Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks

被引:38
作者
He, Daojing [1 ]
Cui, Lin [1 ]
Huang, Hejiao [1 ]
Ma, Maode [2 ]
机构
[1] Shenzhen Univ Town Xili, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanyang Technol Univ, Div Commun Engn, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Localization; security; wireless sensor networks;
D O I
10.1109/TPDS.2008.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
引用
收藏
页码:1050 / 1058
页数:9
相关论文
共 25 条
[21]  
Srinivasan A, 2006, DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, P277
[22]  
Wang Youping, 2007, Cardiovascular & Hematological Disorders - Drug Targets, V7, P37
[23]   Threat-driven modeling and verification of secure software using aspect-oriented Petri nets [J].
Xu, DX ;
Nygard, KE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (04) :265-278
[24]  
Zelinski S, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P1
[25]   Secure localization and authentication in ultra-wideband sensor networks [J].
Zhang, YC ;
Liu, W ;
Fang, YG ;
Wu, DP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (04) :829-835