Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks

被引:37
|
作者
He, Daojing [1 ]
Cui, Lin [1 ]
Huang, Hejiao [1 ]
Ma, Maode [2 ]
机构
[1] Shenzhen Univ Town Xili, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanyang Technol Univ, Div Commun Engn, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Localization; security; wireless sensor networks;
D O I
10.1109/TPDS.2008.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
引用
收藏
页码:1050 / 1058
页数:9
相关论文
共 50 条
  • [21] A design of optimal key management scheme for secure and survivable wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Tipper, David
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 75 - 82
  • [22] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [23] A Hybrid Localization Scheme for Wireless Sensor Networks
    Song, Xiaoyong
    Fan, Guangyu
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 749 - 754
  • [24] Secure multiple deployment scheme in wireless sensor networks
    Li, Guo-Rui
    He, Jing-Sha
    Wang, Ying
    Fu, Ying-Fang
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2009, 35 (01): : 114 - 118
  • [25] A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
    Sultana, Salmin
    Ghinita, Gabriel
    Bertino, Elisa
    Shehab, Mohamed
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 101 - 108
  • [26] A Secure Mutual Trust Scheme for Wireless Sensor Networks
    Yein, Alan Dahgwo
    Lin, Chih-Hsueh
    Hsieh, Wen-Shyong
    Hsieh, Wen-Shyong
    2017 IEEE 26TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2017, : 1369 - 1375
  • [27] A Secure Routing Scheme for Static Wireless Sensor Networks
    Yao, Xuanxia
    Zheng, XueFeng
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1732 - 1736
  • [28] A secure data aggregation scheme for wireless sensor networks
    Ren, Shu Qin
    Kim, Dong Seong
    Park, Jong Sou
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 32 - +
  • [29] A secure routing scheme for mobile wireless sensor networks
    Watanabe, Yuji
    Linh, Tong
    ARTIFICIAL LIFE AND ROBOTICS, 2010, 15 (03) : 302 - 305
  • [30] A Secure Trust Establishment Scheme for Wireless Sensor Networks
    Ishmanov, Farruh
    Kim, Sung Won
    Nam, Seung Yeob
    SENSORS, 2014, 14 (01): : 1877 - 1897