Abstract
In wireless sensor networks, reliable location information is not only necessary to event reports but also crucial to network functionalities such as geographic routing, distributed information storage/retrieval. However, sensors could be compromised by adversaries to claim arbitrary locations to disrupt the normal network operation. Thus, location verification should be carried out for security considerations. Due to the importance of the problem, we propose a highly efficient algorithm that effectively detects false location claims from compromised sensors. Extensive analysis and simulation results demonstrate that our algorithm is energy-efficient and resilient against adversaries.
Similar content being viewed by others
References
Akyildiz I, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: a survey. Computer Networks, 2002, 38: 393–422
Karp B, Kung H. Gpsr: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2000
Rao A, Ratnasamy S, Papadimitriou C, et al. Geographic routing without location information. In: Proceedings of the 9th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2003
Fang Q, Gao J, Guibas L. Landmark-based information storage and retrieval in sensor networks. In: Proceedings of the 25th Conference of the IEEE Communication Society (INFOCOM), 2006
Gao J, Guibas L, Hershberger J, et al. Fractionally cascaded information in a sensor network. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN), 2004
Douceur J. The sybil attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems, 2002
Newsome J, Shi E, Song D, et al. The sybil attack in sensor networks: Analysis and defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN), 2004
Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. Sensor Network Protocols and Applications, 2003, 1: 293–315
Przydatek B, Song D, Perrig A. Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003, 5–7
Chen H, Perrig A, Song D. Secure hierarchical innetwork aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006
Wellenhoff B, Lichtenegger H, Collins J. Global Positioning System: Theory and Practice. 4th ed. Springer Verlag, 1997
He T, Huang C, Blum M, et al. Range-free localization schemes in large scale sensor networks. In: Proceedings of the 9th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2003
Niculescu D, Nath B. Ad hoc positioning system (APS) using AOA. In: Proceedings of the 22nd Conference of the IEEE Communication Society (INFOCOM), 2003
Merkle R. A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, 1989, 218–238
Du W, Deng J, Han Y, Varshney P. A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security (CCS), 2003
Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security (CCS), 2002
Sastry N, Shankar U, Wagner D. Secure verification of location claims. In: Proceeding of the ACM Workshop onWireless Security (WiSe), 2002
Abu-Ghazaleh N, Kang K, Liu K. Toward resilient geographic forwarding in wireless sensor networks. In: Proceedings of the 1st ACM InternationalWorkshop on Quality of Service and Security in Wireless and Mobile Networks, 2005
Capkun S, Hubaux J. Secure positioning of wireless devices with applications to sensor networks. In: Proceedings of the 24th Conference of the IEEE Communication Society (INFOCOM), 2005
Du W, Fang L, Ning P. Lad: Location anomaly detection for wireless sensor networks. In: Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS), 2005
Ekici E, McNair J, Al-Abri D. A probabilistic approach to location verification for wireless sensor networks. In: Proceedings of IEEE International Conference on Communications (ICC), 2006
Wei Y, Yu Z, Guan Y. Location verification algorithms for wireless sensor networks. In: Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS), 2007
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, Q., Zhou, X. Efficient distributed location verification in wireless sensor networks. Front. Comput. Sci. China 4, 123–134 (2010). https://doi.org/10.1007/s11704-009-0071-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-009-0071-x