Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks

被引:37
|
作者
He, Daojing [1 ]
Cui, Lin [1 ]
Huang, Hejiao [1 ]
Ma, Maode [2 ]
机构
[1] Shenzhen Univ Town Xili, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanyang Technol Univ, Div Commun Engn, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Localization; security; wireless sensor networks;
D O I
10.1109/TPDS.2008.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
引用
收藏
页码:1050 / 1058
页数:9
相关论文
共 50 条
  • [21] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
  • [22] Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless sensor Networks
    Yuan, Yali
    Huo, Liuwei
    Wang, Zhixiao
    Hogrefe, Dieter
    IEEE ACCESS, 2018, 6 : 27629 - 27636
  • [23] A Hybrid Localization Scheme for Wireless Sensor Networks
    Song, Xiaoyong
    Fan, Guangyu
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 749 - 754
  • [24] A design of optimal key management scheme for secure and survivable wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Tipper, David
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 75 - 82
  • [25] A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
    Sultana, Salmin
    Ghinita, Gabriel
    Bertino, Elisa
    Shehab, Mohamed
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 101 - 108
  • [26] A collaborative localization scheme from connectivity in wireless sensor networks
    Wang, Jichun
    Huang, Liusheng
    Li, Xiang
    Huang, He
    Li, Jianbo
    WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2008, 5031 : 213 - 223
  • [27] A Secure Mutual Trust Scheme for Wireless Sensor Networks
    Yein, Alan Dahgwo
    Lin, Chih-Hsueh
    Hsieh, Wen-Shyong
    Hsieh, Wen-Shyong
    2017 IEEE 26TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2017, : 1369 - 1375
  • [28] Directional Sampling and Refinement Localization Scheme for Wireless Sensor Networks
    Cheng, Wei
    Li, Yong
    Yin, Xipeng
    2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 354 - 357
  • [29] Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks
    He, Daojing
    Cui, Lin
    Huang, Hejiao
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2009, 50 (04) : 545 - 561
  • [30] A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1765 - 1788