skip to main content
10.1145/1741866.1741893acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks

Published:22 March 2010Publication History

ABSTRACT

In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this paper, we introduce Secure Walking GPS, a secure localization and key distribution solution for manual deployments of WSNs. Using the location information provided by the GPS and inertial guidance modules on a special master node, Secure Walking GPS achieves accurate node localization and location-based key distribution at the same time. Our analysis and simulation results indicate that the Secure Walking GPS scheme makes a deployed WSN resistant to the Dolev-Yao, the wormhole, and the GPS-denial attacks, has good localization and key distribution performance, and is practical for large-scale WSN deployments.

References

  1. S. Camtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Capkun, M. Cagalj, and M. Srivastava. Securing localization with hidden and mobile base stations. In INFOCOM, 2006.Google ScholarGoogle Scholar
  3. D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. Inf. Theory, 29(2), 1983.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In CCS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J. Stankovic, and T. Abdelzaher. Achieving real-time target tracking using wireless sensor networks. In RTAS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Kuo, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In SenSys, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Lazos and R. Poovendran. Serloc: Secure range-independent localization for wireless sensor networks. WiSe, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Lazos and R. Poovendran. Hirloc: High-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In SASN, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Liu, P. Ning, and W.K. Du. Attack-resistant location estimation in sensor networks. In IPSN, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Q. Mi, J. Stankovic, and R. Stoleru. Secure walking gps: A secure localization and key distribution scheme for wireless sensor networks. In Technical Report, http://www.cs.virginia.edu/~qm8e/papers/swgps-full.pdfGoogle ScholarGoogle Scholar
  12. T. Park and K.G. Shin. Attack-tolerant localization via iterative verification of locations in sensor networks. ACM Trans. on Embedded Computing Systems, 8(1), Dec 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Poovendran and L. Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1):27--59, January 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux. A practical secure neighbor verification protocol for wireless sensor networks. In WiSec, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Stoleru, T. He, and J. Stankovic. Walking GPS: A practical solution for localization in manually deployed wireless sensor networks. In LCN, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WiSec '10: Proceedings of the third ACM conference on Wireless network security
      March 2010
      186 pages
      ISBN:9781605589237
      DOI:10.1145/1741866

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 March 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate98of338submissions,29%

      Upcoming Conference

      WiSec '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader