6
Cooperative Robust Localization against Malicious Anchors Based on Semi-Definite Programming Dexin Wang and Liuqing Yang Department of Electrical and Computer Engineering, Colorado State University, Fort Collins, CO 80523 [email protected], [email protected] Abstract—Location awareness for wireless sensor networks has attracted significant interests in recent years. In hostile environments, there may be malicious attacks to mislead the location estimation of target nodes. In this paper, we propose a novel secured localization method by applying cooperative semi-definite programming (SDP) algorithm. We also introduce residual normalization to improve the SDP approximation. Co- operation enhances the capability to identify the compromised anchors and the accuracy of location estimation. SDP improves the reliability of the algorithm and the out-of-convex-hull per- formance. Simulation results are provided to demonstrate the aforementioned improvements. I. I NTRODUCTION In typical wireless sensor networks (WSNs), a large number of sensors are deployed in a geographical area to collect local environmental information. Localization and navigation of the sensors are critical for many applications including object tracking, medical services, search and rescue operations, control of home appliances, automotive safety, and battlefield surveillance etc. [1]. Usually, two types of sensor nodes are considered in a localization system, i.e. anchors (or beacons) and targets. Anchors represents those sensors whose location are known prior to the localization process, through manual configuration or global positioning system (GPS), whereas targets’ locations are to be estimated. Numerous localization methods [2–6] have been proposed for WSNs in recent years. These methods share a two-stage ap- proach. In the first stage, targets receive signals from anchors (and other targets in cooperative methods) and, according to the received signals, obtain some measurements including time of arrival (ToA), angle of arrival (AoA), or received signal strength (RSS) etc. Then, in the second stage, targets estimate their own location base on the location references, which include anchors’ locations and the measurements just acquired. However, in hostile environments, there may be malicious attacks in order to sabotage or mislead the localization of targets [7, 8]. The consequences of incorrect location es- timates may be disastrous, e.g. improper military decisions in battlefield or erroneous navigation for unmanned vehicles. Therefore, reliable location estimation is crucial for practical use of localization systems. A common type of malicious attacks is impersonation. The attackers may impersonate anchors to falsely broadcast This work is in part supported by the National Science Foundation under grant No. 1129043. their locations [8]. With respect to the level of sophistication, attacks can be classified as uncoordinated attacks, collusion attacks, and pollution attacks. For uncoordinated attacks, an attacker only compromises one anchor node and does not cooperate with other attackers. In collusion attacks, several attackers may mislead targets to the same location coopera- tively. Pollution attacks are similar to collusion attacks except that attackers attempt to mislead the estimate to a location that is consistent with some authentic location references. Many existing localization methods become vulnerable in such attacks. Authentication can provide some, but limited, reliability through cryptography. Even with encrypted location references, it is still possible for the attackers to compromise some anchors or simply replay location references intercepted at different locations. Attack-resistant minimum mean square error (ARMMSE) in [7], verifiable multilateration in [9] etc. are devised to deal with such situations. ARMMSE is a greedy algorithm based on a iterative Least Trimmed Squares (LTS) [10] approach to identify and eliminate malicious anchors one by one. However, these algorithms do not involve cooperation between targets, and thus limited the performance to detect the compromised anchors and to mitigate their influence on the location estimates. In this paper, we propose a new semi-definite programming (SDP) based cooperative localization method which is robust to the existence of malicious anchors. Cooperation provides more accurate location estimates as well as better coverage with the same anchor deployment. It also enhances the capa- bility to detect malicious anchors. SDP improves the reliability of the localization process, which had unstable performance due to its non-convexity. SDP also outperforms the LS based local search algorithms in the out-of-convex-hull scenarios. The rest of the paper is organized as follows. We first introduce the formulation of the localization system in Sec. II. Secondly, some related former works are briefly described in Sec. III. Detailed in Sec. IV is our proposed algorithm, cooperative attack resistant SDP (CARSDP). Then, some simulation results are shown in Sec. V. Finally, Sec. VI gives the conclusions of this paper. II. SYSTEM MODEL In a WSN localization system with M anchors and N targets in R D , let V a and V x be the set of all anchors and targets respectively. Their locations are represented by a and x as 978-1-4673-3/12/$31.00 ©2013 IEEE 978-1-4673-3/12/$31.00 ©2013 IEEE

[IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

  • Upload
    liuqing

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

Cooperative Robust Localization against MaliciousAnchors Based on Semi-Definite Programming

Dexin Wang and Liuqing YangDepartment of Electrical and Computer Engineering, Colorado State University, Fort Collins, CO 80523

[email protected], [email protected]

Abstract—Location awareness for wireless sensor networkshas attracted significant interests in recent years. In hostileenvironments, there may be malicious attacks to mislead thelocation estimation of target nodes. In this paper, we proposea novel secured localization method by applying cooperativesemi-definite programming (SDP) algorithm. We also introduceresidual normalization to improve the SDP approximation. Co-operation enhances the capability to identify the compromisedanchors and the accuracy of location estimation. SDP improvesthe reliability of the algorithm and the out-of-convex-hull per-formance. Simulation results are provided to demonstrate theaforementioned improvements.

I. INTRODUCTION

In typical wireless sensor networks (WSNs), a large numberof sensors are deployed in a geographical area to collectlocal environmental information. Localization and navigationof the sensors are critical for many applications includingobject tracking, medical services, search and rescue operations,control of home appliances, automotive safety, and battlefieldsurveillance etc. [1]. Usually, two types of sensor nodes areconsidered in a localization system, i.e. anchors (or beacons)and targets. Anchors represents those sensors whose locationare known prior to the localization process, through manualconfiguration or global positioning system (GPS), whereastargets’ locations are to be estimated.

Numerous localization methods [2–6] have been proposedfor WSNs in recent years. These methods share a two-stage ap-proach. In the first stage, targets receive signals from anchors(and other targets in cooperative methods) and, according tothe received signals, obtain some measurements including timeof arrival (ToA), angle of arrival (AoA), or received signalstrength (RSS) etc. Then, in the second stage, targets estimatetheir own location base on the location references, whichinclude anchors’ locations and the measurements just acquired.

However, in hostile environments, there may be maliciousattacks in order to sabotage or mislead the localization oftargets [7, 8]. The consequences of incorrect location es-timates may be disastrous, e.g. improper military decisionsin battlefield or erroneous navigation for unmanned vehicles.Therefore, reliable location estimation is crucial for practicaluse of localization systems.

A common type of malicious attacks is impersonation.The attackers may impersonate anchors to falsely broadcast

† This work is in part supported by the National Science Foundation undergrant No. 1129043.

their locations [8]. With respect to the level of sophistication,attacks can be classified as uncoordinated attacks, collusionattacks, and pollution attacks. For uncoordinated attacks, anattacker only compromises one anchor node and does notcooperate with other attackers. In collusion attacks, severalattackers may mislead targets to the same location coopera-tively. Pollution attacks are similar to collusion attacks exceptthat attackers attempt to mislead the estimate to a location thatis consistent with some authentic location references.

Many existing localization methods become vulnerable insuch attacks. Authentication can provide some, but limited,reliability through cryptography. Even with encrypted locationreferences, it is still possible for the attackers to compromisesome anchors or simply replay location references interceptedat different locations. Attack-resistant minimum mean squareerror (ARMMSE) in [7], verifiable multilateration in [9] etc.are devised to deal with such situations. ARMMSE is a greedyalgorithm based on a iterative Least Trimmed Squares (LTS)[10] approach to identify and eliminate malicious anchors oneby one. However, these algorithms do not involve cooperationbetween targets, and thus limited the performance to detectthe compromised anchors and to mitigate their influence onthe location estimates.

In this paper, we propose a new semi-definite programming(SDP) based cooperative localization method which is robustto the existence of malicious anchors. Cooperation providesmore accurate location estimates as well as better coveragewith the same anchor deployment. It also enhances the capa-bility to detect malicious anchors. SDP improves the reliabilityof the localization process, which had unstable performancedue to its non-convexity. SDP also outperforms the LS basedlocal search algorithms in the out-of-convex-hull scenarios.

