A Secure Data Transmission Scheme in Wireless Sensor Networks

Similar documents
A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

Research on Relative Coordinate Localization of Nodes Based on Topology Control

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

manufacturing process.

Research on Heterogeneous Communication Network for Power Distribution Automation

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

Improvement of Buffer Scheme for Delay Tolerant Networks

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Geospatial Information Service Based on Ad Hoc Network

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

PUBLICATIONS. Journal Papers

Wireless Sensor Network Optimization using multiple Movable Sensors for Data Gathering

ZigBee Routing Algorithm Based on Energy Optimization

Survivability Evaluation in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Integrated Routing and Query Processing in Wireless Sensor Networks

Target Tracking in Wireless Sensor Network

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Model the P2P Attack in Computer Networks

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui

Selection of Optimum Routing Protocol for 2D and 3D WSN

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Energy Efficient and Collision Aware Routing Algorithm for Wireless Sensor Networks

A Fault-recovery Routing Approach for Loop-based Clustering WSN

CLUSTER HEAD SELECTION USING QOS STRATEGY IN WSN

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

International Journal of Research in Advent Technology Available Online at:

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

World Journal of Engineering Research and Technology WJERT

Mobile Agent Driven Time Synchronized Energy Efficient WSN

An Algorithm for Dynamic SDN Controller in Data Centre Networks

Key words: Wireless Sensor Networks, Clustering Routing Algorithm, Hierarchical Multi-hop Clustering Routing Algorithm

A Design of Greenhouse Remote Monitoring System Based on WSN and WEB

A New Method Of VPN Based On LSP Technology

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

The Research of Delay Characteristics in CAN Bus Networked Control System

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Figure 1. Clustering in MANET.

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

Design of the Power Online Monitoring System Based on LabVIEW

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*

Energy Efficient Clustering Protocol for Wireless Sensor Network

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

A New Distance Independent Localization Algorithm in Wireless Sensor Network

A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks

Research on Transmission Based on Collaboration Coding in WSNs

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

PEGASIS : Power-Efficient Gathering in Sensor Information Systems

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Time Synchronization in Wireless Sensor Networks: CCTS

A New Approach to Sensor Energy Saving Algorithm

ISSN: [Krishan Bala* et al., 6(12): December, 2017] Impact Factor: 4.116

Prianka.P 1, Thenral 2

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

Efficient Clustering Routing Algorithm Based on Opportunistic Routing

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Analysis Range-Free Node Location Algorithm in WSN

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM

Traffic Characteristics Research in Wireless Multimedia Sensor Networks

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 12, December ISSN

A Design of Remote Monitoring System based on 3G and Internet Technology

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

A Fault-Event Detection Model Using Trust Matrix in WSN

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Transcription:

Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Secure Data Transmission Scheme in Wireless Sensor Networks,2 Mingxin YANG, 3 Jingsha HE, 4 Ruohong LIU College of Computer Science and Technology, Beijing University of Technology Beijing 0024, China 2 College of Economics Management, Hebei University of Science and Technology Shijiazhuang 05008, China 3 School of Software Engineering, Beijing University of Technology Beijing 0024, China 4 Beijing Development Area Co., Ltd., Beijing 0076, China Tel: 39333930 E-mail: ymxspj@63.com Received: 9 August 203 /Accepted: 25 October 203 /Published: 30 November 203 Abstract: Wireless sensor networks (WSNs) play a very portant role in the Internet of Things. But, how to save the energy of the wireless sensor nodes and prolong the lifete of such networks is an emergent task for the wide adoption of the networks. Considering the characteristics of wireless sensor nodes where energy consumption for transmitting data is much more than that for computation, this paper presents method for precalculating a secure and efficient path before data transmission begins. The basic idea of the proposed method is that the path length based Floyd algorithm and trust degree between neighboring nodes are used as the reference for the selection of the routes. Data is then transmitted along the secure and efficient path in the WSNs. Copyright 203 IFSA. Keywords: Wireless sensor networks (WSNs), Data transmission, Path length, Truth degree, Security.. Introduction A wireless sensor network is comprised of many wireless sensor nodes that can self-organize to form a network. These wireless sensors may be deployed in an unattended harsh environment while the energy in each wireless sensor node is lited. How to balance the transmission speed and the security and how to save the energy in the sensor nodes to prolong the life of the network are challenging questions for proving the performance of wireless sensor networks [-3]. Moreover, harsh environments may make sensor replacement very difficult. How to transmit the data to the destination or sink node under the condition that the energy in each sensor node is lited is an urgent task to solve. 2. Related Work Many researchers have studied the route selection method in WSNs. Existing route selection schemes may be classified into two types: trust degree based schemes and shortest path based schemes. In trust Article number P_457 49

degree based schemes, a random disperse route method based node behavior trust model and node replication attack is proposed in which three types of attacks, i.e., node replication attack, node failure attack and node denial of service attack, can be avoided effectively. Zhang et al. proposed a trust aware routing framework for wireless sensor network (TARF) [4] in which route strategy is based on trust degree and energy cost. This strategy can prevent malicious nodes from resetting the route information to mislead the network traffic. Hsieh et al. proposed the scheme of adaptive secure design with malicious node detection in cluster based sensor network (Sec-CBSN) [5]. The idea of this scheme is that different kinds of trust degree calculation method can be performed on the basis of different roles and centralized trust management is adopted and the black/white name list is broadcasted to the entire network in order to prevent a node with low trust degree from participating in the route forwarding. Song et al. put the trust degree into the lower energy adaptive clustering hierarchy (LEACH) algorithm. Based on the distributed evaluation mechanism [6], this scheme chooses the candidate cluster head with the highest trust degree as the next router in order to prevent a malicious node from serving as the cluster head. Wang et al. proposed the LEACH TM scheme which is an provement of LEACH based on trust value [7]. In this scheme, the election of cluster head and the formation of the cluster structure are optized based on the trust degree to recognize the malicious packets to reduce packet loss rate. Based on node trust value, Wu et al. proposed a hierarchical routing algorithm to enhance routing security during data transmission in wireless sensor networks [8]. In this scheme, various trust factors are defined in accordance with node behaviors and the systemized trust value is obtained through calculating the weighted average of all kinds of direct and indirect trust values. At the same te, the trust value is combined with the density and the distance between nodes to select the backbone nodes of the network. According to the design of these schemes, the energy can be utilized efficiently and the network life can thus be prolonged. But the transmitted data is divided into several parts, which will be recombined when they reaches the destination. Due to energy litation of wireless sensor nodes, the fact that a node needs to maintain the route table continuously consumes too much energy, which results in reduced network life, on the other hand, all of data is collected in the destination node, thus making the security of the destination node the focus. The third disadvantage of these schemes is that the path length is not the factor for consideration so that transmitted data may be discarded for exceeding the life cycle during the transmission. Another type of scheme is based on the shortest path, that is, the rule for selecting route is the path length based on, for example, the Dijkstra and the Floyd scheme. In such schemes, all the data are transmitted on a single path instead of being divided into multiple parts. But the security of the path is not considered. Once any part of the data is attacked along the path, the destination node will receive the fake data resulting in all of data be retransmitted. As everyone knows that the energy of transmitting data consumes much more energy than that of computing in wireless sensor nodes, retransmission may lead to the reduction of network life. Due to the lack of global consideration on data transmission path, all the above schemes focus on the single network risk factor and ignore the fault and security of the route path itself. This paper presents a secure data transmission scheme (SDTS) in which path length and path trust degree are based upon as the references for route selection through comprehensive consideration. The proposed SDTS scheme has the following advantages: ) In the scheme, one secure and efficient path is calculated before data transmission begins. Data is then transmitted in whole in stead of being divided into multiple parts. So, the life of the network can be prolonged through saving the energy for data retransmission. 2) In this scheme, the trust degree is based on the whole path rather than on single node in the path. The advantage of this method is to prove the security performance of the path. 3) In this scheme, relay nodes successively join the data transmission path between the source node and the destination node. The relay nodes are selected based on the trust degree of the path and the path length is the distance between the source node and the relay node. 3. The Proposed Scheme 3.. Directional Correlation Neighbor Graph (DRNG) The Directional Correlation Neighbor Graph (DRNG) algorithm [9-2] finds neighboring nodes by the means of three phases: information gathering phase, topology construction phase and bi-directional link topology construction phase. ) Information gathering phase (finding the set of reachable neighboring nodes). The wireless node expressed as u gets its location information through the global positioning system (GPS) module. The node then periodically broadcasts a hello message to its neighbors based on its maxum transmission power through a wireless transmission module, which includes its ID, maxum transmission energy and position information. Every wireless node that receives the hello information will determine the scope of neighbor which is N. 2) Topology construction stage (defining the set of neighboring nodes). The topology construction is illustrated in Fig.. R u 50

