Abstract
Sensors’ localizations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors. However, almost all previously proposed techniques can be trivially abused by a malicious adversary involving false position. The wormhole attack is a particularly challenging one since the external adversary which acts in passive mode, does not need to compromise any nodes or have access to any cryptographic keys. In this paper, wormhole attack in DVhop is discussed, and a Wormhole-free DV-hop Localization scheme (WFDV) is proposed to defend wormhole attack in proactive countermeasure. Using analysis and simulation, we show that our solution is effective in detecting and defending against wormhole attacks with a high detection rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chong, C.Y., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. IEEE 91(8), 1247–1256 (2003)
Rabaey, M.J., Ammer, J.L., da Silva, J.R., Patel, D., Roundy, S.: PicoRadio supports ad hoc ultra-low power wireless networking. Computer 33(7), 42–48 (2002)
Pirreti, M., Vijaykrishnan, N., McDaniel, P., Madan, B.: SLAT: Secure Localization with Attack Tolerance. Technical report: NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ (2005)
Zhao, M., Servetto, S.D.: An Analysis of the Maximum Likelihood Estimator for Localization Problems. In: IEEE ICBN (2005)
Bahl, P., Padmanabhan, V.N.: RADAR:An In-building RF-based User Location and Tracking System. In: IEEE INFOCOM (2000)
Labraoui, N., Gueroui, M., Aliouat, M., Zia, T.: Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey. Ad hoc & Sensor Networks. International Journal 12 (2011) (in Press)
Zia, T., Zomaya, A.Y.: A security framework for wireless sensor networks. In: IEEE Sensor Applications Symposium, Texas (2006)
Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS). In: IEEE GLOBECOM 2001, San Antonio, pp. 2926–2931 (2001)
Wenfeng, L.: Wireless sensor networks and mobile robot control, pp. 54–60. Science Press (2009)
Parkinson, B., Spilker, J.: Global positioning system: theory and application. American Institute of Aeronautics and Astronautics, Washington, D.C (1996)
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. In: INFOCOM, vol. 2, pp. 1976–1986 (2003)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: CNDS 2002 (2002)
Goldsmith, A.: Wireless Communications. Cambridge University Press, New York (2005)
Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall PTR, Englewood Cliffs (2001)
Shon, T., Choi, H.: Towards the implementation of reliable data transmission for 802.15.4-based wireless sensor networks. In: Sandnes, F.E., Zhang, Y., Rong, C., Yang, L.T., Ma, J. (eds.) UIC 2008. LNCS, vol. 5061, pp. 363–372. Springer, Heidelberg (2008)
Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. In: 4th IEEE Consumer Communications and Networking Conference (2007)
Zheng J.: Low rate wireless personal area networks: ns-2 simulator for 802.15.4 (release v1.1) (2007), ees2cy.engr.ccny.cuny.edu/zheng/pub
The Rice Monarch Project: Wireless and mobility extensions to ns-2 (2007), www.monarch.cs.cmu.edu/cmu-ns.html
Lazos, L., Poovendran, R., Capkun, S.: ROPE: Robust Position Estimation in Wireless Sensor Networks. In: IEEE IPSN, pp. 324–331 (2005)
Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: 2nd IEEE Int’l Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283 (2006)
Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks. In: IEEE ICDCS, pp. 609–619 (2005)
Wang, C., Liu, A., Ning, P.: Cluster-Based Minimun Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks. In: the Int’l Conf. on Wireless Algorithms, Systems and Applications, pp. 29–37 (2007)
Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: IEEE IPSN, pp. 91–98 (2005)
Lazos, L., Poovendran, R.: SeRLoc: robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 1(1), 73–100 (2005)
Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 233–246 (2006)
Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Zhang, D., Portmann, M., Tan, A.-H., Indulska, J. (eds.) UIC 2009. LNCS, vol. 5585, pp. 296–309. Springer, Heidelberg (2009)
Wu, J., Chen, H., Lou, W., Wang, Z.: Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks. In: 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010), Macau SAR, China (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Labraoui, N., Gueroui, M., Aliouat, M. (2011). Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks. In: Cherifi, H., Zain, J.M., El-Qawasmeh, E. (eds) Digital Information and Communication Technology and Its Applications. DICTAP 2011. Communications in Computer and Information Science, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21984-9_50
Download citation
DOI: https://doi.org/10.1007/978-3-642-21984-9_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21983-2
Online ISBN: 978-3-642-21984-9
eBook Packages: Computer ScienceComputer Science (R0)