The rest of the paper is organized as follows. We firstintroduce the formulation of the localization system in Sec. II.Secondly, some related former works are briefly describedin Sec. III. Detailed in Sec. IV is our proposed algorithm,cooperative attack resistant SDP (CARSDP). Then, somesimulation results are shown in Sec. V. Finally, Sec. VI givesthe conclusions of this paper.

II. SYSTEM MODEL

In a WSN localization system with M anchors and N targetsin R

D, let Va and Vx be the set of all anchors and targetsrespectively. Their locations are represented by a and x as

978-1-4673-3/12/$31.00 ©2013 IEEE978-1-4673-3/12/$31.00 ©2013 IEEE

Page 2: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

follows.

a = [a1 a2 · · · aM ]D×M (1)

x = [x1 x2 · · · xN ]D×N , (2)

where am represents the location of the mth anchor, and xi

denotes the location of the ith target.The ability of communication between anchors and targets

are defined by Ea and Ex as

Ea:={(m,n) :am∈Va,xn∈Vx, and ‖am−xn‖≤Ra}

Ex:={(i, j) :xi,xj ∈ Vx, and ‖xi−xj‖ ≤ Rx},(3)

where Ra and Rx are ranges of anchor-target and target-targetcommunications respectively.

Let rmn denote the anchor-target distance measurements as

rmn = ‖am − xn‖+ ηmn, ∀ (m,n) ∈ Ea, (4)

and rij denote the target-target distance measurements as

rij = ‖xi − xj‖+ ηij , ∀ (i, j) ∈ Ex, (5)

where ηmn s and ηij s are i.i.d. Gaussian random variableswith zero mean and variance of σ2.

III. RELATED WORKS

A. Attack Resistant MMSE

Attack resistant minimum mean square error (ARMMSE)is proposed in [7] to accommodate hostile environments inwhich malicious anchors exist.

The algorithm is presented in Algorithm 1, in which[x∗, ς∗] ← Locate(V a) denotes the process that solves theoptimization problem in (6) and gets the location estimatesx∗, i.e. the minimizer, and the minimum mean square error

(MSE) of the distance measurements ς∗, namely the optimalvalue of the objective function, base on the location referencesreceived from the anchors in V a.

minimize ς =1

|Ea|

⎛⎝ ∑

(m,n)∈Ea

(rmn − ‖am − xn‖)2

⎞⎠ . (6)

Algorithm 1 ARMMSE

V ahonest ← V aV amal ← ∅[x∗, ς∗] ← Locate(V a).while ς∗ > ξ AND |V ahonest| > D + 1 do

for all vi ∈ V ahonest do[xi, ςi] ← Locate(V ahonest\{vi})

end fori∗ ← argminvi∈V ahonest

ςix∗ ← xi∗

ς∗ ← ςi∗

V ahonest ← V ahonest\{vi∗}V amal ← V amal

⋃{vi∗}

end whileOutput: x

The threshold ξ for the MSE can be determined base on theχ2 distribution, since the errors are assumed to be Gaussiandistributed when all the anchors are honest and the locationestimate is accurate. Hence, ς∗

σ2 ∼ χ2Nc

, where Nc is thenumber of connections associated with the target. And gradientdescent method is used here to solve the unconstrained LeastSquares (LS) optimization problem in (6).

B. Cooperative Localization

Cooperative localization enhances the performance, in termsof both accuracy and coverage with the same anchor deploy-ment, by making use of target-target distance measurements[3, 6]. Cooperative MSE is defined as

ςc =1

|Ea|+ |Ex|/2

⎛⎝ ∑

(m,n)∈Ea

(rmn − ‖am − xn‖)2

+∑

(i,j)∈Ex,

and i<j

(rij − ‖xi − xj‖)2

⎞⎟⎠ .

(7)

The minimizer x∗ of (7) is the solution for cooperative

localization.

C. Semi-Definite Relaxation

The problem in (6) is non-linear and non-convex withrespect to x. it can be converted into a convex one with semi-definite relaxation. Denote Y = x

Tx, and let

Z =

[ID×D x

xT

Y

] 0. (8)

After relaxation, the problem is reformulated as

minimizeα,α,Z

∑(m,n)∈Ea

αmn +∑

(i,j)∈Ex,

and i<j

αij

subject to

([−aT

m eTn

]Z

[−am

en

]−r2mn

)2

<αmn,

([01×D (ei−ej)

T]Z

[0D×1

ei−ej

]−r2ij

)2

<αij ,

∀(m,n) ∈ Ea, ∀(i, j) ∈ Ex and i < j,

Z(1:D) = ID×D, Z 0,(9)

where ei denotes a vector in RN with a unit entry in the ith

coordinate and zero entries elsewhere. And Z(1:D) denotes theD-by-D principal submatrix at the upper left corner of Z.

SDP has several advantages compared with non-convexlocalization methods [11, 12]. Firstly, because SDP is con-vex optimization, local minimum must also be the globalminimum. Therefore, we can get a global minimum withoutemploying a computationally expensive global search method.Secondly, SDP works well when the target is out of the convexhull formed by the anchors [6].

Page 3: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

IV. PROPOSED ALGORITHM

A. Residual Normalization

The method in (9) is not a good approximation to maximumlikelihood (ML) estimator given the distance measurementmodel in (4) and (5) is assumed. The likelihood function is

p(r, r|x) ∝ exp

⎧⎪⎨⎪⎩−

1

σ2

⎛⎜⎝ ∑

(m,n)∈Ea

η2mn +∑

(i,j)∈Ex,

and i<j

η2ij

⎞⎟⎠⎫⎪⎬⎪⎭ . (10)

Thus the ML estimator is

minimizex

∑(m,n)∈Ea

η2mn +∑

(i,j)∈Ex,

and i<j

η2ij . (11)

Nonetheless, the residuals in (9) are of the form r2mn −‖am − xn‖2. They are approximately Gaussian distributedwhen ηmn � ‖am − xn‖, but with different variances.

This issue can be tackled by residual normalization. Let εmn

be the normalized residual of the measurement between am

and xn.

εmn =r2mn − ‖am − xn‖2

2rmn

=η2mn + 2ηmn‖am − xn‖

2rmn

=2ηmn(ηmn + ‖am−xn‖)−η2mn

2(ηmn + ‖am−xn‖)= ηmn−

η2mn

2rmn

.

(12)And similar results can be easily derived for target-targetresiduals εij .

Note that when ‖am − xn‖ � |ηmn|, εmn ≈ ηmn ∼N (0, σ2). This proposition is supported by the simulationresults in Fig. 1.

Remark 1 All the three curves in Fig. 1 are roughly linearfrom probability of 0.01 to 0.95. That means the normalizedresiduals are approximately Gaussian distributed over a prob-ability of 94% when the measurement error standard deviationσ � 5, and even higher probability with smaller errors.

Given this observation, we can approximate the ML esti-mator of targets’ locations by

minimizex

∑(m,n)∈Ea

ε2mn +∑

(i,j)∈Ex,

and i<j

ε2ij . (13)

B. Cooperative Attack-Resistant SDP (CARSDP)

In [3], it is shown that cooperation can improve the ac-curacy and coverage of the localization system. In hostileenvironment, it is also beneficial to integrate localizationbelief from distant anchors that were not available in non-cooperative situations. As in ARMMSE, local algorithms,e.g. gradient descent, Newton’s method etc., are more likelyto be trapped at local minima. On the other hand, globaloptimization algorithms such as simulated annealing, particleswarm and genetic algorithm, are computationally heavy andstill have no assurance of global optimal solution [13]. In otherwords, the solution may be far away from the true location oftargets even if all the location references are genuine and the

−10 −8 −6 −4 −2 0 2 4 6 8

0.001

0.003

0.010.02

0.05

0.10

0.25

0.50

0.75

0.90

0.95

0.980.99

Data

Pro

babi

lity

Normal Probability Plot

Standard Normal

σ = 1

σ = 3

σ = 5

Fig. 1: Graphical distribution comparison (Q-Q plot) betweenstandard Gaussian samples and normalized residuals collectedin a 30 by 30 area with 8 anchors and 10 targets under differentnoise levels. The horizontal axis denotes the values of datapoints. The vertical axis shows the corresponding cumulativeprobability function values which are scaled properly such thatthe plot will be linear if the two data sets come from the samedistribution.

measurement errors are small. Using the solution LinearizedLeast Squares (LLS), which is adopted for location estimationin [14], as initial point for local search is a good work-around for this problem, but, unfortunately, it is not availablein the cooperative case, and this gives rise to the motivationto develop our proposed algorithm.

