{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:16:24Z","timestamp":1760242584283,"version":"build-2065373602"},"reference-count":36,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2017,11,29]],"date-time":"2017-11-29T00:00:00Z","timestamp":1511913600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>As the key element, sensor networks are widely investigated by the Internet of Things (IoT) community. When massive numbers of devices are well connected, malicious attackers may deliberately propagate fake position information to confuse the ordinary users and lower the network survivability in belt-type situation. However, most existing positioning solutions only focus on the algorithm accuracy and do not consider any security aspects. In this paper, we propose a comprehensive scheme for node localization protection, which aims to improve the energy-efficient, reliability and accuracy. To handle the unbalanced resource consumption, a node deployment mechanism is presented to satisfy the energy balancing strategy in resource-constrained scenarios. According to cooperation localization theory and network connection property, the parameter estimation model is established. To achieve reliable estimations and eliminate large errors, an improved localization algorithm is created based on modified average hop distances. In order to further improve the algorithms, the node positioning accuracy is enhanced by using the steepest descent method. The experimental simulations illustrate the performance of new scheme can meet the previous targets. The results also demonstrate that it improves the belt-type sensor networks\u2019 survivability, in terms of anti-interference, network energy saving, etc.<\/jats:p>","DOI":"10.3390\/s17122767","type":"journal-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T03:15:15Z","timestamp":1512011715000},"page":"2767","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks"],"prefix":"10.3390","volume":"17","author":[{"given":"Mingqiang","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China"}]},{"given":"Fei","family":"Song","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China"}]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"Graduate School, University of International Business and Economics, Beijing 100029, China"}]},{"given":"Jung","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/LWC.2016.2595576","article-title":"Robust ANNs-Based WSN Localization in the Presence of Anisotropic Signal Attenuation","volume":"5","author":"Assaf","year":"2016","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4397","DOI":"10.1109\/JSEN.2016.2547444","article-title":"WSN Localization Using RSS in Three-Dimensional Space\u2014A Geometric Method With Closed-Form Solution","volume":"16","author":"Wu","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3754","DOI":"10.1109\/JSEN.2013.2258905","article-title":"A distributed RSSI-based localization using a dynamic circle expanding mechanism","volume":"13","author":"Jiang","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"7936","DOI":"10.1109\/ACCESS.2017.2700337","article-title":"Smart collaborative connection management for identifier-based network","volume":"5","author":"Song","year":"2017","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"5367","DOI":"10.1109\/JSEN.2017.2717919","article-title":"Graph Laplacian Regularization with Procrustes Analysis for Sensor Node Localization","volume":"17","author":"Singh","year":"2017","journal-title":"IEEE Sens. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s10766-013-0274-5","article-title":"An Optimization-based Scheme for Efficient Virtual Machine Placement","volume":"42","author":"Song","year":"2014","journal-title":"Int. J. Parallel Program."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3115","DOI":"10.1109\/JSEN.2013.2257731","article-title":"DuRT: Dual RSSI trend based localization for wireless sensor networks","volume":"13","author":"Sahu","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3233\/ICA-130445","article-title":"M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks","volume":"21","author":"Cheng","year":"2014","journal-title":"Int. Comput. Aided Eng."},{"key":"ref_9","unstructured":"Wang, Q., Wei, X., Fan, J., Wang, T., and Sun, Q. (2015, January 21\u201323). A step further of PDR-based jammer localization through dynamic power adaption. Proceedings of the 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, China."},{"key":"ref_10","unstructured":"Stephan, S., Armin, D., and Christian, M. (2014). Positioning in Wireless Communications Systems, Wiley."},{"key":"ref_11","unstructured":"CamLy, N., Orestis, G., and Yusuke, D. (2015, January 8\u201312). Maximum likelihood based multihop localization in wireless sensor networks. Proceedings of the IEEE International Conference on Communications (ICC), London, UK."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4631","DOI":"10.1109\/JSEN.2016.2543680","article-title":"A Recursive Shortest Path Routing Algorithm with Application for Wireless Sensor Network Localization","volume":"16","author":"Sifuentes","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1109\/COMST.2015.2464084","article-title":"Wi-Fi fingerprint-based indoor positioning: Recent advances and comparisons","volume":"18","author":"He","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.pmcj.2015.05.002","article-title":"Feasibility and Issues for Establishing Network-based Carpooling Scheme","volume":"24","author":"Song","year":"2015","journal-title":"Pervasive Mob. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1504\/IJAHUC.2015.069492","article-title":"The Correlation Study for Parameters in Four Tuples","volume":"19","author":"Song","year":"2015","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6661","DOI":"10.1109\/ACCESS.2017.2687619","article-title":"ALWadHA Localisation Algorithm: Yet More Energy Efficient","volume":"5","author":"Hancke","year":"2017","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Garcia, M., Martinez, C., Tomas, J., and Lloret, J. (2007, January 14\u201320). Wireless Sensors Self-Location in an Indoor WLAN Environment. Proceedings of the International Conference on Sensor Technologies and Applications, SensorComm2007, Valencia, Spain.","DOI":"10.1109\/SENSORCOMM.2007.4394912"},{"key":"ref_18","first-page":"235","article-title":"The Development of Two Systems for Indoor Wireless Sensors Self-location","volume":"8","author":"Garcia","year":"2009","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Domingoperez, F., Lazarogalilea, J.L., Bravo, I., Gardel, A., and Rodriguez, D. (2016). Optimization of the Coverage and Accuracy of an Indoor Positioning System with a Variable Number of Sensors. Sensors, 16.","DOI":"10.3390\/s16060934"},{"key":"ref_20","first-page":"1","article-title":"Sparse recovery formulation for secure distance-based localization in the presence of cheating anchors","volume":"5","author":"Zhang","year":"2017","journal-title":"J. Wirel. Netw."},{"key":"ref_21","first-page":"502","article-title":"Improved DV-Hop localization algorithm based on two communication ranges for wireless sensor network","volume":"2","author":"Li","year":"2014","journal-title":"J. Jilin Univ. (Eng. Technol. Ed.)"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wu, J., Chen, H., Lou, W., Wang, Z., and Wang, Z. (2010, January 15\u201317). Label-based DV-Hop localization against wormhole attacks in wireless sensor networks. Proceedings of the 5th International Conference on Networking, Architecture and Storage (NAS), Macau, China.","DOI":"10.1109\/NAS.2010.41"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1007\/s11277-012-0880-3","article-title":"An advanced DV-hop localization algorithm for wireless sensor networks","volume":"71","author":"Kumar","year":"2012","journal-title":"Wirel. Pers. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","article-title":"Insight of the protection for data security under selective opening attacks","volume":"412\u2013413","author":"Huang","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","article-title":"Secure attribute-based data sharing for resource-limited users in cloud computing","volume":"72","author":"Li","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_26","unstructured":"Woo, H., Lee, S., and Lee, C. (2013, January 28\u201330). Range-free localization with isotropic distance scaling in wireless sensor networks. Proceedings of the International Conference on Information Networking, Bangkok, Thailand."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2239","DOI":"10.1109\/TVT.2011.2109405","article-title":"Two Birds with One Stone: Wireless Access Point Deployment for Both Coverage and Localization","volume":"60","author":"Liao","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/JCN.2016.000108","article-title":"Multi-objective optimization for a reliable localization scheme in wireless sensor networks","volume":"18","author":"Shahzad","year":"2016","journal-title":"J. Commun. Net."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","article-title":"An application specific protocol architecture for wireless microsensor networks","volume":"1","author":"Heinzelman","year":"2002","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_30","first-page":"107","article-title":"PSO localization algorithm for WSN nodes based on modifying average hop distances","volume":"34","author":"Zhao","year":"2013","journal-title":"J. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6638","DOI":"10.1109\/TWC.2016.2586844","article-title":"RSSI-Based Distributed Self-Localization for Wireless Sensor Networks Used in Precision Agriculture","volume":"15","author":"Abouzar","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_32","first-page":"39","article-title":"Target Positioning Algorithm Based on WSN in Perimeter Intrusion Detection","volume":"39","author":"Wang","year":"2013","journal-title":"Comput. Eng."},{"key":"ref_33","first-page":"957","article-title":"An Optimum DV Hop Localization Algorithm for Variety of Topologies in Wireless Sensor Networks","volume":"4","author":"Agashe","year":"2012","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ayll\u00f3n, D., S\u00e1nchez-Hevia, H., and Gil-Pita, R. (2016, January 20\u201322). Indoor blind localization of smartphones by means of sensor data fusion. Proceedings of the Sensors Applications Symposium, Catania, Italy.","DOI":"10.1109\/SAS.2015.7133605"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1023\/A:1023403323460","article-title":"DV based positioning in ad hoc networks","volume":"22","author":"Nicoiescu","year":"2003","journal-title":"J. Telecommun. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Gui, L., Val, T., and Wei, A. (2011, January 15\u201318). Improving Localization Accuracy Using Selective 3-Anchor DV-Hop Algorithm. Proceedings of the Vehicular Technology Conference, Budapest, Hungary.","DOI":"10.1109\/VETECF.2011.6093011"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/12\/2767\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:51:53Z","timestamp":1760208713000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/12\/2767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,29]]},"references-count":36,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2017,12]]}},"alternative-id":["s17122767"],"URL":"https:\/\/doi.org\/10.3390\/s17122767","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,11,29]]}}}