Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks

被引:37
|
作者
He, Daojing [1 ]
Cui, Lin [1 ]
Huang, Hejiao [1 ]
Ma, Maode [2 ]
机构
[1] Shenzhen Univ Town Xili, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanyang Technol Univ, Div Commun Engn, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Localization; security; wireless sensor networks;
D O I
10.1109/TPDS.2008.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
引用
收藏
页码:1050 / 1058
页数:9
相关论文
共 50 条
  • [1] Secure Localization and Location Verification in Wireless Sensor Networks
    Zeng, Yingpei
    Cao, Jiannong
    Hong, Jue
    Xie, Li
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 48 - 53
  • [3] Secure localization and location verification in wireless sensor networks: a survey
    Zeng, Yingpei
    Cao, Jiannong
    Hong, Jue
    Zhang, Shigeng
    Xie, Li
    JOURNAL OF SUPERCOMPUTING, 2013, 64 (03): : 685 - 701
  • [4] Secure localization and location verification in wireless sensor networks: a survey
    Yingpei Zeng
    Jiannong Cao
    Jue Hong
    Shigeng Zhang
    Li Xie
    The Journal of Supercomputing, 2013, 64 : 685 - 701
  • [5] A Signcryption-based Secure Localization Scheme in Wireless Sensor Networks
    Zhang, Ting
    He, Jingsha
    Li, Xiaohui
    Wei, Qian
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 258 - 264
  • [6] Secure localization scheme against wormhole attack for wireless sensor networks
    Chen, Hong-Long
    Wang, Zhi-Bo
    Wang, Zhi
    Xu, Jiang-Ming
    Li, Yan-Jun
    Liu, Li-Ping
    Tongxin Xuebao/Journal on Communications, 2015, 36 (03):
  • [7] Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 163 - 168
  • [8] Secure localization in wireless sensor networks
    Zhang, Yanchao
    Liu, Wei
    Fang, Yuguang
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 3169 - 3175
  • [9] Secure localization and location verification in sensor networks
    Lee, YH
    Phadke, V
    Lee, JW
    Deshmukh, A
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 278 - 287
  • [10] A Novel Secure Localization Scheme Against Collaborative Collusion in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Shu, Lei
    Chao, Han-Chieh
    Nishio, Shojiro
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 308 - 313