Therefore, to take advantage of cooperation effectively, wewill need to resort to SDP, since it guarantees global optimalityand can be solved efficiently using interior point method [11].

Additionally, it also achieves higher accuracy in the out-of-convex-hull scenarios [6].

Apply similar semi-definite relaxation for (13), we have

minimizeα,α,Z

∑(m,n)∈Ea

αmn +∑

(i,j)∈Ex

αij

subject to

⎛⎜⎜⎝[−aT

m eTn

]Z

[−am

en

]

rmn

−rmn

⎞⎟⎟⎠

2

<αmn,

⎛⎜⎜⎝[01×D (ei−ej)T

]Z

[0D×1

ei−ej

]

rij−rij

⎞⎟⎟⎠

2

<αij ,

∀(m,n) ∈ Ea, ∀(i, j) ∈ Ex and i < j,

Z(1:D) = ID×D, Z 0.(14)

Now we substitute the “Locate” procedure in Algorithm 1with CARSDP, discard the location information received fromthe malicious anchors and treat them as targets. Thereafter, byemploying cooperation, we are able to not only identify the

Page 4: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

0 0.5 1 1.5 2 2.5 3 3.5 40

1

2

3

4

5

6

7

8

9

10

σ

MS

EM = 8, N = 10, No malicious anchors

Not normalizedNormalized

Fig. 2: Influence of residual normalization on the MSE of SDPlocalization algorithm with different noise standard deviationσ. Anchors are all honest.

malicious anchors but also estimate their true location. This isespecially important for the systems in which anchors are alsomobile. With the location of compromised anchors, retrievingthem and identifying the attackers become possible.

V. SIMULATIONS

The deployment for the simulations in this section is de-scribed as follows. 8 anchors are pre-settled at designated posi-tions. Targets are randomly placed subject to some constraints(inside or outside the convex hull formed by the anchors)at the beginning of each run of the algorithm. We run thesimulation 1000 times with each set of parameters, i.e. anchordeployment and noise strength. Mean square error (MSE) isused as performance metric. The MSE of a set of locationestimates x = {x(1), x(2), · · · , x(Nrun)}, in which x

(i) is thematrix of N targets’ location estimates in the ith run, is definedas

MSE(x) =1

N ·Nrun

Nrun∑i=1

tr{(x− x(i))T (x− x

(i))}, (15)

where tr(·) represent the trace operation for matrices.

A. Effectiveness of Residual Normalization

At high SNR, residual normalization will improve the local-ization accuracy of SDP based methods significantly as shownin Fig. 2. Within the typical range of standard deviation ofdistance measurement errors [3, 15, 16], residual normalizationis beneficial for SDP localization methods, for it improves theaccuracy while does not increase the computational complex-ity.

B. Improvement by Semi-Definite Relaxation

As mentioned in Sec. IV-B, when cooperative measurementsare introduced into the optimization problem, the possibilitythat local search algorithms converge to local minimizers

7 8 9 10 11 12 13 14 15 16 17 18 19 2010

11

12

13

14

15

16

17

18

19

20

Anchors’ True Location

Anchors’ Claimed Location

Fig. 3: Anchor deployment for the LS vs. SDP comparisons.

(instead of a global one) is considerably higher. In Fig. 4, wecompare the performance of SDP localization algorithms andLS local search algorithms (with and without cooperation).The result substantiates this proposition. This simulation isconducted with the anchors deployed as in Fig. 3.