wu (, p ) p wpv (, ) and the disposal delay te T4 is calculated by node. At last, node 2 sends the packet which includes T3 information to node. u wuv (, ) v Fig.. Topology construction. There are three nodes in the Fig., which are R expressed as u, v and p. If there exists v N u, there doesn t exist another node p which satisfies not only R p N u but also wu (, p) < wuv (, ), wpv (, ) < wuv (, ) and d( p, v) rp, then the node v is picked as the neighbor of the node u, where wu (, p ) is the weight function between node u and node p, wuv (, ) is the weight function between node u and node v, wpv (, ) is the weight function between node p and node v, d( p, v ) is the Euclidean distance between node p and node v and r p is the maxum transmission range. All the nodes that satisfy the above conditions of node v form the neighbor set of node u. (3) Bi-directional link topology construction phase. In this phase, the main work is to ensure the bi-directional links among nodes in the wireless sensor network and all links among sensor nodes need to be added or deleted. 3.2. Te of Arrival (TOA) The method of Te of Arrival (TOA) is one type of wireless location techniques to measure the distance between the neighbor nodes [3-5]. That is, the distance calculation method of TOA is based on the transmission te of wireless radio wave from the sender to the receiver and the transmission speed of wireless Radio Frequency (RF). The distance measurement process of TOA includes two symmetrical measurements and once distance correction, the distance measurement principle of TOA is illustrated in Fig. 2. During the process of the first distance measurement, node sends the packet to node 2 and receives the reply from node 2. The transmission delay te T of node is the te from sending the packet to receiving the reply. The disposal delay te T2 of node 2 is the te from receiving the packet of node to returning the reply to node. During the process of the second measurement, node 2 sends the packet which includes T2 information to node and receives the reply from node. Silarly, the transmission delay te T3 is calculated by node 2 The first measurement The second measurement T Node T4 Result correction Packet Reply Packet (Including T2) Reply T2 Node 2 T3 Packet (Including T3) Distance calculation Fig. 2. Distance measurement in TOA. The signal transmission distance is the distance between nodes, which is expressed by d, so 4d are produced during the whole measurement process. In this paper, the distance mean value is adopted as the last distance correction of the adjacent nodes. 3.3. Determining the Te for Starting Data Collection At first, the GPS [6-8] module in a sensor node starts and the receiver in the module receives the satellite signal and extracts the te signal as the synchronization te to start the te synchronization unit. Sensor nodes begin to collect data after finishing te synchronization. The te synchronization unit of the GPS module in sensor terminal collector is switched to sleep state after finishing the synchronization. There is one te interval from the previous te synchronization to the next te synchronization, which is between ten seconds to two hours. The te range of the te synchronization unit in the GPS module is about five minutes, that is, the process of the GPS synchronization lasts one minute if the GPS unit executes a cold start and lasts five minutes if the GPS unit executes a hot start. The data collector te is postponed five minutes from te synchronization. 5

