Skip to main content

Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks

  • Conference paper
  • 1863 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 166))

Abstract

Sensors’ localizations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors. However, almost all previously proposed techniques can be trivially abused by a malicious adversary involving false position. The wormhole attack is a particularly challenging one since the external adversary which acts in passive mode, does not need to compromise any nodes or have access to any cryptographic keys. In this paper, wormhole attack in DVhop is discussed, and a Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure. Using analysis and simulation, we show that our solution is effective in detecting and defending against wormhole attacks with a high detection rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chong, C.Y., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. IEEE 91(8), 1247–1256 (2003)

    Article  Google Scholar 

  2. Rabaey, M.J., Ammer, J.L., da Silva, J.R., Patel, D., Roundy, S.: PicoRadio supports ad hoc ultra-low power wireless networking. Computer 33(7), 42–48 (2002)

    Article  Google Scholar 

  3. Pirreti, M., Vijaykrishnan, N., McDaniel, P., Madan, B.: SLAT: Secure Localization with Attack Tolerance. Technical report: NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ (2005)

    Google Scholar 

  4. Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: IEEE ICBN (2005)

    Google Scholar 

  5. Bahl, P., Padmanabhan, V.N.: RADAR:An In-building RF-based User Location and Tracking System. In: IEEE INFOCOM (2000)

    Google Scholar 

  6. Labraoui, N., Gueroui, M., Aliouat, M., Zia, T.: Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey. Ad hoc & Sensor Networks. International Journal 12 (2011) (in Press)

    Google Scholar 

  7. Zia, T., Zomaya, A.Y.: A security framework for wireless sensor networks. In: IEEE Sensor Applications Symposium, Texas (2006)

    Google Scholar 

  8. Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS). In: IEEE GLOBECOM 2001, San Antonio, pp. 2926–2931 (2001)

    Google Scholar 

  9. Wenfeng, L.: Wireless sensor networks and mobile robot control, pp. 54–60. Science Press (2009)

    Google Scholar 

  10. Parkinson, B., Spilker, J.: Global positioning system: theory and application. American Institute of Aeronautics and Astronautics, Washington, D.C (1996)

    Book  Google Scholar 

  11. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. In: INFOCOM, vol. 2, pp. 1976–1986 (2003)

    Google Scholar 

  12. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: CNDS 2002 (2002)

    Google Scholar 

  13. Goldsmith, A.: Wireless Communications. Cambridge University Press, New York (2005)

    Book  Google Scholar 

  14. Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall PTR, Englewood Cliffs (2001)

    MATH  Google Scholar 

  15. Shon, T., Choi, H.: Towards the implementation of reliable data transmission for 802.15.4-based wireless sensor networks. In: Sandnes, F.E., Zhang, Y., Rong, C., Yang, L.T., Ma, J. (eds.) UIC 2008. LNCS, vol. 5061, pp. 363–372. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  16. Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. In: 4th IEEE Consumer Communications and Networking Conference (2007)

    Google Scholar 

  17. Zheng J.: Low rate wireless personal area networks: ns-2 simulator for 802.15.4 (release v1.1) (2007), ees2cy.engr.ccny.cuny.edu/zheng/pub

  18. The Rice Monarch Project: Wireless and mobility extensions to ns-2 (2007), www.monarch.cs.cmu.edu/cmu-ns.html

  19. Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: IEEE IPSN, pp. 324–331 (2005)

    Google Scholar 

  20. Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: 2nd IEEE Int’l Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283 (2006)

    Google Scholar 

  21. Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks. In: IEEE ICDCS, pp. 609–619 (2005)

    Google Scholar 

  22. Wang, C., Liu, A., Ning, P.: Cluster-Based Minimun Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks. In: the Int’l Conf. on Wireless Algorithms, Systems and Applications, pp. 29–37 (2007)

    Google Scholar 

  23. Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: IEEE IPSN, pp. 91–98 (2005)

    Google Scholar 

  24. Lazos, L., Poovendran, R.: SeRLoc: robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 1(1), 73–100 (2005)

    Article  Google Scholar 

  25. Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 233–246 (2006)

    Article  Google Scholar 

  26. Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Zhang, D., Portmann, M., Tan, A.-H., Indulska, J. (eds.) UIC 2009. LNCS, vol. 5585, pp. 296–309. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  27. Wu, J., Chen, H., Lou, W., Wang, Z.: Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks. In: 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010), Macau SAR, China (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Labraoui, N., Gueroui, M., Aliouat, M. (2011). Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks. In: Cherifi, H., Zain, J.M., El-Qawasmeh, E. (eds) Digital Information and Communication Technology and Its Applications. DICTAP 2011. Communications in Computer and Information Science, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21984-9_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21984-9_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21983-2

  • Online ISBN: 978-3-642-21984-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics