Skip to main content
Log in

Secure localization and location verification in wireless sensor networks: a survey

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors’ locations need to be considered. First, attackers may attack the localization process to make estimated locations incorrect. Second, since sensor nodes may be compromised, the base station (BS) may not trust the locations reported by sensor nodes. Researchers have proposed two techniques, secure localization and location verification, to solve these two issues, respectively. In this paper, we present a survey of current work on both secure localization and location verification. We first describe the attacks against localization and location verification, and then we classify and describe existing solutions. We also implement typical secure localization algorithms of one popular category and study their performance by simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  2. Anderson R, Kuhn M (1996) Tamper resistance—a cautionary note. In: Proceedings of the second usenix workshop on electronic commerce

  3. Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: Proceedings of MASS

  4. Becher A, Benenson Z, Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceedings of third international conference on security in pervasive computing (SPC ’06)

  5. Boukerche A, Oliveira H, Nakamura E, Loureiro A (2008) Secure localization algorithms for wireless sensor networks. IEEE Commun Mag 46(4):96–101

    Article  Google Scholar 

  6. Brands S, Chaum D (1993) Distance-bounding protocols. In: Proceedings of EUROCRYPT

  7. Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings of INFOCOM

  8. Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun. doi:10.1109/JSAC.2005.861380

  9. Capkun S, Cagalj M, Srivastava M (2006) Securing localization with hidden and mobile base stations. In: Proceedings of INFOCOM

  10. Capkun S, Rasmussen K, Cagalj M, Srivastava M (2008) Secure location verification with hidden and mobile base stations. IEEE Trans Mobile Comput 7(4):470–483

    Article  Google Scholar 

  11. Chandran N, Goyal V, Moriarty R, Ostrovsky R (2009) Position based cryptography. In: Proceedings of CRYPTO

  12. Du W, Fang L, Ning P (2005) LAD: Localization anomaly detection forwireless sensor networks. In: Proceedings of IPDPS

  13. Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: Proceedings of ICC

  14. Ekici E, Vural S, McNair J, Al-Abri D (2008) Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw 6(2):195–209

    Article  Google Scholar 

  15. Ferreres AT, Alvarez B, Garnacho A (2008) Guaranteeing the authenticity of location information. IEEE Personal Commun Mag 7(3):72–80

    Google Scholar 

  16. Fletcher R (2000) Practical methods of optimization, 2nd edn. Wiley, New York

    Google Scholar 

  17. Goldenberg DK, Bihler P, Cao M, Fang J, Anderson BDO, Morse AS, Yang YR (2006) Localization in sparse networks using sweeps. In: Proceedings of MobiCom

  18. He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of MobiCom

  19. He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050–1058

    Article  Google Scholar 

  20. Hu Y, Perrig A, Johnson D (2003) Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM

  21. Hwang J, He T, Kim Y (2007) Detecting phantom nodes in wireless sensor networks. In: Proceedings of INFOCOM

  22. Jian L, Yang Z, Liu Y (2010) Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization. In: Proceedings of INFOCOM

  23. Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of MobiCom

  24. Kindberg T, Zhang K, Shankar N (2002) Context authentication using constrained channels. In: Proceedings of WMCSA

  25. Kiyavash N, Koushanfar F (2007) Anti-collusion position estimation in wireless sensor networks. In: Proceedings of MASS

  26. Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Netw 43(4):499–518

    Article  MATH  Google Scholar 

  27. Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of ACM WiSe

  28. Lazos L, Poovendran R (2006) HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233–246

    Article  Google Scholar 

  29. Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: Proceedings of IPSN

  30. Leinmuller T, Schoch E, Kargl F (2006) Position verification approaches for vehicular ad hoc networks. IEEE Wirel Commun 13(5):16–21