3.4. Measuring the Distance Between Neighboring Nodes In this scheme, every node gets its location information through the GPS module, then, begins to search its neighboring nodes by using the Directional Correlation Neighbor Graph (DRNG) algorithm, which includes three phases: information gathering phase, topology construction phase and bi-directional link topology construction phase. The distance between adjacent nodes is calculated through the means of te of arrival (TOA) measurement method located in the GPS te synchronization unit. Without loss of generality, the path length between adjacent nodes is calculated using the following formula: d v (t t + t t ) 4 i j j2 i2 ij = () The formula is based on the principle of TOA where the adjacent nodes are expressed as nodes i and j, d ij is the distance between nodes i and j, v is the wireless RF signal transmission rate among nodes, t i is the data transmission te of node i during the first measurement process, which is from sending the data of node i to receiving the reply from node j, t j is the processing te of node j during the first measurement process, which is from receiving data from node i to sending the reply of node j, t j 2 is the data transmission te during the second measurement process, which is from sending the data of node j to receiving the reply of node I and t i2 is the processing te of node i during the second measurement process, which is from receiving the data of node j to sending the reply of node i. 3.5. Calculating the Degree of Trust Trust Model based on Probability adopts probability method to express trust degree, typical representatives are the Beth trust model [9] and Jøsang trust model [20]. Beth trust model divides the trust into direct trust and indirect trust. Based on the expectation of the entity accomplishing the task, the Probability of the entity accomplishing the task is calculated according the positive experience and the negative experience, and the probability is the measurement of the entity s trust degree. Jøsang et al. presents a kind of subjective logic trust model based on binomial posterior probability Beta distribution function, the evidence space and the opinion space are introduced to describe and measure the trust relation in this model, one set of subjective logic operators are presented to derive and calculate the trust degree. Evidence space is made up of a series of observable events produced by entities, entity event is sply divided into positive event and negative event during the process of the two-densional subjective logic, the trust degree of the probability on certain events produced by entities is calculated by binomial posterior probability Beta distribution function. Opinion space is made up of subjective trust evaluations on a series of declaratives and propositions, the subjective trust degree is expressed as quaternion(b, d, u, a), where b is the trust degree for the proposition, d is the distrust degree for the proposition, u is the uncertainty degree for the proposition, a is the base rate. The method for calculating the degree of trust between neighbor nodes adopts the Trust Model based on Probability. Based on the initial trust value of every relay station node, the trust degree of each relay node is calculated according to the communication state of two adjacent relay nodes based on the following formula: T g + = g + b + 2 (2) In the formula, T is the trust degree of node i from the point of view of node m, g is the number of successful communications between nodes i and m and b is the number of failed communications between nodes i and m. 3.6. Selecting Data Transmission Paths ) First, every sensor node stores its ID and the location information in the microprocessor. After receiving the synchronous signal, the sensor node starts to collect data. 2) Every sensor node searches all of its neighbor nodes. According to Formula (2), we can calculate the degree of trust T for the relay node and calculate the path length between two adjacent relay nodes based on Formula (). 3) The sensor responsible for transmitting the collected data stores T and d ij in its data processing unit. For instance, after searching for all the neighbor nodes, the first sensor node stores the calculated value T and d ij in the data processing unit of the first node. 4) According to the following formula: w d = + wt T (3) d P The comprehensive evaluation index of P can be calculated by the sensor. At first, the first sensor node calculates the path length d j which is distance from the first sensor node to its neighbor nodes. Then, it calculates the degree of trust mean value T m based on the following formula: 52

T n T i i= = (4) n in the third step. After setting the path length weight w and the degree of trust path mean weight w, d the first sensor node calculates the comprehensive evaluation index P on each path respectively. 5) Denote the corresponding path length as d 2m whose P value is the biggest. Then, the next node in the path is the second relay node. 6) The previous node passes the data to the next node in order to transmit it to the next relay node. 7) The relay node who receives the collected data decides whether the selected neighbor node is the base station. If the answer is false, the process returns to Step (2). If the answer is true, the process will continue to the next step. 8) The neighbor node sends the stored data to the base station along with the chosen path. 4. An Example Using the Scheme ) The whole topology includes wireless sensor terminal S, wireless sensor relay station A, B and C, and the base station as shown in Fig. 3. Base station 3 2 C 0.9 B 0.9 9 8 7 5 Fig. 3. Topology graph of the routing selection scheme. A t 0.6 S 3) After searching its neighbor node A and C, node S uses two indices, i.e., the degree of trust and the distance, as the criteria to decide which node is the destination sensor node and uses Formula (3) to determine the selected path, where w d and w t are the weight factors in the formula. In Fig. 3, the lengths of two path are d =5 and d 2 =8, the corresponding mean degrees of trust of two paths are T =(.0+0.6)/2=0.8 and T 2 =(.0+0.9)/2=0.95 assuming w d = w t =0.5. The results of evaluating indicator P are P = 0.5 and P 2 =0.538. We then choose the path with the larger P as the data transmission path. Thus the next relay station for node S is node C. 4) Based on the path selected in Step (3), the relay station C continues to find its neighbor node B and the base station using the same method. As the result, two paths are found, i.e., S-C-base station and S-C-B, with the corresponding path lengths d 2 =2 and d 22 =0 and the corresponding mean degree of trust values T 2 =0.967 and T 22 =0.933. The corresponding evaluating indicators are thus P 2 =0.507 and P 22 =0.57. Therefore, the path to be selected is S-C-B due to the larger P 22. The collected data in the relay station C is then transmitted to the relay station B. 5) Based on the selected path in Step (4), the relay station B continues to search for the base station as its next neighbor node and the relay station B then transmits its data to the base station. Thus, the best path is S-C-B-base station. 5. Conclusion In this paper, we present a secure and efficient route selection scheme from the point of application of wireless sensor networks. In this scheme, the function design of sensor node hardware and the routing selection method are designed and two factors, the degree of trust and the path length, are considered. Then, the route selection method finds the appropriate transmission node between the source node and the destination node until the collected data is transmitted from the collection terminal to the base station along the selected path. We also use an example at the end of the paper. In the future, we will extend the degree of trust to include indirect degree of trust. 2) All of the sensors find their location through GPS. The base station s ID is stored in the Micro Processor Unit (MPU) of these sensors. The direct degree of trust of each sensor is calculated through the means of the Truth Model based Probability. The degree of trust of every wireless sensor and the distance among these sensors are displayed in Fig. 3. Acknowledgement This work presented in this paper has been supported by National Natural Science Foundation of China (6272500). 53

References []. Q. Jing, L. Tang, Z. Chen, Trust management in wireless sensor networks, Journal of Software, Vol. 9, No. 7, 2008, pp. 76-730. [2]. Q. Pei, Y. Shen, J. Ma, Survey of wireless sensor network security techniques, Journal of Communications, Vol. 28, No. 8, 2007, pp. 4-22. [3]. H. Wang, S. Zhang, J. Li, Distributed protocol for multi-path routing based on node s subjective trust degree, Journal of Nanjing University of Posts and Telecommunications (Natural Science), Vol. 39, No. 0, 202, pp. 54-64. [4]. S. Zhang, W. Shi, J. Deng, TARF: A trust aware routing framework for wireless sensor networks, in Proceedings of the 7 th European Conference on Wireless Sensor Networks, Cobra, Portugal, 200. [5]. M. Y. Hsieh, Y. M. Huang, H. C. Chao, Adaptive security design with malicious node detection in cluster based sensor networks, Computer Communications, Vol. 30, No., 2007, pp. 2385-2400. [6]. F. Song, B. H. Zhao, Trust based LEACH protocol for wireless sensor networks, in Proceedings of the International Conference on Future Generation Communication and Networking, Yokohama, Japan, 2008. [7]. W. C. Wang, F. Du, Q. J. Xu, An provement of LEACH routing protocol based on trust for wireless sensor networks, in Proceedings of the 5 th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, 2009. [8]. Y. Wu, X. Zhou, R. Feng, J. Wan, X. Xu, Secure routing based on node trust value in wireless sensor network, Chinese Journal of Scientific Instrument, Vol. 33, No., 202, pp. 22-228. [9]. Q. Nie, F. He, A modified DRNG algorithm of topology control, Journal of Southwest University (Natural Science Edition), Vol. 30, No., 2008, pp. 60-64. [0]. N. Li, J. C. Hou, Localized topology control algorithms for heterogeneous wireless networks, IEEE/ACM Transactions on Networking, Vol. 3, No. 6, 2005, pp. 33-324. []. N. Li, J. C. Hou, Topology control in heterogeneous wireless networks: problems and solutions, in Proceedings of the 23 rd Conference of the IEEE Communications Society, Hong Kong, China, 2004. [2]. N. Li, J. C. Hou, L. Sha, Design and analysis of an MST-based topology control algorithm, in Proceedings of the 22 nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, 2003. [3]. S. Venkatraman, J. Caffery, H.-R. You, A novel ToA location algorithm using LoS range estation for NLoS environments, IEEE Transactions on Vehicular Technology, Vol. 53, Issue 5, 2004, pp. 55-524. [4]. L. Yu, L. Zeng, Z. Jin, Research on wireless location algorithm and accuracy analysis based on DTOA, Computer Measurement & Control, Vol. 4, No. 9, 2006, pp. 247-249. [5]. W. Xin, Z. Wang, B. O'Dea, A TOA-based location algorithm for reducing the errors due to non-line-ofsight (NLOS) propagation, IEEE Transactions on Vehicular Technology, Vol. 52, Issue, 2003, pp. 2-6. [6]. Introduction of global positioning system (http://wenku.baidu.com/view/f583e96daef5ef7ba0d 3c70.html). [7]. The analysis of GPS position principle (http://www.cnblogs.com/magicboy0/archive/200 /2/09/90669.html). [8]. The working principle of ting (http://www.elecfans.com/tongxin/rf/2020825480 8.html). [9]. T. Beth, M. Borcherding, B. Klein, Valuation of trust in open network, in Proceedings of the 3 rd European Symposium on Research in Computer Security, Brighton, UK, 994. [20]. A. Jøsang, S. Presti, Analyzing the relationship between risk and trust, in Proceedings of the 2 nd International Conference on Trust Management, Oxford, UK, 2004. 203 Copyright, International Frequency Sensor Association (IFSA). All rights reserved. (http://www.sensorsportal.com) 54