from PSR Engi- of CSE at Coimbatore Institute
neering college, Sivakasi in of Technology.
2010 and the M.Tech degree
from Kalasalingam University in
2012. She worked as an Assis-
tant Professor in the Department
of Computer Science and Engi-
neering at Karpagam Institute of
Technology (2012–2014), Coim-
batore. She works in the area
of Wireless Sensor Networks.
Her research interest includes the
algorithms for sensor networks.

123

You might also like