Skip to main content

Advertisement

Log in

Efficient distributed location verification in wireless sensor networks

  • Research Article
  • Published:
Frontiers of Computer Science in China Aims and scope Submit manuscript

Abstract

In wireless sensor networks, reliable location information is not only necessary to event reports but also crucial to network functionalities such as geographic routing, distributed information storage/retrieval. However, sensors could be compromised by adversaries to claim arbitrary locations to disrupt the normal network operation. Thus, location verification should be carried out for security considerations. Due to the importance of the problem, we propose a highly efficient algorithm that effectively detects false location claims from compromised sensors. Extensive analysis and simulation results demonstrate that our algorithm is energy-efficient and resilient against adversaries.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: a survey. Computer Networks, 2002, 38: 393–422

    Article  Google Scholar 

  2. Karp B, Kung H. Gpsr: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2000

  3. Rao A, Ratnasamy S, Papadimitriou C, et al. Geographic routing without location information. In: Proceedings of the 9th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2003

  4. Fang Q, Gao J, Guibas L. Landmark-based information storage and retrieval in sensor networks. In: Proceedings of the 25th Conference of the IEEE Communication Society (INFOCOM), 2006

  5. Gao J, Guibas L, Hershberger J, et al. Fractionally cascaded information in a sensor network. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN), 2004

  6. Douceur J. The sybil attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems, 2002

  7. Newsome J, Shi E, Song D, et al. The sybil attack in sensor networks: Analysis and defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN), 2004

  8. Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. Sensor Network Protocols and Applications, 2003, 1: 293–315

    Google Scholar 

  9. Przydatek B, Song D, Perrig A. Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003, 5–7

  10. Chen H, Perrig A, Song D. Secure hierarchical innetwork aggregation in sensor networks. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006

  11. Wellenhoff B, Lichtenegger H, Collins J. Global Positioning System: Theory and Practice. 4th ed. Springer Verlag, 1997

  12. He T, Huang C, Blum M, et al. Range-free localization schemes in large scale sensor networks. In: Proceedings of the 9th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2003

  13. Niculescu D, Nath B. Ad hoc positioning system (APS) using AOA. In: Proceedings of the 22nd Conference of the IEEE Communication Society (INFOCOM), 2003

  14. Merkle R. A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, 1989, 218–238

  15. Du W, Deng J, Han Y, Varshney P. A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security (CCS), 2003

  16. Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security (CCS), 2002

  17. Sastry N, Shankar U, Wagner D. Secure verification of location claims. In: Proceeding of the ACM Workshop onWireless Security (WiSe), 2002

  18. Abu-Ghazaleh N, Kang K, Liu K. Toward resilient geographic forwarding in wireless sensor networks. In: Proceedings of the 1st ACM InternationalWorkshop on Quality of Service and Security in Wireless and Mobile Networks, 2005

  19. Capkun S, Hubaux J. Secure positioning of wireless devices with applications to sensor networks. In: Proceedings of the 24th Conference of the IEEE Communication Society (INFOCOM), 2005

  20. Du W, Fang L, Ning P. Lad: Location anomaly detection for wireless sensor networks. In: Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS), 2005

  21. Ekici E, McNair J, Al-Abri D. A probabilistic approach to location verification for wireless sensor networks. In: Proceedings of IEEE International Conference on Communications (ICC), 2006

  22. Wei Y, Yu Z, Guan Y. Location verification algorithms for wireless sensor networks. In: Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS), 2007

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehai Zhou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Q., Zhou, X. Efficient distributed location verification in wireless sensor networks. Front. Comput. Sci. China 4, 123–134 (2010). https://doi.org/10.1007/s11704-009-0071-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-009-0071-x

Keywords