    Article  Google Scholar 

  31. Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In: Proceedings of IPSN

  32. Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM SASN

  33. Liu D, Ning P, Du W (2005) Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proceedings of ICDCS

  34. Liu D, Ning P, Du WK (2005) Attack-resistant location estimation in sensor networks. In: Proceedings of IPSN

  35. Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1–39

    Article  MATH  Google Scholar 

  36. Liu J, Zhang Y, Zhao F (2006) Robust distributed node localization with error management. In: Proceedings of MobiHoc

  37. Mao G, Fidan B, Anderson BDO (2007) Wireless sensor network localization techniques. Comput Netw 51(10):2529–2553

    Article  MATH  Google Scholar 

  38. Misra S, Bhardwaj S, Xue G (2006) ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment. In: Proceedings of MILCOM

  39. Misra S, Xue G, Bhardwaj S (2009) Secure and robust localization in a wireless ad hoc environment. IEEE Trans Veh Technol 58(3):1480–1489

    Article  Google Scholar 

  40. Moore D, Leonard J, Rus D, Teller S (2004) Robust distributed network localization with noisy range measurements. In: Proceedings of SenSys

  41. Niculescu D, Nath B (2001) Ad hoc positioning system (APS). In: Proceedings of IEEE GLOBECOM

  42. Niculescu D, Nath B (2003) Ad hoc positioning system (aps) using aoa. In: Proceedings of INFOCOM

  43. Rousseeuw P, Leroy A (2003) Robust regression and outlier detection. Wiley-Interscience, New York

    Google Scholar 

  44. Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: Proceedings of WiSe

  45. Savarese C, Rabay J (2002) Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In: Proceedings of USENIX

  46. Savvides A, Han CC, Srivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of MobiCom

  47. Savvides A, Park H, Srivastava MB (2002) The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of WSNA

  48. Shang Y, Ruml W, Zhang Y (2003) Localization from mere connectivity. In: Proceedings of MobiHoc

  49. Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: Proceedings of DASC

  50. Srinivasan A, Wu J (2008) A survey on secure localization in wireless sensor networks. In: Furht B (ed) Encyclopedia of wireless and mobile communications. CRC Press, Boca Raton

    Google Scholar 

  51. Srinivasan A, Wu J, Teitelbaum J (2007) Distributed reputation-based secure localization in sensor networks. J Auton Trusted Comput. http://www.cis.temple.edu/~wu/DRBTS_JournalVersion_JoATC.pdf

  52. Vora A, Nesterenko M (2006) Secure location verification using radio broadcast. IEEE Trans Depend Secure Comput 3(4):377–385

    Article  Google Scholar 

  53. Wang C, Xiao L (2006) Locating sensors in concave areas. In: Proceedings of INFOCOM

  54. Wang C, Xiao L (2007) Sensor localization under limited measurement capabilities. IEEE Netw 21(3):16–23

    Article  Google Scholar 

  55. Wei Y, Yu Z, Guan Y (2007) Location verification algorithms for wireless sensor networks. In: Proceedings of ICDCS

  56. Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of MobiHoc

  57. Zeng Y, Zhang S, Guo S, Li X (2007) Secure hop-count based localization in wireless sensor networks. In: Proceedings of CIS

  58. Zeng Y, Cao J, Hong J, Xie L (2009) Secure localization and location verification in wireless sensor networks. In: Proceedings of TSP

  59. Zeng Y, Cao J, Hong J, Zhang S, Xie L (2009) SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks. In: Proceedings of WSNS

  60. Zeng Y, Cao J, Zhang S, Guo S, Xie L (2009) Pollution attack: a new attack against localization in wireless sensor networks. In: Proceedings of WCNC

  61. Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829–835

    Article  Google Scholar 

  62. Zhong S, Jadliwala M, Upadhyaya S, Qiao C (2008) Towards a theory of robust localization against malicious beacon nodes. In: Proceedings of INFOCOM

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingpei Zeng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zeng, Y., Cao, J., Hong, J. et al. Secure localization and location verification in wireless sensor networks: a survey. J Supercomput 64, 685–701 (2013). https://doi.org/10.1007/s11227-010-0501-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-010-0501-4

Keywords

Navigation