Elsevier

Ad Hoc Networks

Volume 74, 15 May 2018, Pages 47-56
Ad Hoc Networks

Secure localization using hypothesis testing in wireless networks

https://doi.org/10.1016/j.adhoc.2018.03.008Get rights and content

Abstract

Localization is the method of estimating the location of a wireless node using measured inputs such as distances from nodes with known locations. When the measured distances from anchor nodes are used for localization, compromised nodes that are involved in the process can give false information that produces inaccurate location estimates. This paper proposes a Generalized Likelihood Ratio (GLRT) based approach to find the compromised nodes that deliberately give false information. After detecting such malicious nodes, the measurements given by them are eliminated from the localization computation to improve the location estimate. The proposed method works for Gaussian range measurement errors, which is considered more realistic, as compared to a method available in literature that works only for uniformly distributed range errors. Extensive simulations were carried out to assess the performance of the algorithm under various conditions. The proposed method was found to give better localization accuracy as compared to previous methods available in the literature which address the same problem. Simulations also showed that the algorithm performs well even when some of the assumptions used in the algorithm do not hold true.

Introduction

Localization is an important application in most wireless networks, particularly in sensor networks, as the information reported by nodes in the network is interpreted with reference to its location. Therefore, accurate localization is critical for many applications that depend on location information. It is, however, very expensive to equip all the sensor nodes with GPS receivers that can find the location on its own. Besides, GPS often fails indoors. The common approach is to equip some of the nodes with GPS receivers and find the location of the remaining nodes using them as reference.

In this work, the focus is on range-based localization that can be explained as follows: The node for which location is to be estimated is called target node. To estimate the location of the target node, we use the distances from n reference nodes called anchor nodes; and the locations of these anchor nodes are assumed to be known. The measured distances between the target and anchor nodes are called ranges.1 The ranges are computed by sending time-stamped packets between target node and the anchor nodes, and computing the time of flight using the time difference between the time stamp and the time when the packet is received. Since the velocity of electromagnetic signals in air is known, the distance between the nodes can be calculated from the time of flight. Using the locations of the anchor nodes and the measured ranges, the location of the target node can be calculated. This calculation is a solved problem and many effective algorithms are available for it (see [1] and [2] for an overview of the methods available in literature). Should an attack happen in the network, the attacker may target the localization application to cause the nodes to report inaccurate or wrong location information. Hence, researchers are increasingly looking into secure localization problem, attempting to improve the accuracy of location estimate even in the case of having compromised nodes in the network that report wrong measurements. The security issues associated with localization is surveyed by Zeng et al. [3].

An example scenario for the problem considered is shown in Fig. 1. If all the range measurements provided to the localization algorithm are correct, the estimated location of the target nodes would be the point marked ‘X’. However, due to one malicious range estimate, shown by the dashed line, the location estimate is moved to the point marked star.

The work in [4] considered such attack and proposed the use of Least Median Square (LMS) estimate instead of Least Square Estimate (LSE). This approach attempts to find the location that minimizes the median of the differences between the measured distances and the calculated distances to the anchor nodes from that point.

Misra et al. [5] also tackled the above problem with erroneous range measurements. They proposed a method to eliminate the measurements given by nodes that are found to be malicious with absolute certainty. In the case of no measurement errors, the method proposed by Misra et al. works very well. It was shown in their work that in that case, the location can be estimated correctly when the number of malicious anchor nodes is less than or equal to n/22, where n is the total number of anchor nodes that report range measurements to the target node. However, in the case of non-zero measurement errors, only ranges that are absolutely certain to be false are classified as malicious. As a result, the method misses many malicious range measurements. This is a cause for concern, as in a wireless network, classifying a malicious node as non-malicious (missed detection) is much more damaging than classifying a non-malicious node as malicious (false positive), as the former case can compromise the utility of the entire network. The work of Misra et al. [5] was shown to give better performance than LMS approach. This work can be used only in the case when range measurement errors are uniformly distributed. However, the approach taken by Misra et al. [5] assumes uniformly distributed range measurement errors, which is an unrealistic model in practice.

In this paper, we propose a hypothesis testing approach using a modified version of Generalized Likelihood Ratio Test (GLRT) method [6] to find malicious nodes using the range measurements reported by the nodes. After eliminating the range measurements that are classified as malicious, we use maximum likelihood estimation to do the final localization using the remaining range measurements. The method is shown to have better localization accuracy than LSE [7], LMS [4], and the work in [5]. To the best of our knowledge, the papers [5] and [4] are the only ones that have considered this problem of attack on localization using malicious range measurements.

Following are the important contributions in this work:

  • We propose a hypothesis testing based scheme to find malicious range measurements to reduce localization error. The scheme works for Gaussian range measurement errors, which is a more realistic model, unlike the method in [5] that can be applied only for uniformly distributed range measurement errors.

  • We provide detailed study of the performance of the scheme under various conditions such as varying number of anchor nodes, measurement errors and lying factor.

  • We compare the proposed method with existing schemes in literature to show that the proposed scheme improves localization accuracy performance over methods available such as LSE [7], LMS [4], and the method described in [5].

  • We test the resilience of the method by evaluating its performance in the cases where the assumptions used in the algorithm are not true

The remainder of this paper is organized as follows: Section 2 describes related work in the area of secure localization. Section 3 gives a description of the model we are considering for secure localization. Section 4 details the hypothesis testing approach to find false range measurements. The results are described in Section 5. The paper is concluded in Section 6.

Section snippets

Related work

The classical solution to the problem of localization is the LSE [7] estimate. The LSE for a two-dimensional network is obtained by finding the two element vector ρ that minimizes the expression B(ρ)=i=1n(digi(ρ))2where di is the measured distance from the target node to the ith anchor node, gi(ρ) is the calculated distance from the location ρ to the location of the ith anchor node, and n is the number of anchor nodes participating in the localization process.

Many works in literature consider

System model

In a wireless network, the target node measures its own distance from n anchor nodes. We assume that sufficient number of directly connected anchor nodes are available to compute the location of the target node, and that the anchor nodes that are multiple hops away are not involved. The range measurements are assumed to be done by sending time-stamped packets from the anchor node to target node and back. The distance between the nodes, known as range is calculated by finding the time of flight

Method

In this section, we describe the approach to detect malicious anchor nodes. First, we find the Cramer Rao Lower Bound (CRLB) of the location estimate. We use a modified form of GLRT to test whether each of the range measurements are malicious. For the modified GLRT, we find the maximum likelihood estimate of the actual range assuming the null hypothesis that the node is non-malicious and the alternate hypothesis that the node is malicious. Using these ranges, we calculate the value of the

Results

The proposed algorithm was implemented in Matlab. The target node was placed at the center of a 100 m  × 100 m field, and the transmission range (here the term ‘transmission range’ indicates the maximum distance over which wireless transmission can be done by the nodes.) of the target node was assumed to be 35 m. The given number of anchor nodes are placed randomly in the circle of transmission range with radius of 35 m. The number of lying nodes was less than or equal to n/22 in all cases,

Conclusions

This paper presented a hypothesis testing approach to find malicious nodes that give incorrect range values in a network localization scenario and thereby improving the accuracy of the location estimate. The proposed method used a modified version of GLRT to identify malicious range measurements and the final location estimate was obtained after eliminating such malicious ranges. The algorithm used the required false positive probability to compute the threshold for hypothesis test, although,

Acknowledgment

The authors would like to thank the reviewers for their insightful comments which helped to improve the quality of the paper.

Suood Abdulaziz AlRoomi received his B.Sc. in computer engineering from Kuwait University and is currently pursuing his M.Sc. in computer science in Georgia Institute of Technology. His research interest includes the intersection and application of security with architecture, artificial intelligence and image processing.

References (23)

  • LiZ. et al.

    Robust statistical methods for securing wireless localization in sensor networks

    Proceedings of the 4th International Symposium on Information Processing in Sensor Networks

    (2005)
  • DuW. et al.

    Lad: localization anomaly detection for wireless sensor networks

    J. Parallel Distrib. Comput.

    (2006)
  • N. Patwari et al.

    Locating the nodes: cooperative localization in wireless sensor networks

    IEEE Signal Process. Mag.

    (2005)
  • HanG. et al.

    A survey on mobile anchor node assisted localization in wireless sensor networks

    IEEE Commun. Surv. Tutor.

    (2016)
  • ZengY. et al.

    Secure localization and location verification in wireless sensor networks: a survey

    J. Supercomput.

    (2013)
  • S. Misra et al.

    Secure and robust localization in a wireless ad hoc environment

    IEEE Trans. Veh. Technol.

    (2009)
  • S.M. Kay

    Fundamentals of Statistical Signal Processing: Detection Theory

    (1998)
  • A. Savvides et al.

    Dynamic fine-grained localization in ad-hoc networks of sensors

    Proceedings of the 7th Annual International Conference on Mobile Computing and Networking

    (2001)
  • MiaoC. et al.

    Collaborative localization and location verification in wsns

    Sensors

    (2015)
  • YanS. et al.

    Location verification systems under spatially correlated shadowing

    IEEE Trans. Wirel. Commun.

    (2014)
  • YanS. et al.

    Optimal information-theoretic wireless location verification

    IEEE Trans. Veh. Technol.

    (2014)
  • Cited by (6)

    Suood Abdulaziz AlRoomi received his B.Sc. in computer engineering from Kuwait University and is currently pursuing his M.Sc. in computer science in Georgia Institute of Technology. His research interest includes the intersection and application of security with architecture, artificial intelligence and image processing.

    Imtiaz Ahmad received his B.Sc. in Electrical Engineering from University of Engineering and Technology, Lahore, Pakistan, a M.Sc. in Electrical Engineering from King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia, and a Ph.D. in Computer Engineering from Syracuse University, Syracuse, New York, in 1984, 1988 and 1992, respectively. Since September 1992, he has been with the Department of Electrical and Computer Engineering at Kuwait University, Kuwait, where he is currently a professor. His research interests include design automation of digital systems, high-level synthesis, and parallel and distributed computing.

    Dr. Tassos Dimitriou is currently affiliated with the Department of Computer Engineering at Kuwait University (KU) and the Research and Academic Computer Technology Institute (CTI), Greece. Prior to that he was an Associate Professor at Athens Information Technology, Greece, where he was leading the Algorithms and Security group, and adjunct Professor in Carnegie Mellon University, USA, and Aalborg University, Denmark. Dr. Dimitriou conducts research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. Emphasis is given in authentication and privacy issues for various types of networks (adhoc, sensor nets, RFID, smart grid, etc.), security architectures for wireless and telecommunication networks and the development of secure applications for networking and electronic commerce. Dr. Dimitriou is a senior member of IEEE, ACM, a Fulbright fellow and Distinguished Lecturer of ACM. More information about him can be found in the web page http://tassosdimitriou.com/.

    View full text