Skip to main content

Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5585))

Included in the following conference series:

Abstract

The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. The main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. The simulation results show that it outperforms the existed schemes under different network parameters.

This work is supported in part by grants PolyU 5236/06E, PolyU 5232/07E, PolyU 5243/08E, and NSFC No. 60873223 and No. 90818010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. In: Proc. of IEEE INFOCOM (2003)

    Google Scholar 

  2. Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: Proc. of the 2nd Int’l Conf. on Broadband Networks (2005)

    Google Scholar 

  3. Savvides, A., Han, C., Srivastava, M.: Dynamic Fine-Grained Localization in Ad-hoc Networks of Sensors. In: Proc. of ACM MOBICOM (2001)

    Google Scholar 

  4. Mao, G., Fidan, B., Anderson, B.D.O.: Wireless Sensor Network Localization Techniques. Computer and Telecommunications Networking, 2529–2553 (2007)

    Google Scholar 

  5. Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Secure Localization Algorithms for Wireless Sensor Networks. IEEE Communications Magazine (2008)

    Google Scholar 

  6. Liu, D., Ning, P., Du, W.: Attack-Resistant Location Estimation in Sensor Networks. In: Proc. of IEEE IPSN (2005)

    Google Scholar 

  7. Capkun, S., Hubaux, J.P.: Secure Positioning of Wireless Devices with Application to Sensor Networks. In: Proc. of IEEE INFOCOM (2005)

    Google Scholar 

  8. Capkun, S., Cagalj, M., Srivastava, M.: Secure Localization With Hidden and Mobile Base Stations. In: Proc. of IEEE INFOCOM (2006)

    Google Scholar 

  9. Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: Proc. of IEEE IPSN (2005)

    Google Scholar 

  10. Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: Proc. of the 2nd IEEE Int’l Symposium on Dependable, Autonomic and Secure Computing (2006)

    Google Scholar 

  11. Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks. In: Proc. of IEEE ICDCS (2005)

    Google Scholar 

  12. Khabbazian, M., Mercier, H., Bhargava, V.K.: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure. In: Proc. of IEEE GLOBECOM (2006)

    Google Scholar 

  13. Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proc. of ACM WiSe (2004)

    Google Scholar 

  14. Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6, 3–17 (2007)

    Google Scholar 

  15. Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting Wormhole Attacks in Wireless Sensor Networks. In: Proc. of IFIP (2008)

    Google Scholar 

  16. Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: Proc. of IEEE INFOCOM (2007)

    Google Scholar 

  17. Lazos, L., Poovendran, R.: SeRLoc: Robust Localization for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 73–100 (2005)

    Google Scholar 

  18. Lazos, L., Poovendran, R.: HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24, 233–246 (2006)

    Article  Google Scholar 

  19. Chen, H., Lou, W., Ma, J., Wang, Z.: TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks. In: Proc. of The Second Int’l Conf. on Sensor Technologies and Applications (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, H., Lou, W., Wang, Z. (2009). Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks. In: Zhang, D., Portmann, M., Tan, AH., Indulska, J. (eds) Ubiquitous Intelligence and Computing. UIC 2009. Lecture Notes in Computer Science, vol 5585. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02830-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02830-4_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02829-8

  • Online ISBN: 978-3-642-02830-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics