Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks

被引:37
|
作者
He, Daojing [1 ]
Cui, Lin [1 ]
Huang, Hejiao [1 ]
Ma, Maode [2 ]
机构
[1] Shenzhen Univ Town Xili, Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanyang Technol Univ, Div Commun Engn, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
Localization; security; wireless sensor networks;
D O I
10.1109/TPDS.2008.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the need for secure and efficient localization for wireless sensor networks in adversarial settings. An attack-resistant and efficient localization scheme is developed, which extends the scheme proposed in [1]. The method offers strong defense against not only distance reduction attacks but also distance enlargement attacks. Furthermore, our method does not employ any device-dependent variables, hence yields more accurate localization. An attack-driven model is also specified using Petri net. It provides a formal method for the verification of our scheme when considering distance enlargement attacks. The state analysis shows that the potential insecure states are unreachable, implying that the model can offer strong defense against these attacks. To the best of our knowledge, it is the first time that the Petri net has been introduced to validate security scheme for wireless sensor networks in the literature.
引用
收藏
页码:1050 / 1058
页数:9
相关论文
共 50 条
  • [31] A Secure Cluster Formation Scheme in Wireless Sensor Networks
    Wang, Gicheol
    Kim, Dongkyun
    Cho, Gihwan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [32] Secure Data Collection Scheme for Wireless Sensor Networks
    Hwang, Ren Junn
    Huang, Yan Zhi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 553 - 558
  • [33] Secure localization with attack detection in wireless sensor networks
    Wen Tao Zhu
    Yang Xiang
    Jianying Zhou
    Robert H. Deng
    Feng Bao
    International Journal of Information Security, 2011, 10 : 155 - 171
  • [34] Game Theoretic Secure Localization in Wireless Sensor Networks
    Jha, Susmit
    Tripakis, Stavros
    Seshia, Sanjit A.
    Chatterjee, Krishnendu
    2014 INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT), 2014, : 85 - 90
  • [35] Lightweight Secure Localization Approach in Wireless Sensor Networks
    Xie, Ning
    Chen, Yicong
    Li, Zhuoyuan
    Wu, Dapeng Oliver
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (10) : 6879 - 6893
  • [36] Secure Localization in Wireless Sensor Networks with Mobile Beacons
    Zhang, Ting
    He, Jingsha
    Yu, Hong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [37] A Novel Secure Localization Approach in Wireless Sensor Networks
    Honglong Chen
    Wei Lou
    Zhi Wang
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [38] Secure and Lightweight Localization Method for Wireless Sensor Networks
    Park, Myung-Ho
    Nam, Ki-Gon
    Kim, Jin Seok
    Yum, Dae Hyun
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (03): : 723 - 726
  • [39] A Novel Secure Localization Approach in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [40] Secure localization with attack detection in wireless sensor networks
    Zhu, Wen Tao
    Xiang, Yang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (03) : 155 - 171