Remark 2 Fig. 4 shows that LS local search methods performpoorly, because they converge to local minima at times. In thisfigure, the MSE curves for LS methods are not as smoothas those for SDP methods, and the boxes’ height and thewhiskers’ length of plots for LS based methods are muchlarger than those for SDP based methods, even when the noiseis weak. And the performance variation of cooperative LSmethod are much worse than the non-cooperative one, whereasthe variation of SDP methods are almost the same for bothcooperative and non-cooperative methods.

Presented in Fig. 5 is the comparison between ARMMSEand CARSDP.

Remark 3 When the targets are outside the convex hullformed by the anchors, our proposed CARSDP algorithmperforms much better than the ARMMSE algorithm. For thein-convex-hull situations, the MSE of the two algorithms aresimilar, CARSDP is slightly better than ARMMSE, mainlybecause that LS local search algorithms performs OK whenall the targets are in the convex hull.

C. Improvement in Robustness through Cooperation

In this subsection, we compare the performance of non-cooperative SDP and cooperative SDP with the deploymentof anchors and location of targets shown in Fig. 6. The rangesof communications are set to: Ra = 6 and Rx = 4.

Fig. 7 gives the performance comparison. The results areinteresting as discussed in the following.

Page 5: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

0.5 1 1.5 2 2.5 3 3.5 40

100

200

300

σ

MS

E

Non−Cooperative LS

0.5 1 1.5 2 2.5 3 3.5 40

200

400

σ

MS

E

Cooperative LS

(a) LS local search algorithms

0.5 1 1.5 2 2.5 3 3.5 40

50

100

σ

MS

E

Non−Cooperative SDP

0.5 1 1.5 2 2.5 3 3.5 40

50

100

σ

MS

E

Cooperative SDP

(b) SDP based algorithms

Fig. 4: Box plot of the MSE of the location estimates withdifferent noise standard deviation σ. All anchors are honest.The upper plot shows the MSE of solutions of (12) obtained bylocal algorithm and the bottom one shows MSE of estimatesobtained from SDP algorithm (14). On each box, the centralmark is the median, the edges of the box are the 25th and75th percentiles, the whiskers extend to the most extreme datapoints. The curves in each subplot show the correspondingaverage values.

0.2 0.4 0.6 0.8 1 1.20

1

2

3

4

5

6

7

σ

MS

E

CARSDP OutsideARMMSE OutsideCARSDP InsideARMMSE inside

Fig. 5: The performance comparison between ARMMSEand out proposed CARSDP under in-convex-hull and out-of-convex-hull situations with anchor deployment in Fig. 3.

0 5 10 15 20 25 300

5

10

15

20

25

30

Fig. 6: Anchors’ deployment for the non-cooperative vs.cooperative simulation. Blue square markers are the anchors’true locations. Red cross markers show their claimed locations.Red dotted lines represents the correspondence. The targets’true location are at the green diamond markers. Blue solid linesand green dashed lines shows anchor-target and target-targetcommunications respectively (for a single target).

Remark 4 With the deployment in Fig. 6, it is impossiblefor any of the target to identify the malicious anchors andcorrectly locate themselves without cooperation. Note that onlytwo honest anchors can communicate with any of the 4 targets,therefore the targets are not able to correctly locate themselves on their own. But with cooperation, they can exchangeinformation to get a clue of other anchors indirectly, and makea joint estimation such that the malicious anchors can beidentified and all the targets can acquire their true locationwith reasonable accuracy.

Page 6: [IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Cooperative

0.2 0.4 0.6 0.8 1 1.20

10

20

30

40

50

60

70

Non−Cooperative ARSDPCARSDP

Fig. 7: Performance comparison between cooperative and non-cooperative attack resistant SDP algorithms. σ is the standarddeviation of measurement errors.

Remark 5 In a practical view, malicious anchors may bedominant locally, no matter they are colluding or non-colluding, and that makes the standalone detection difficult.However, it is unrealistic for the attackers to overwhelm thehonest anchors from a global perspective. In this case, ourproposed algorithm cannot be defeated. Therefore, CARSDPcan handle many attack situations that are difficult, or evenimpossible, for the original ARMMSE.

