Skip to main content

A Localization Game in Wireless Sensor Networks

  • Conference paper
Decision and Game Theory for Security (GameSec 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6442))

Included in the following conference series:

Abstract

Wireless Sensor Networks (WSNs) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and clone: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing the reliability of node localization data from a game theoretical viewpoint. In particular, we analyze the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model this scenario as a two-player game. Thus, we were able to compute an upper bound to the error that an attacker can induce in localization data, given the number of available verifiers. We focused on the maximum deception, that is the distance between the inferred position of an unknown node and the actual one: we found that if the verifiers are placed opportunely, the deception is at most 25% of the power range, and can be halved by triplicating the number of the verifiers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on wireless sensor network. IEEE Wireless Communications 40(8), 102–114 (2002)

    Google Scholar 

  2. Baronti, P., Pillai, P., Chook, V.W.C., Chessa, S., Gotta, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15.4 and zigbee standards. Computer Communications 30(7), 1655–1695 (2007)

    Article  Google Scholar 

  3. Brands, S., Chaum, D.: Distance-bounding protocols. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950. Springer, Heidelberg (1995)

    Google Scholar 

  4. Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low-cost outdoor localization for very small devices. IEEE Personal Communications 7(5), 28–34 (2000)

    Article  Google Scholar 

  5. Čapkun, S., Hamdi, M., Hubaux, J.-P.: GPS-free positioning in mobile ad-hoc networks. Cluster Computing 5(2), 157–167 (2002)

    Article  Google Scholar 

  6. Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 221–232 (2006)

    Article  Google Scholar 

  7. Chen, J., Yao, K., Hudson, R.: Source localization and beamforming. IEEE Signal Processing Magazine 19(2), 30–39 (2002)

    Article  Google Scholar 

  8. Doherty, L., Pister, K., Ghaoui, L.E.: Convex position estimation in wireless sensor networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM) (2001)

    Google Scholar 

  9. Gatti, N., Monga, M., Sicari, S.: Localization security in wireless sensor networks as a non-cooperative game. In: International Congress on Ultra Modern Telecommunications and Control Systems, ICUMT 2010, Moscow, Russia. IEEE, Los Alamitos (to appear, 2010) ISBN: 978-1-4244-7286-4

    Google Scholar 

  10. Monga, M., Sicari, S.: On the impact of localization data in wireless sensor networks with malicious nodes. In: Kamra, A. (ed.) Proceedings of the 2nd SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL 2009), ACM SIGSPATIAL, pp. 63–70. ACM, New York (2009)

    Chapter  Google Scholar 

  11. Niculescu, D., Nath, B.: Ad-hoc positioning system. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM) (2001)

    Google Scholar 

  12. Osborne, M., Rubinstein, A.: A course in game theory. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  13. Ramadurai, V., Sichitiu, M.: Localization in wireless sensor networks: A probabilistic approach. In: Proceedings of the International Conference on Wireless Networks (ICWN) (2003)

    Google Scholar 

  14. Savvides, A., Park, H., Srivastava, M.: The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of the ACM International Workshop on Wireless Sensor Networks and Application (WSNA) (2002)

    Google Scholar 

  15. He, T., Huang, C., Blum, B.M., Stankovic, J.A., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MOBICOM) (2003)

    Google Scholar 

  16. Wessendorf, M.: The on-line encyclopedia of integer sequences, aT&T Labs Research (2002), http://www.research.att.com/~njas/sequences/A067771

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gatti, N., Monga, M., Sicari, S. (2010). A Localization Game in Wireless Sensor Networks. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds) Decision and Game Theory for Security. GameSec 2010. Lecture Notes in Computer Science, vol 6442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17197-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17197-0_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17196-3

  • Online ISBN: 978-3-642-17197-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics