On providing wormhole-attack-resistant localization using conflicting sets

被引:6
作者
Chen, Honglong [1 ]
Lou, Wei [2 ,3 ]
Wang, Zhi [4 ]
机构
[1] China Univ Petr, Coll Informat & Control Engn, Qingdao, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
[3] Hong Kong Polytech Univ, Shenzhen Res Inst, Shenzhen, Peoples R China
[4] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou 310003, Zhejiang, Peoples R China
关键词
secure localization; wormhole attacks; wireless sensor networks; conflicting set; SECURE LOCALIZATION; WIRELESS NETWORKS; SCHEME;
D O I
10.1002/wcm.2462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic entity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network and tunnels them through the wormhole link to another point. Such kind of attack can deteriorate the localization procedure in wireless sensor networks. In this paper, we first analyze the impacts of the wormhole attack on the localization procedure. Then, we propose a secure localization scheme against the wormhole attacks called SLAW including three phases: wormhole attack detection, neighboring locators differentiation, and secure localization. The main idea of the SLAW is to build a so-called conflicting set for each locator based on the abnormalities during the message exchanges, which can be used to differentiate the dubious locators to achieve secure localization. We first consider the simplified system model in which there is no packet loss and all the nodes have the same transmission range. We further consider the general system model where the packet loss exists and different types of nodes have different transmission radii. We conduct the simulations to illustrate the effectiveness of the proposed secure localization scheme and compare it with the existing schemes under different network parameters. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1865 / 1881
页数:17
相关论文
共 49 条
  • [1] Anjum F., 2005, Proceedings of the 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), P195
  • [2] Ban X., 2011, P ACM INT S MOB AD H, P1
  • [3] Bounds on range-resolution-degradation using RSSI measurements
    Bouchereau, F
    Brady, D
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3246 - 3250
  • [4] Secure localization algorithms for wireless sensor networks
    Boukerche, Azzedine
    Oliveira, Horacio A. B. F.
    Nakamura, Eduardo F.
    Loureiro, Antonio A. F.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 96 - 101
  • [5] Fingerprinting Localization in Wireless Networks Based on Received-Signal-Strength Measurements: A Case Study on WiMAX Networks
    Bshara, Mussa
    Orguner, Umut
    Gustafsson, Fredrik
    Van Biesen, Leo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (01) : 283 - 294
  • [6] Secure positioning in wireless networks
    Capkun, S
    Hubaux, JP
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 221 - 232
  • [7] Capkun S., 2003, ACM WORKSHOP SECURIT, P21
  • [8] Secure location verification with hidden and mobile base stations
    Capkun, Srdjan
    Rasmussen, Kasper Bonne
    Cagalj, Mario
    Srivastava, Mani
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (04) : 470 - 483
  • [9] A Novel Secure Localization Approach in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [10] Secure Localization Against Wormhole Attacks Using Conflicting Sets
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    [J]. 2010 IEEE 29TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2010, : 25 - 33