VI. CONCLUSIONS

In this paper, an SDP based cooperative secured localizationmethod was proposed. Our method improves the existingones in the following three main aspects. First, cooperation isintroduced so that the algorithm can survive more difficult sce-narios with relaxed requirement on the density of the anchors.Secondly, semi-definite relaxation is adopted, which makes thealgorithm more reliable by ensuring global optimal estimates.Last but not least, we proposed residual normalization, whichimproves existing SDP localization algorithms by making itan ML estimator approximately.

REFERENCES

[1] M. Win, A. Conti, S. Mazuelas, Y. Shen, W. Gifford,D. Dardari, and M. Chiani, “Network localization andnavigation via cooperation,” IEEE Communications Mag-azine, vol. 49, no. 5, pp. 56–62, May 2011.

[2] K. Yang, L. Jiang, and Z.-Q. Luo, “Efficient semidefiniterelaxation for robust geolocation of unknown emitter bya satellite cluster using tdoa and fdoa measurements,”in Proc. of Intl. Conf. on Acoustics, Speech, and SignalProcessing, Prague, Czech Republic, May 22–27, 2011,pp. 2584–2587.

[3] H. Wymeersch, J. Lien, and M. Win, “Cooperative local-ization in wireless networks,” Proceedings of the IEEE,vol. 97, no. 2, pp. 427–450, February 2009.

[4] K. Yang, G. Wang, and Z.-Q. Luo, “Efficient convexrelaxation methods for robust target localization by asensor network using time differences of arrivals,” IEEETrans. on Signal Processing, vol. 57, no. 7, pp. 2775–2784, July 2009.

[5] P. Biswas, T. Liang, K. Toh, Y. Ye, and T. Wang,“Semidefinite programming approaches for sensor net-work localization with noisy distance measurements,”IEEE Trans. on Automation Science and Engineering,vol. 3, no. 4, pp. 360–371, October 2006.

[6] N. Wang and L. Yang, “A semidefinite programming ap-proach for cooperative localization,” in Proc. of AsilomarConf. on Signals, Systems, and Computers, Pacific Grove,CA, November 7–10, 2010, pp. 487–491.

[7] D. Liu, P. Ning, and W. K. Du, “Attack-resistant locationestimation in sensor networks,” in Proc. of Intl. Sympo-sium on Information Processing in Sensor Networks, LosAngeles, CA, 2005.

[8] Y. Zeng, J. Cao, J. Hong, and L. Xie, “Secure localizationand location verification inwireless sensor networks,” inProc. of Intl. Conf. on Mobile Adhoc and Sensor Systems,Hangzhou, China, October 12–15, 2009, pp. 864–869.

[9] S. Capkun and J. Hubaux, “Secure positioning in wirelessnetworks,” IEEE Journal on Selected Areas in Commu-nications, vol. 24, no. 2, pp. 221–232, February 2006.

[10] P. Rousseeuw, A. Leroy, and J. Wiley, Robust regressionand outlier detection. Wiley-Interscience, 1987, vol. 3.

[11] S. Boyd and L. Vandenberghe, Convex optimization.Cambridge University Press, 2004.

[12] Z. Wang, S. Zheng, Y. Ye, and S. Boyd, “Further relax-ations of the semidefinite programming approach to sen-sor network localization,” SIAM Journal on Optimization,vol. 19, no. 2, pp. 655–673, 2008.

[13] E. Chong and S. Zak, An Introduction to Optimization,ser. Wiley-Interscience Series in Discrete Mathematicsand Optimization. Wiley-Interscience, 2008.

[14] A. Sayed, A. Tarighat, and N. Khajehnouri, “Network-based wireless location: challenges faced in developingtechniques for accurate wireless location information,”IEEE Signal Processing Magazine, vol. 22, no. 4, pp.24–40, July 2005.

[15] D. Dardari, A. Conti, U. Ferner, A. Giorgetti, andM. Win, “Ranging with ultrawide bandwidth signalsin multipath environments,” Proceedings of the IEEE,vol. 97, no. 2, pp. 404–426, February 2009.

[16] X. Li and K. Pahlavan, “Super-resolution TOA estimationwith diversity for indoor geolocation,” IEEE Trans. onWireless Communications, vol. 3, no. 1, pp. 224–234,January 2004.