Abstract
The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. The main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. The simulation results show that it outperforms the existed schemes under different network parameters.
This work is supported in part by grants PolyU 5236/06E, PolyU 5232/07E, PolyU 5243/08E, and NSFC No. 60873223 and No. 90818010.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. In: Proc. of IEEE INFOCOM (2003)
Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: Proc. of the 2nd Int’l Conf. on Broadband Networks (2005)
Savvides, A., Han, C., Srivastava, M.: Dynamic Fine-Grained Localization in Ad-hoc Networks of Sensors. In: Proc. of ACM MOBICOM (2001)
Mao, G., Fidan, B., Anderson, B.D.O.: Wireless Sensor Network Localization Techniques. Computer and Telecommunications Networking, 2529–2553 (2007)
Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Secure Localization Algorithms for Wireless Sensor Networks. IEEE Communications Magazine (2008)
Liu, D., Ning, P., Du, W.: Attack-Resistant Location Estimation in Sensor Networks. In: Proc. of IEEE IPSN (2005)
Capkun, S., Hubaux, J.P.: Secure Positioning of Wireless Devices with Application to Sensor Networks. In: Proc. of IEEE INFOCOM (2005)
Capkun, S., Cagalj, M., Srivastava, M.: Secure Localization With Hidden and Mobile Base Stations. In: Proc. of IEEE INFOCOM (2006)
Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: Proc. of IEEE IPSN (2005)
Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: Proc. of the 2nd IEEE Int’l Symposium on Dependable, Autonomic and Secure Computing (2006)
Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks. In: Proc. of IEEE ICDCS (2005)
Khabbazian, M., Mercier, H., Bhargava, V.K.: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure. In: Proc. of IEEE GLOBECOM (2006)
Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proc. of ACM WiSe (2004)
Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6, 3–17 (2007)
Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting Wormhole Attacks in Wireless Sensor Networks. In: Proc. of IFIP (2008)
Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: Proc. of IEEE INFOCOM (2007)
Lazos, L., Poovendran, R.: SeRLoc: Robust Localization for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 73–100 (2005)
Lazos, L., Poovendran, R.: HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24, 233–246 (2006)
Chen, H., Lou, W., Ma, J., Wang, Z.: TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks. In: Proc. of The Second Int’l Conf. on Sensor Technologies and Applications (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, H., Lou, W., Wang, Z. (2009). Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks. In: Zhang, D., Portmann, M., Tan, AH., Indulska, J. (eds) Ubiquitous Intelligence and Computing. UIC 2009. Lecture Notes in Computer Science, vol 5585. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02830-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-02830-4_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02829-8
Online ISBN: 978-3-642-02830-4
eBook Packages: Computer ScienceComputer Science (R0)