The localization capability may be very helpful to the countermeasures of some security threats. The conventional localization approaches are based on one or several of the following techniques:
Time Of Arrival (TOA), Time Difference Of Arrival (TDOA), Angle Of Arrival (AOA), and Received Signal Strength (RSS).
Yes, I agree with Fatty Salem. I want to add some more in it. Also add neighbors information in packet. If user is authenticate, he knows each and everything about network detail and if something goes wring in WSN, malicious node can be tracked.
Thank you All, Can I implement any Secure algorithm for WSNs using some mathematical model in MATLAB like LEACH? or its necessary to use only networking tools for simulating?
There is a new trend in security to use the physical layer to protect wireless networks. For example, you can try to perform a cryptographic key exchange by simply measuring the channel.
You can also use controlled interference to destroy malicious packets before they arrive at a receiver. Just check out the papers I uploaded to ResearchGate.
Article Secure Key Generation in Sensor Networks Based on Frequency-...