Security analysis on node localization systems of wireless sensor networks

被引:2
作者
Cao, Xiao-Mei [1 ,2 ]
Yu, Bo [3 ]
Chen, Gui-Hai [1 ]
Ren, Feng-Yuan [4 ]
机构
[1] National Laboratory for Novel Software Technology, Nanjing University
[2] College of Computer, Nanjing University of Posts and Telecommunications
[3] Department of Computer Science and Engineering, Fudan University
[4] Department of Computer Science and Technology, Tsinghua University
来源
Ruan Jian Xue Bao/Journal of Software | 2008年 / 19卷 / 04期
关键词
Attacks; Countermeasure; Node localization system; Wireless sensor network;
D O I
10.3724/SP.J.1001.2008.00879
中图分类号
学科分类号
摘要
Correct node position information is the prerequisite and foundation of many sensor network modules, such as network building and maintenance, monitoring event localization, and target tracking. The node localization process is vulnerable to diverse attacks. In resource-constrained sensor networks, how to securely and effectively locate sensor's coordinates is one of the most challenging security problems. This paper presents various attacks against different node localization systems, analyses the principles, characteristics, and limitations of recent representative secure localization countermeasures. Finally, future research direction is summarized.
引用
收藏
页码:879 / 887
页数:8
相关论文
共 27 条
[11]  
Brands S., Chaum D., Distance-Bounding protocols, Proc. of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, pp. 344-359, (1994)
[12]  
Sastry N., Shankar U., Wagner D., Secure verification of location claims, Proc. of the 2003 ACM Workshop on Wireless security (WISE), pp. 1-10, (2003)
[13]  
Meadows C., Poovendran R., Pavlovic D., Chang L.W., Syverson P., Distance bounding protocols: Authentication logic analysis and collusion attacks, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, (2007)
[14]  
Capkun S., Hubaux J.P., Secure positioning of wireless devices with application to sensor networks, Proc. of the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies, pp. 1917-1928, (2005)
[15]  
Zhang Y., Liu W., Fang Y., Wu D., Secure localization and authentication in ultra-wideband sensor networks, IEEE Journal on Selected Areas in Communications, 24, 4, pp. 829-835, (2006)
[16]  
Capkun S., Cagalj M., Srivastava M., Secure localization with hidden and mobile base stations, Proc. of the 25th IEEE Conf. on Computer Communications, pp. 23-29, (2006)
[17]  
Anjum F., Pandey S., Agrawal P., Secure localization in sensor networks using transmission range variation, Proc. of the 2nd IEEE Int'l Conf. on Mobile Ad-Hoc and Sensor Systems, (2005)
[18]  
Lazos L., Poovendran R., SeRLoc: Secure range-independent localization for wireless sensor networks, Proc. of the 2004 ACM Workshop on Wireless Security, pp. 21-30, (2004)
[19]  
Lazos L., Poovendran R., Capkun S., ROPE: Robust position estimation in wireless sensor networks, Proc. of the Int'l Symp. on Information Processing in Sensor Networks, pp. 324-331, (2005)
[20]  
Lazos L., Poovendran R., HiRLoc: High-Resolution robust localization for wireless sensor networks, IEEE Journal on Selected Areas in Communications, 24, 2, pp. 233-246, (2006)