Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks

被引:38
作者
He, Daojing [1 ]
Cui, Lin [1 ]
Huang, Hejiao [1 ]
Ma, Maode [2 ]
机构
[1] Shenzhen Univ Town Xili, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanyang Technol Univ, Div Commun Engn, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Localization; security; wireless sensor networks;
D O I
10.1109/TPDS.2008.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
引用
收藏
页码:1050 / 1058
页数:9
相关论文
共 25 条
[1]   Secure localization algorithms for wireless sensor networks [J].
Boukerche, Azzedine ;
Oliveira, Horacio A. B. F. ;
Nakamura, Eduardo F. ;
Loureiro, Antonio A. F. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) :96-101
[2]   GPS-less low-cost outdoor localization for very small devices [J].
Bulusu, N ;
Heidemann, J ;
Estrin, D .
IEEE PERSONAL COMMUNICATIONS, 2000, 7 (05) :28-34
[3]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[4]  
Doherty L., 2001, P IEEE INFOCOM
[5]  
DU W, 2006, J PARALLEL DISTRIBUT, P874
[6]  
He T., 2003, P ACM MOBICOM
[7]  
Karp B., 2000, P ACM MOBICOM
[8]  
Lazos L, 2005, 2005 FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P324
[9]  
Li Z, 2005, 2005 FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P91
[10]   Detecting malicious beacon nodes for secure location discovery in wireless sensor networks [J].
Liu, DG ;
Ning, P ;
Du, WL .
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, :609-619